ACT Access Control Readers (16)
The ACT 433 from Access Control Technology (ACT) Ltd., delivers gate entry or barrier control within a new or existing access control solution. It can be integrated into the ACTpro access control solution or any 37 bit Wiegand or clock and data system. The ACT 433 range of products includes a receiver and two long range transmitters, one of which has a built in proximity. Receivers from 3rd party manufacturers, such as Prastel receivers supplied by ACT, can also be read by the ACT 433 receiver making it feasible to upgrade existing systems to the ACT 433 solution by simply changing the receiver. As the ACT 433 can be easily integrated into an existing access control system, such as ACTpro or ACTsmart2, the administration of tags, for gate entry or barrier control, becomes a much simpler, manageable and secure process than is the norm. Lost, stolen or obsolete tags can be removed from the system immediately, through the use of the ACT developed ACTWin pro or ACTSmart software. Entry will be denied to anyone trying to gain access using such a tag. Allocation of car park spaces in a shared car park can also be managed by the ACT 433 working in conjunction with the ACTWin software. User groups can be set up and a maximum number of spaces can be allocated to each group. When the spaces allocated to a group have been filled access will not be granted until a group member leaves. The ACT 433 products are not limited in terms of their functionality. As well as the popular integration of gate entry or barrier control into an existing access control system they can also be used for the activation of external lighting and the operation of motorised roller shutters, blinds or awnings. Unlike many similar products on the market the ACT 433 Receiver has an IP67 rating making it suitable for outdoor as well as indoor installation. With an attractive, polycarbonate housing it can be surface or flush mounted. The long range transmitters (ACT 433TX and ACT 433TXprox) have a read range of up to 50 metres, site dependent. With built in proximity the ACT 433TXprox can be used to gain entry at a door secured by an access control reader.Add to Compare
The ACTsmart2 1070PM is a panel mount proximity card reader / controller. It can be mounted on a single gang electrical back box using the ACT PM Flush Plate or it can be mounted into an ACTentry V-IP or suitable third party audio video door entry system. The unit will operate standalone or as part of an ACTsmart2 system (master slave or networked).FeaturesProximity reader / controller 1,000 users Standalone / master slave / networkable Programmable inputs/outputs: push to exit, door monitoring / door contact, door alarm (ajar / forced), fire alarm override, interlock Tamper output 5 amp, 30 Volt DC relay Smartlock option for added security Robust polycarbonate front plate and potted electronics Indoor / outdoor (IP67) Panel mount Mounts on standard single gang electrical back box with ACT PM Flush Plate Mounts into ACTentry V-IP and other industry standard audio video panels Can be programmed using - a programming card (standalone) - the master keypad (master slave) - ACTWin smart software (network)The ACTsmart2 range has established itself as a popular choice for access control in small to medium sized commercial properties. The ACTsmart2 also provides an ideal solution for gate entry / barrier control when used in conjunction with the ACT 433RX long-range receiver. Its popularity is driven by its power, low cost and flexibility as well as its proven quality and reliability.In addition to the ACTsmart2 1070PM the ACTsmart2 range has pin and proximity and pin only reader / controllers. These can handle up to 1,000 users (500 for pin and proximity option. The ACTsmart2 readers operate with the ACTProx RFID cards and fobs however a HID compatible version is also available.Add to Compare
Choice of mifare proximity only or pin and mifare proximity. Reader configurable as a Serial or Sector Reader. Compatible with ACTpro mifare ISO cards and Fobs. Sector reader operation configurable for non-ACT cards and fobs via programming card. Selectable Clock and Data or 37-bit Wiegand Output Built-in Buzzer. 4 Colour LED. Surface or flush mount (mounting directly on to standard electrical box). Robust Polycarbonate housing.Add to Compare
Choice of mifare proximity only or pin and mifare proximity. Reader configurable as a Serial or Sector Reader. Compatible with ACTpro mifare ISO cards and fobs. Sector reader operation configurable for non-ACT cards and fobs via programming card. Selectable clock-and-data or 37-bit wiegand output. Built-in buzzer. 4-colour LED.Add to Compare
MIFARE DESFire EV1 features mutual three pass authentication using 128 bit AES encryption. DESFire EV1 cards can hold up to 28 different applications and 32 files per application. Each MIFARE DESFire EV1 card has a unique serial number.Add to Compare
MIFARE DESFire EV1 features mutual three pass authentication using 128 bit AES encryption. DESFire EV1 cards can hold up to 28 different applications and 32 files per application. Each MIFARE DESFire EV1 card has a unique serial number.Add to Compare
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
Recently, the European Parliament called for a ban on police use of facial recognition. In the US, too, some cities have restricted police use of facial recognition. The first question that comes to mind is - why ban police from using technology that is allowed to private companies? Point of difference The key difference between the way police use facial recognition and the way commercial facial recognition products work is that: The police get a picture of a suspect from a crime scene and want to find out: "Who is the person in the picture?" That requires as wide a database as possible. Optimally - photos and identities of all the people in the world. Commercial facial recognition products such as those used by supermarkets, football stadiums, or casinos answer different questions: "Is the person in the picture on the employees' list? Is the person in the picture on a watch-list of known shoplifters?" To answer these questions doesn't require a broad database but rather a defined list of employees or a watch-list of specific people against whom there is an arrest warrant or a restraining order. Use of facial recognition AnyVision helps organisations leverage facial recognition ethically to identify known persons of interest "Facial Recognition Apps Should Be Provided to the Police with an Empty Database". This is exactly the subject of the open letter sent by AnyVision, to the British Biometrics and Surveillance Camera Commissioner, Prof. Fraser Sampson, titled: "Facial Recognition Apps Should Be Provided to the Police with an Empty Database". AnyVision recently raised $235M from Softbank and another leading VCs is a visual AI platform company that helps organisations across the globe leverage facial recognition ethically to identify known persons of interest, including shoplifters, felons, and security threats. Ethical use of facial recognition AnyVision CEO Avi Golan wrote, "The ethical use of facial recognition is a thorny one and requires a nuanced discussion. Part of that discussion has to explain how facial recognition works, but, just as important, the discussion must also involve how the technology is used by police departments and what checks and balances are built into their processes.” “We recommend building their watchlists from the ground up based on known felons, persons of interest, and missing persons. Some facial recognition solution providers have scrapped billions of photos and identities of people from social networks, usually without their consent." "Unfortunately, this method of facial recognition has justifiably angered privacy groups and data protection agencies around the globe and damaged the public trust in accuracy and reliability of facial recognition systems.” Preventing invasion of citizen’s privacy We believe an unjustified invasion of citizens' privacy can be prevented, false arrests can be reduced" “We believe that lists of suspects should be limited and justified. In this way, unjustified invasion of citizens' privacy can be prevented, false arrests can be reduced and public confidence in technology can be increased.” Golan added: "AnyVision is willing to share its industry insights and best practices from our vast research experience with leading global players, including name-brand retailers, global hospitality and entertainment companies, and law enforcement agencies from around the world.” Balancing public order and crime prevention “If the regulations set forth by Surveillance Camera Code of Practice are committed to the principles outlined above, then law enforcement agencies can strike the right balance between the need to maintain public order and prevent crime with the rights of every person to privacy and non-discrimination before the law." Recently Clearview AI CEO told Wired; the company has scraped 10 billion photos from the web - 3 times more than was previously known.
Household adoption of smart home systems currently sits at 12.1% and is set to grow to 21.4% by 2025, expanding the market from US$ 78.3 billion to US$ 135 billion, in the same period. Although closely linked to the growth of connectivity technologies, including 5G, tech-savvy consumers are also recognising the benefits of next-generation security systems, to protect and secure their domestic lives. Biometric technologies are already commonplace in our smartphones, PCs and payment cards, enhancing security without compromising convenience. Consequently, manufacturers and developers are taking note of biometric solutions, as a way of levelling-up their smart home solutions. Biometrics offer enhanced security As with any home, security starts at the front door and the first opportunity for biometrics to make a smart home genius lies within the smart lock. Why? Relying on inconvenient unsecure PINs and codes takes the ‘smart’ out of smart locks. As the number of connected systems in our homes increase, we cannot expect consumers to create, remember and use an ever-expanding list of unique passwords and PINs. Indeed, 60% of consumers feel they have too many to remember and the number can be as high as 85 for all personal and private accounts. Biometric solutions strengthen home access control Biometric solutions have a real opportunity to strengthen the security and convenience of home access control Doing this risks consumers becoming apathetic with security, as 41% of consumers admit to re-using the same password or introducing simple minor variations, increasing the risk of hacks and breaches from weak or stolen passwords. Furthermore, continually updating and refreshing passwords, and PINs is unappealing and inconvenient. Consequently, biometric solutions have a real opportunity to strengthen the security and convenience of home access control. Positives of on-device biometric storage Biometric authentication, such as fingerprint recognition uses personally identifiable information, which is stored securely on-device. By using on-device biometric storage, manufacturers are supporting the 38% of consumers, who are worried about privacy and biometrics, and potentially winning over the 17% of people, who don’t use smart home devices for this very reason. Compared to conventional security, such as passwords, PINs or even keys, which can be spoofed, stolen, forgotten or lost, biometrics is difficult to hack and near impossible to spoof. Consequently, homes secured with biometric smart locks are made safer in a significantly more seamless and convenient way for the user. Biometric smart locks Physical access in our domestic lives doesn’t end at the front door with smart locks. Biometrics has endless opportunities to ease our daily lives, replacing passwords and PINs in all devices. Biometric smart locks provide personalised access control to sensitive and hazardous areas, such as medicine cabinets, kitchen drawers, safes, kitchen appliances and bike locks. They offer effective security with a touch or glance. Multi-tenanted sites, such as apartment blocks and student halls, can also become smarter and more secure. With hundreds of people occupying the same building, maintaining high levels of security is the responsibility for every individual occupant. Biometric smart locks limit entry to authorised tenants and eliminate the impact of lost or stolen keys, and passcodes. Furthermore, there’s no need for costly lock replacements and when people leave the building permanently, their data is easily removed from the device. Authorised building access Like biometric smart locks in general, the benefits extend beyond the front door Like biometric smart locks in general, the benefits extend beyond the front door, but also throughout the entire building, such as washing rooms, mail rooms, bike rooms and community spaces, such as gyms. Different people might have different levels of access to these areas, depending on their contracts, creating an access control headache. But, by having biometric smart locks, security teams can ensure that only authorised people have access to the right combination of rooms and areas. Convenience of biometric access cards Additionally, if building owners have options. The biometric sensors can be integrated into the doors themselves, thereby allowing users to touch the sensor, to unlock the door and enter. Furthermore, the latest technology allows biometric access cards to be used. This embeds the sensor into a contactless keycard, allowing the user to place their thumb on the sensor and tap the card to unlock the door. This may be preferable in circumstances where contactless keycards are already in use and can be upgraded. Smarter and seamless security In tandem with the growth of the smart home ecosystem, biometrics has real potential to enhance our daily lives, by delivering smarter, seamless and more convenient security. Significant innovation has made biometrics access control faster, more accurate and secure. Furthermore, today’s sensors are durable and energy efficient. With the capacity for over 10 million touches and ultra-low power consumption, smart home system developers no longer have to worry about added power demands. As consumers continue to invest in their homes and explore new ways to secure and access them, biometrics offers a golden opportunity for market players, to differentiate and make smart homes even smarter.
Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organisations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing. Most organisations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue with legacy systems of any type is that risks, just like technology, evolve. What was secure, convenient, and efficient a few years ago is often found wanting as the threat landscape changes. The standards governing the development and testing of physical access control systems (PACS) have also evolved to improve security and product interoperability. An example is the Open Supervised Device Protocol (OSDP), introduced 10 years ago as an alternative to the antiquated and vulnerable Clock-and-Data and Wiegand protocols. However, when it comes to planning infrastructure upgrades or implementing new tools, businesses must carry out due diligence to ensure the solutions are future-proof and deliver the expected level of security. Vulnerabilities and challenges In the early 1980s, Clock-and-Data and Wiegand protocols were widely adopted as the de-facto standard for interoperability between access control readers and physical access controllers. Those de-facto standards were later formalised and adopted into industry standards by the Security Industry Association in the 1990s. Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities There were weaknesses, though, Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities from the reader to the controller. Not only that, but Wiegand delivers limited range options and is operationally inefficient. It is also easy to target via its learnable language and a host of hacking devices available via online sources. Furthermore, the retrofitting installation alongside a legacy system is complicated for integrators and expensive for organisations, as most readers require dedicated home-run wiring. Extensive wiring on a large-scale project, such as a school or corporate campus, results in considerable — often prohibitive — costs for the installation of a PACS. Legacy access control protocol Despite the well-publicised vulnerabilities and weaknesses, Wiegand is still one of the most common protocols in legacy access control, with estimates indicating it is used in more than 90 percent of installed systems. This not only presents issues about physical security but also raises concerns relating to the protection of personal data. Access control systems not only contain information about who can and cannot use certain doors. OSDP is a communication standard Modern systems include a wide range of personal data, ranging from qualifications and certifications of individuals, home contact details, and even medical conditions or HR and employment information. With the potential fines associated with GDPR breaches, companies need to take this concern seriously. These weaknesses pushed the security industry to adopt a new protocol: Open Supervised Device Protocol (OSDP). This access control communications standard was developed by Mercury Security (now part of HID Global) and HID Global in 2008, and donated, free of intellectual property, to the Security Industry Association (SIA) to improve interoperability among access control and security products. Since then, it has been adopted as a standard by SIA, becoming the first secure, bidirectional reader/controller protocol to be governed by a major standards body in the security industry. In 2020 OSDP reached an additional milestone in becoming an International Electrotechnical Commission (IEC) standard. Why implement OSDP as a standard? OSDP is the only protocol that is secure and open for communication between readers and controllers The growth of networked devices, such as video and access control products, has led to an increased demand for converged solutions. Businesses and organisations recognise the value of implementing an integrated solution to enhance security and add value to technology investment. OSDP is the only protocol that is secure and open for communication between readers and controllers and is also being widely adopted by industry-leading reader and controller manufacturers. It is an evolving, ‘living standard,’ making it a safer, more robust, future-proof option for governing physical access control systems. OSDP offers important benefits: 1) Increased security Implementing OSDP standards can increase security, as OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. Additionally, OSDP constantly monitors wiring to protect against tampering, removing the guesswork since the encryption and authentication are predefined. 2) Bidirectional communication Early on, communication protocols such as Wiegand were unidirectional, with external card readers sending information one way to a centralized access control platform. OSDP has transformed the ability for information to be collected, shared, and acted upon with the addition of bidirectional communication for configuration, status monitoring, tampering, and malfunction detection, and other valuable functions. In fact, OSDP is the only open, non-proprietary, bidirectional, secure protocol for communication between card reader and physical access controller. 3) Open and interoperable OSDP adds new technology that enhances its ability to protect incoming and outgoing data collection OSDP supports IP communications and point-to-point serial interfaces, enabling customers to flexibly enhance system functionality as needs change and new threats emerge. They also can proactively add new technology that enhances their ability to protect incoming and outgoing data collection through a physical access control system. 4) Reduced installation costs OSDP’s use of two wires (as compared to a potential of 11 wires with Wiegand) allows for multi-drop installation, supervised connections to indicate reader malfunctions, and scalability to connect more field devices. Daisy-chaining accommodates many readers connected to a single controller, eliminating the need to run home-run wiring for each reader, and the use of a four-conductor cable achieves up to 10x longer distances between reader and controller than Wiegand while also powering the reader and sending/receiving data. 5) User friendly OSDP gives credential holders greater ease of use, with audio and visual feedback such as coloured lights, audible beeps, and the ability to display alerts on the reader. For security administrators, managing and servicing OSDP-enabled readers also becomes increasingly convenient, as OSDP-enabled readers can be remotely configured from network-connected locations. Users can poll and query readers from a central location, eliminating the cost and time to physically visit and diagnose malfunctioning devices. Unlimited application enhancements OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers OSDP supports advanced smartcard technology applications, including PKI/FICAM and biometrics, and other enhanced authentication protocols used in applications that require Federal Information Processing Standards (FIPS) compliance and interactive terminal capabilities. Audio-visual user feedback mechanisms provide a rich, user-centric access control environment. OSDP offers advantages for users, administrators, and integrators, alike. It adds security and real-world efficiencies, and its interoperability ensures that organisations can use systems from numerous manufacturers as they invest in infrastructure that maximises the protection of critical data. For our part, HID Global’s range of HID Signo readers is OSDP verified, ensuring they offer the intended interoperability and security for secure bidirectional communication and provide an easy migration from Wiegand devices. In a campus environment, OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers if a new access control solution is implemented. There are also service and maintenance benefits as OSDP encourages continuous monitoring of system uptime and allows for remote configuration of -- or upgrades to -- a reader. Cost savings upon system upgrade Integrators can also capitalise on the introduction of OSDP by encouraging open standards, which can, in turn, help them build new customer relationships and win more projects. Although upgrading to access control systems that adhere to OSDP standards is a significant initiative, the range of benefits outweighs the cost of upgrading. Increased security coupled with business efficiencies adds value for those administering the system and a high level of interoperability ensures users can deploy systems from numerous third-party manufacturers. Integrators who understand the benefits of OSDP can also help their customers support both current and future technology requirements. When a site’s needs change, OSDP offers significant cost savings as the open functionality makes adding new devices easier and reduces the expense of requiring all readers to be replaced if a new solution is installed. Businesses and organisations transitioning to OSDP will also enhance value in terms of operational costs such as servicing and maintenance.
Xenon Fire & Security recently completed an integration between Vanderbilt’s ACT access control and KONE, a globally renowned company in the lift and escalator industry. The project was carried out on behalf of a Dublin City-based client, in one of their flagship properties - a 7-storey, multi-tenancy office blocks, located in the heart of the city quays in Dublin, Ireland. The building includes 6 upper floors and a basement area. The reason behind the integration was to attain greater efficiency in accommodating the large footfall in the office building, during peak times. This included reducing waiting times at lifts. ACT access control - KONE integration As Xenon Fire & Security had previously carried out this same integration work between both ACT and KONE in another building, located in Dublin city, they were more than confident that ACT would perfectly meet the client's standards and expectations. The installation and integration of ACT and KONE is much more straightforward The installation and integration of ACT and KONE is much more straightforward. Unlike with a traditional hardwired elevator control, there is no cabling required, as the ACT software talks directly to the KONE server, via the KONE API. Integration offers multiple benefits Commenting on the project, Dermot Ryan, the Contracts Manager at Xenon Fire & Security, said “The system works as intended. It makes access and egress of the building more user friendly and reduces congestion, and queues. Vanderbilt was there to help and advice at all times, throughout the installation process.” Michael Moyna is the Senior Product Manager at Vanderbilt and is responsible for the development of ACTpro. He said, “The ACTpro integration with KONE has many benefits, such as efficient transportation of people to their destination, especially during peak times. Rules can be customised to individual needs, for example, janitor may require a large elevator car.” No cabling required in installation Michael Moyna adds, “Installation and integration of KONE and ACTpro is now much more straightforward, because there is no cabling required, as with traditional hardwired elevator control, since the ACTpro software talks directly to the KONE server, via the KONE API.”
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. Harba booking system There are 750 members with boats in the Vejle marina, and through the Harba booking system; they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed every month via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Access control readers ACT365 has a modern and user-friendly design and a limitless number of users ACT365’s readers were well-suited to this installation because they are made of a robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage-free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. Self-service terminal For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit cards to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in order to discuss interoperability, share industry trends and explore the future of digitalisation and intelligence together. “We are excited to host our second virtual technology partner day. Technologies have evolved fast in the past year and the needs of digitisation, and diversified challenges facing different industries today, are driving the integration of security companies,” said Mr. Jiaqi Gao, Overseas Marketing Director at Dahua Technology. Jiaqi Gao adds, “It is a great opportunity to show how we can build a digital future together with our partners and through which, we can jointly provide the right solution for our customers.” Smart solutions for IoT and security on show A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs During the 2-day event, Dahua Technology and its partners, including Vanderbilt, AxxonSoft, Immix and Optex, will unveil how their smart solutions benefit the field of security and IoT (Internet of Things). It will focus on Artificial Intelligence (AI), cloud solutions and alarm monitoring, as well as specific vertical markets, such as retail, smart building & facilities, critical infrastructure, transportation, etc. This year’s event will also include a section that demonstrates outstanding Dahua products and their compatibility with third-party solutions. A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs, including cyber security & privacy protection, full-colour 2.0 and TiOC 2.0, WizMind portfolio, and more. Attendees can register free of charge, connect with presenters and get product information. Behaviour analytics in Artificial Intelligence (AI) “The Dahua Partner Day event offers a great platform for AxxonSoft, to present our solutions. We successfully exhibited on last year’s Traffic & Parking session and are excited to share more information about behaviour analytics in the AI hub, this year,” said Alan Ataev, AxxonSoft’s Chief Executive Officer (CEO), adding “Together with Dahua, we are enthusiastic about creating joint solutions that grow our value proposition for both our partners and clients.” With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’, so as to serve its partners and customers around the world.
Related white papers
Top 5 ways to ensure visitor safety and security
Moving to mobile: A guide for businesses switching to mobile access control
School security moves to the cloud
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download
- Anviz integrates FaceDeep 3 and fingerprint P7 access solution with Canon printer
- Adani Group manages contractors and workers, across multiple sites, with Matrix’s range of COSEC solutions
- G4S secures Aalborg University’s buildings in Denmark in one of Europe’s largest access control systems implementation project
- Triton master key system from ASSA ABLOY helps transform access management at Bath NHS Trust