Bioscrypt Access Control Readers(10)
Browse Access Control Readers
Access control reader products updated recently
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The International Airport of Mexico turned to HID Global to help address its access control needs As a tourist and commercial gateway to the country, the International Airport of Mexico City (AICM) plays a vital role in the development of Mexico’s economy, ensuring the prosperity and global accessibility of this burgeoning nation. International and domestic hub The AICM is Latin America’s busiest airport, and one of the world’s 30 most active airports in terms of passengers, operations and cargo. Located six miles east of Mexico City, the airport is Mexico’s primary international and domestic hub, with direct flights to more than 300 worldwide destinations. The airport boasts an impressive array of modern facilities including restaurants, shops, hotel reservation desks, tourist information, ATMs, banks, foreign exchange, business facilities and a post office. Further increasing the complexity of the AICM’s operation, the airport is undergoing major construction work, including building new concourses and a new terminal (Terminal 2). Once built, the new facilities are expected to increase airport passenger capacity by nearly 50%. This will enable the airport to handle an additional 16 million passengers per year, up from the current 32 million travellers who pass through. Layers of security With all this activity, the issue of access control is a key consideration. With nearly 340,000 flights in a year, and about 20,000 staff on site, the AICM has significant access control requirements. As a regional leader, the AICM turned to HID Global, a manufacturer in the access control industry, to help address its needs. With nearly 340,000 flights in a year, and about 20,000 staff on site, the AICM has significant access control requirements Preventing terrorist attacks and protecting the domestic and global transportation network, transportation security is a critical mission for any airport. One way in which airports have effectively provided traveller security is by setting up security layers to protect airline passengers. The layers include security measures like airport checkpoints, canine searches, air marshals, luggage inspection and explosive material detection. Each layer of protection, on its own, is capable of preventing terrorist attacks; together, the layers’ security value is exponentially higher, creating a much stronger overall security system. Another omnipresent layer of airport security is access control. Controlling access to key airport functions is a critical security task. Given the size, amenities and complexity of the AICM, controlling access to areas can be a huge task. Access control needs When it was time for the AICM to consider a system upgrade, Manager of Airport Identification, Enrique De la Mora, a member of AICM’s security staff, worked with integrator Ernesto Ibarra from IR Systems S.A. de C.V. to define the scope of AICM’s access control needs. In evaluating various offerings, the airport’s security was dependent on the following considerations: Size and Complexity: With AICM’s size, amenities and complexity, controlling access to restricted areas would be a massive undertaking. Multi-factor Authentication: Concerned with vandalism and identity theft, the airport identified that it would need some type of multi-factor authentication to maintain strict access control to restricted areas like VIP rooms and operations areas. AICM management had to ensure that the “right” people would get in, but the “wrong” people would be kept out. Secure Credentials: Significant authentication capabilities were needed at the credential level. The credentials chosen by the airport would need to be counterfeit-proof, ensuring the integrity of the card issuance process. Scalable Solution: Credential issuance would also need to be a fluid, yet secure, process. The credential issuance procedure would have to be scalable to address new locations and employee status. With the expected opening of a new terminal, AICM management wanted to ensure that it would only need to provide badges for each employee once, for all facilities. Latest Technology: De la Mora and AICM were ready to upgrade to the latest technology. “We have been using an integrated 125 kHz proximity-based access control system, powered by HID cards and readers, since 1998. The AICM decided the time and needs were right to move ahead to the most advanced, best-of-class system,” commented De la Mora. Having determined those needs and rationale, the AICM turned to HID Global for its innovative applications of technology and expertise. To address its mission-critical requirements, AICM management determined that cards and readers from HID Global were the right solution. New airport access control system Based on its scope evaluation and previous experience with HID Global products, AICM felt secure in purchasing access control hardware. AICM set up a new access control system based around the V-Smart iCLASS access control readers and 16k bit (2k Byte) contactless smart cards. The equipment, supplied by Bioscrypt and HID, requires biometric authentication in addition to identity verification for card carriers to gain access to restricted areas. The fingerprint readers include HID iCLASS® 13.56 MHz read/write contactless smart card technology, to manage access to restricted sites within the airport; such as VIP rooms and operations areas. Combining biometric read capability (using Bioscrypt’s fingerprint authentication) with an HID iCLASS contactless smart card read/write module, the single unit reader represents optimal dual factor authentication for high security at this vital site. “With V-Smart iCLASS, the identity verification process is doubled. If someone wants to go through a controlled door, he must first identify himself by presenting his access control card. Upon accurate reading and verification of the card, the cardholder then places his finger on the biometric reader to prove that the person carrying the credential really is the person the credential is issued to. This way, it is practically impossible to enter with a card that does not belong to the card holder,” De La Mora emphasised. "This way, it is practically impossible to enter with a card that does not belong to the card holder" HID Global Solution addresses AICM needs Size and Complexity Given the number of airport staff and potential intruders, De la Mora suggests that efficient operations surrounding identity verification and clearance to the airport’s restricted areas would truly present a logistical challenge without the V-Smart iCLASS reader electronic access control system. The airport’s large card user base, including employees, airline staff, cleaning and maintenance staff, and luggage transporters, suited the use of a biometric solution for access control. Multi-factor Authentication For high security at this vital site, users of the new access control system present an identity credential to the reader, then have their fingerprint read by the Bioscrypt device, to authenticate the cardholder’s identity. Secure Credentials The credentials chosen by the airport employ the latest security features, including extra secure printing features. Credentials feature a colour photograph of the user, his/her name, title, employer, personal date of use and other data printed on the card. The card also includes a colour code that identifies the card carrier’s functional area, with a holographic over-laminate for increased security. Scalable Solution The Management of Airport Identification issues between 25 and 50 permanent credentials and about 200 temporary credentials on a daily basis. It expects its card issuance to increase when Terminal 2 operations begin. Current cardholders can use the same identity credential to go from the airport’s Terminal 1 to the new Terminal 2. The administration will purchase an additional 51 VSmart iCLASS readers to manage access control when the new terminal comes on line. Latest biometric technology Fingerprint biometric readers have proven to be a reliable and mature solution, making it a primary technology for airport deployment around the world. The V-Smart iCLASS reader provides dual authentication security by ensuring “what you have” and “who you are”. With strong compatibility between iCLASS and the access control system, the Bioscrypt V-Smart iCLASS system can be seamlessly and cost effectively integrated to meet airport requirements. The biometric verification occurs locally at the V-Smart iCLASS reader and not remotely at a server. Storing the biometric template securely on the iCLASS contactless smart card eliminates the added cost of having to install a separate hard-wired network for template management. In addition to these features, the AICM was swayed by HID’s entire standard service offering that comes with its products, ensuring a successful security integration. One feature of HID’s service offering is its Corporate 1000 program™, which offers a custom-created, 35-bit card format exclusive for the end-user, establishing a “Single Card Solution.” Under this program, more than one million individual card numbers are available to AICM, tracked during manufacturing to ensure no duplicate card numbers. The Corporate 1000 program also guarantees that the airport’s authorized integrator, IR Systems, is the only entity able to purchase cards from HID Global on the airport’s behalf. Success for new system With nearly 20,000 cards in use, issued to a variety of personnel including airport employees, airline staff, airport cleaning and maintenance staff, and luggage transporters, the biometric solution allows precise access control to restricted areas, virtually eliminating the possibility of counterfeiting. The AICM was swayed by HID’s entire standard service offering that comes with its products To date, the airport has deployed over 60 Bioscrypt V-Smart iCLASS readers for facility security. The fingerprint readers included HID iCLASS 13.56 MHz read/write contactless smart card technology, to restrict access to high profile sites within the airport. With widespread use of the iCLASS credential, there is also room in the future for the IAMC to consider implementation of other applications based on the use of the existing HID iCLASS credential. In response to AICM’s anticipation of illegal intrusion threats and other criminal activities that could go on at the airport, the HID Global solution is ideal for AICM’s access control needs. Using V-Smart iCLASS readers and benefiting from the advantages of HID’s Corporate 1000 program, card holders can use the same identity credential to move from the airport’s Terminal 1 to Terminal 2. Conclusion Through its people, processes and technologies, airport patrons (whether tourists, business travellers, or freight transporters) can continue to rely on the AICM’s massive international network of commerce, generating enormous opportunities for Mexico’s economy. A secure international airport enables the country to participate more fully in the social and economic benefits of the North American Free Trade Agreement (NAFTA) as well as access to global trading partners. HID Global aims to provide the ideal solution for transportation security. Occupying the access control “layer” of security, IACM is seeing the benefits of HID and Bioscrypt’s advanced fingerprint technology solution as it implements counterterrorism security measures.
MA SIGMA Lite fingerprint terminals are specifically designed to equip narrow mounting surfaces Morpho (Safran) announced recently the introduction of two new additions to the popular MorphoAccess® (MA) SIGMA family of biometric access control and time solutions, called the MorphoAccess® SIGMA Lite series. The new devices will be on display at ASIS 2015 in Anaheim, from 28th September to 1st October, 2015. Engineered with the same attention to detail and performance as the versatile MA SIGMA biometric access terminal, the MA SIGMA Lite fingerprint terminals are specifically designed to equip narrow mounting surfaces on glass/aluminium door mullions, turnstiles, or server rack doors. With two designs and multiple card reader options, there are a variety of models to address the widest range of deployment scenarios, both indoors and outdoors. The first design features an LED indicator to assist users in the access control process, whereas the second model offers enhanced interactivity with a colour touchscreen. Morpho's fingerprint technology With Morpho's industry leading fingerprint technology inside, they are equipped for a high capacity workload, accommodating up to 250,000 users for one-to-one verification and up to 10,000 users for one-to-many identification. The slim and sleek fingerprint readers embed a web server that enables users of laptops, tablets or smartphones to connect, and then trigger on-device enrolment, configure terminals or retrieve transaction logs. Offering an easy to use mounting system and high configurability, the devices fit perfectly into legacy Bioscrypt and Morpho installations as well as new implementations. "With these new devices, the right combination of design, robustness and performance is now available in a compact package," said Samuel Fringant, Executive Vice President of Morpho's Security division. "By delivering readers suitable for renewing legacy installations, complementing deployments of MA SIGMA stations or securing brand new facilities, Morpho reaffirms its commitment to give its customers access to the latest refinements of its technology, whatever the situation."
Open Options will also showcase its latest release, DNA Fusion Version 6, at ISC West Open Options, an industry leader in open platform access control solutions, will showcase the latest release of DNA Fusion – Version 6 – and will highlight integration partners at ISC West Las Vegas, the largest physical security trade show in North America. “Having just released DNA Fusion V6 ahead of schedule in February, Open Options is excited to provide the thousands of security professionals who visit ISC West the most up-to-date and advanced version of our flagship access control software,” said Open Options CEO Steve Fisher. “We are also eager to highlight our valued technology partners who have worked so diligently with us to provide total access control and security solutions.” Considered the security industry’s premier launching pad for new products and technologies, ISC West hosts more than 26,000 global security product manufacturers and professionals each spring in Las Vegas. This year the event will be held at the Las Vegas Sands Expo, April 2-4. ISC West attendees are invited to visit Open Options Booth 6103 to experience the latest in access control software – Open Options’ DNA Fusion V6 – on its various platforms including the new Fusion Web and Fusion Mobile applications. New features and enhancements to DNA Fusion V6 include: Flex API (Application Programming Interface) – Provides a robust mechanism for external parties to develop an interface into DNA Fusion to accomplish a myriad of tasks or receive information. Fusion Mobile – Manage access control security “on-the-go” from Apple and Android smartphones. Fusion Web – Manage access control security from the web (supports most browsers). New Biometric Integrations – Full support for Schlage Handkey II geometry reader and direct interface for the new Bioscrypt 4G Series readers. Wireless Intelligent Lock Interfaces – With ASSA ABLOY WiFi and PoE locks, ASSA ABLOY Aperio, Salto Wireless locks, and provides extended features for Schalge AD Series Wireless locks. New Video Integrations – Aimetis, Video Next, Video Insight Open Options will feature successful integration partners and products at ISC West, including an exciting new product from Zwipe – the first contactless card with full on-card fingerprint scanning and matching functionality. Other partner highlights will include Allegion AD-Series lock interface, ASSA ABLOY Wifi lock interface, aptiQ Mobile NFC credentials, HID cards and readers, and Salto Systems.
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
- HID DigitalPersona fingerprint biometric solution added to BigWise Stellar POS for greater security
- Armor At Hand partners with AASA and use Smart Shield to boost school safety nationwide
- WorldReach employs Cognitec’s technology to enable ID document applications with smartphones
- Matrix provides time-attendance and access control solution at Al-Khodari Sons Company