PCSC Access Control Readers(19)
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localisation. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymised and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
PCSC, a designer and manufacturer of access control solutions and Coolfire Solutions, a St. Louis based software company known for creating Military-Grade situational awareness platforms, collaborate to deliver top-level capabilities for access and security. Coolfire Solutions created its innovative Ronin Platform to deliver software that sits on top of existing systems and infrastructure to transform data into actionable intelligence. Originally developed for the U.S. military, the Ronin Platform is being widely adopted by industry leaders and organisations who recognise the importance of placing the right data, in the right hands, in real-time, so that intelligent decisions can be made. LiNC-NXG PSIM system Stacking the Ronin Platform on top of the data provided by PCSC’s LiNC-NXG PSIM system provides a robust, real-time common operational pictureStacking the Ronin Platform on top of the data provided by PCSC’s LiNC-NXG physical security information management system provides a robust, real-time common operational picture, visually representing physical security events, and enabling a coordinated security response. For instance, urgent security related event details are pushed to mobile devices of nearby security officials for immediate action. An additional benefit, in the case of an on-premises environment, the underlying access management system is not exposed, only the top-level data is managed. Extend the capabilities of access solutions “An extremely impressive GUI for our industry and an actionable set of features extend the capabilities of PCSC’s access solutions for real-time response,” said Mas Kosaka, President and CEO of PCSC. “The expansion possibilities are virtually limitless too. We’re excited to debut the capabilities of Ronin to our Business Partners during the PCSC Symposium in conjunction with ISC West, the largest security industry trade show in the U.S.” Coolfire Solutions and PCSC have the experience and capabilities to transform the way security professionals do their job every day" “Coolfire Solutions and PCSC have the experience and capabilities to transform the way security professionals do their job every day. We can maximise the value of existing technology investments by combining data from any source and making it actionable," said Don Sharp, CEO at Coolfire Solutions. "Security professionals have an incredibly challenging job and it’s only getting tougher. By bringing all of their critical data onto a single pane of glass we can increase the level of security while driving significant operational efficiencies.”
The BioConnect Identity Platform provides an integration of Suprema's biometric solutions with the majority of leading access control systems BioConnect and Suprema have announced Suprema's launch of the BioConnect Identity Platform. Developed by BioConnect, Suprema's long-standing strategic partner in North America, the BioConnect Identity Platform provides an integration of Suprema's biometric solutions with majority of the leading access control systems in the global security market. Under the appointment, Suprema will provide and support the BioConnect Identity Platform globally from June 1st, 2016 onward. Powerful integration featuresWith the BioConnect Identity Platform's powerful integration features and BioConnect's and Suprema's partner eco-systems, enterprises benefit from the ability to take advantage of deploying biometrics with their existing (or their choice of) access control vendor, standards, devices and way of operating. The BioConnect Identity Platform enables the seamless integration of Suprema's biometric terminals with access control systems, ERP and time and attendance systems, supporting biometric and multi-factor authentication, biometric enrollments and user ID management. One central system The solution enables greater security, identity assurance and convenience from one central system and has ultimately changed the way that the physical access control market can consume biometrics as an authentication strategy. No other manufacturer around the world has been able to offer this level and quality of integrations - with the BioConnect Identity Platform boasting over 20. "With the BioConnect Identity Platform, BioConnect complements our goal of providing industry-leading biometric security solutions to the global market. The product is a ready-made bridge solution that provides easier integration of cutting-edge Suprema biometric technology together with a customer's choice of leading access control systems," said Young Moon, VP of Suprema. "We are looking forward to providing the BioConnect Identity Platform to a more global security market and are excited to offer our customers a seamless and cost-effective way of adopting Suprema's biometric security solutions," Moon added. Innovative technologies From the perspective of the access control provider, the BioConnect Identity Platform opens up the option to provide a Suprema biometric solution and continue to benefit from the complete product line as Suprema brings new and innovative technologies to market. "As a Suprema partner we have experienced a lot of growth in the North American and UK markets due to its leadership and continued emphasis on producing biometric products of superior quality, versatility and range," said Steve Greb, Strategic Director of Business Development at BioConnect. "We're very excited to draw on Suprema's impressive partner network and continue to build out our Quest for Rightful Identity on a global scale." Integration with leading systems The BioConnect Identity Platform integrates the following leading access control systems with the Suprema biometric terminals; ACT ACTManage, AMAG Symmetry, Axis A1001, Brivo OnAir/OnSite, Genetec Security Center, IMRON IS2000, Lenel OnGuard, Open Options dnaFusion, Paxton Net2, Honeywell ProWatch, Honeywell WINPAK, RS2 AccessIT!, S2 Netbox, Software House CCURE 9000, Stanley SecureNET, Gallagher Command Centre and now PCSC LiNC-PLUS. Suprema and BioConnect will team together to showcase the BioConnect Identity Platform at IFSEC 2016 in London on June 21st-23rd at Stand E1400.
Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also likely the older stuff has a service tech scratching his head when faced with a configuration setting or data entry protocol. The newer technologies, however, may still be providing much of the desired functionality required by the legacy system user. Legacy in this context then is not necessarily a pejorative term. The system may be both reliable and performing as originally intended but is outdated in comparison to current technology offerings both from a communications standpoint and as it relates to applications and data mining. So what to do? For openers, as my dad would day, do a Ben Franklin list of do’s and don’ts. Naturally you’d love to move to a new, bigger or smaller, better and faster system. But, first, what does that list look like? I for one think is might begin to look like this: Things to do when managing legacy systems Do you have a handle on your current technology capabilities? Many legacy systems are underutilised and have features that are not used. Revisit your systems capabilities: You are likely to make some pleasant discoveries. Do you have a handle on your current technology capabilities? Many legacy systems are underutilised and have features that are not used Do you currently know how all of the pieces and parts in your system are currently communicating? A great start for planning the next steps is to understand the “plumbing.” Associated with that is the location of communication; specifically, how are things wired and where are they terminated, recorded and catalogued? What does your power distribution for the system components look like? Do you have backup and other means of maintaining operations during a loss of power, and where is that stuff? If not done recently, this step provides an opportunity to ensure you are ready for things that don’t happen and also to revisit codes. It’s always worthwhile if a maintenance provider is available to a system test in this area, or it can be self-conducted. What is the state of your record management, and when was the last time you did some basic housekeeping, such as backup and the like? If you don’t remember when you did it last, stop reading and go do some housekeeping — it’s clearly due now! What works for you and your organisation, and what have you developed a work-around for? If your “super users” have found ways to manage desired system outcomes by some clever workaround, are there other desired features? Do you have a relationship with an authorised service provider or an on-staff trained first responder? Do you have attic stock (stuff you own) to support those older components? I like to think of it like making a road trip with a spare tire and basics in the trunk in case an extended unplanned stop on the side of the road interrupts your trip. Have you developed a plan for an eventual upgrade? What’s first, what does it cost and whom will I let provide pricing to do so? Rip-and-replace isn't your only option. There are many products and servicesavailable to migrate from a legacy to next steps utilising embedded infrastructure Planning and management What are my/your basic functional requirements, and where are the gaps now you must fill for enterprise sustainability? That legacy system likely has paid its way and now needs to be retired; I’m not ready either. Do you have a business case for this refresh – applications, data mining, new and reporting and risk mitigation strategies? If not, you are missing this first step of legacy migration planning and management. Managing the age includes a system exit strategy. Getting C suite, namely your CFO’s, attention is key; sustainability of your enterprise is 101, so functionality as it relates to risk mitigation is essential to keeping your entity flourishing. So what are the DON’T’s? Don’t trivialise the migration or response to the Do’s or you’ll end up in a big To Do. Don’t minimise the relationship with existing integration resources you have worked with, old and new. Organisations evolve, some for the best, some not so. Refresh these relationships as well; resources are like bridges – you never know when a crossing is needed. Don’t rush into the latest and greatest; be wary of who’s definition you subscribe to. There’s a reason they call it the “cutting” edge. Don’t believe that rip-and-replace is your only option. There are many legacy systems in our industry, and many well-made and well-thought-out products and services are available to migrate from a legacy to next steps utilising embedded infrastructure. The bottom line: Define your parameters, select your partners and engage companies with a history of legacy migration and thought leadership. If your legacy includes some products with forward-thinking engineering thought leadership, you may be able to manage your needs with security control board-level replacements or the flashing of new firmware and upgrades to software. I‘m aware of several companies whose products elegantly move through time, adding new applications and functionality without wholesale rip-and-replace. These legacies carry on. The market has responded to you and others eager to know their options. There are many ingenious and clever ways to upgrade communications and transport of data, reliable mainstream products designed to meet this challenge head-on. There are solutions aimed at allowing you to use current IT and Internet of Things (IoT) apps and functionality. However, there are also quite a number of technology partners able help make the leap from analogue to digital using existing pathways. The bottom line: Define your parameters, select your partners and engage companies with a history of legacy migration and thought leadership. They are most likely to produce the best results and allow you to leave behind the legacy you want to be associated with.
Related white papers
11 considerations for embedded system RFID readers
RFID and smartphone readers in physical access control
3 reasons to migrate to a new access control system
Smart security cameras: excellence in retailDownload
5 reasons to integrate mobile technology into your security solutionDownload
Automatic vehicle identification: State of the industry 2020Download
- Edgeworx secures Manhattan preschool with Darcy AI thermal camera
- HID Global Seos® smart cards and FARGO® Connect help secure access to University of Connecticut student campus
- Vanderbilt installs ACT365 cloud-based access control reader at Denmark’s Vejle marina
- CLIQ® access control solution from ASSA ABLOY helps secure museums, shopping and indoor leisure sites