ACT Access Control Readers(16)
The ACT 433 from Access Control Technology (ACT) Ltd., delivers gate entry or barrier control within a new or existing access control solution. It can be integrated into the ACTpro access control solution or any 37 bit Wiegand or clock and data system. The ACT 433 range of products includes a receiver and two long range transmitters, one of which has a built in proximity. Receivers from 3rd party manufacturers, such as Prastel receivers supplied by ACT, can also be read by the ACT 433 receiver making it feasible to upgrade existing systems to the ACT 433 solution by simply changing the receiver. As the ACT 433 can be easily integrated into an existing access control system, such as ACTpro or ACTsmart2, the administration of tags, for gate entry or barrier control, becomes a much simpler, manageable and secure process than is the norm. Lost, stolen or obsolete tags can be removed from the system immediately, through the use of the ACT developed ACTWin pro or ACTSmart software. Entry will be denied to anyone trying to gain access using such a tag. Allocation of car park spaces in a shared car park can also be managed by the ACT 433 working in conjunction with the ACTWin software. User groups can be set up and a maximum number of spaces can be allocated to each group. When the spaces allocated to a group have been filled access will not be granted until a group member leaves. The ACT 433 products are not limited in terms of their functionality. As well as the popular integration of gate entry or barrier control into an existing access control system they can also be used for the activation of external lighting and the operation of motorised roller shutters, blinds or awnings. Unlike many similar products on the market the ACT 433 Receiver has an IP67 rating making it suitable for outdoor as well as indoor installation. With an attractive, polycarbonate housing it can be surface or flush mounted. The long range transmitters (ACT 433TX and ACT 433TXprox) have a read range of up to 50 metres, site dependent. With built in proximity the ACT 433TXprox can be used to gain entry at a door secured by an access control reader.Add to Compare
The ACTsmart2 1070PM is a panel mount proximity card reader / controller. It can be mounted on a single gang electrical back box using the ACT PM Flush Plate or it can be mounted into an ACTentry V-IP or suitable third party audio video door entry system. The unit will operate standalone or as part of an ACTsmart2 system (master slave or networked).FeaturesProximity reader / controller 1,000 users Standalone / master slave / networkable Programmable inputs/outputs: push to exit, door monitoring / door contact, door alarm (ajar / forced), fire alarm override, interlock Tamper output 5 amp, 30 Volt DC relay Smartlock option for added security Robust polycarbonate front plate and potted electronics Indoor / outdoor (IP67) Panel mount Mounts on standard single gang electrical back box with ACT PM Flush Plate Mounts into ACTentry V-IP and other industry standard audio video panels Can be programmed using - a programming card (standalone) - the master keypad (master slave) - ACTWin smart software (network)The ACTsmart2 range has established itself as a popular choice for access control in small to medium sized commercial properties. The ACTsmart2 also provides an ideal solution for gate entry / barrier control when used in conjunction with the ACT 433RX long-range receiver. Its popularity is driven by its power, low cost and flexibility as well as its proven quality and reliability.In addition to the ACTsmart2 1070PM the ACTsmart2 range has pin and proximity and pin only reader / controllers. These can handle up to 1,000 users (500 for pin and proximity option. The ACTsmart2 readers operate with the ACTProx RFID cards and fobs however a HID compatible version is also available.Add to Compare
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Vanderbilt, globally renowned provider of state-of-the-art security systems, has announced the addition of three ZKTeco biometric readers into its access control portfolio. ZKTeco biometric readers The latest addition to the ever-growing access control portfolio comes off the back of the launch of the company’s Bluetooth Low Energy (BLE) readers, plus the inclusion of Akuvox’s IP Door Entry Phones into their collection of products. As with the BLE readers, the biometric readers integrate with Vanderbilt’s access control ACT Enterprise software, version 2.10 or later. The ZKTeco biometric readers that now integrate with Vanderbilt’s ACT Enterprise are the MA300, the SF420, and theSLK20R. These readers are renowned for their fast and accurate fingerprint algorithm, easy installation and connectivity, and smooth operation and management. Advanced ZK fingerprint algorithm The MA300 offers unparalleled performances by adopting an advanced ZK fingerprint algorithm" Speaking on the MA300 fingerprint reader, Paul McCarthy, Product Manager at Vanderbilt, explains, “The MA300 offers unparalleled performances by adopting an advanced ZK fingerprint algorithm for reliability, precision, and excellent matching speed. It comes in a metallic casing and is IP65 rated. This means it is resistant to water, dust, and other outside damages. As such, this makes the MA300 ideal for both internal and external mounting scenarios.” Turning to the SF420, McCarthy states that “the SF420 brings the flexibility to be installed as a standalone or with any third-party panels that support 26-bit Wiegand.” SF420 and MA300 user recognition readers He adds, “Both the SF420 and MA300,” McCarthy continues, “Possess one-touch-a-second user recognition and can store 1,500 templates. But while the SF420 can host 5,000 cards and 80,000 transactions, the MA300 can take on an additional 5,000 cards more, and 20,000 additional transactions.” Adding further weight to the advantages of the MA300, it also contains full access control features with anti-passback, an access control interface for third-party electric locks, a door sensor, an exit button, an alarm, and a doorbell. Moreover, it works with ACT Mifare Classic cards. The SF420 also works with ACT Mifare Classic cards, but only UID versions. ACT Enterprise software The final addition to the portfolio is the SLK20R. For the MA300 and the SF420 to work with ACT Enterprise software, one enrollment reader, the SLK20R, is required. The SLK20R primarily operates by capturing the fingerprint template into the ACT Enterprise software, and then the template is distributed to the readers on a network via IP. These new biometric readers can be enrolled by an administrator card when the device works in standalone mode. TCP/IP and RS485 are available so that the devices can be connected quickly and conveniently. A license is also required to work with ACT Enterprise. ACTE-Bio licenses are sold as a per door license.
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasising systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
ACRE companies Vanderbilt, ComNet and Open Options are gearing up toward an exciting Intersec show that will highlight the collective experience and depth of solutions available from the ACRE portfolio. Key features on display will focus on the ACRE brand’s strength in cloud solutions, open platforms, smart integrations and cybersecurity. Core to this message will be the award-winning cloud-based solutions, SPC Connect and ACT365. ACT365 is Vanderbilt's platform for access control and video management. SPC Connect is a hosted cloud-based solution designed specifically for installers to monitor, manage and maintain SPC panels remotely from any location. Cybersecurity Protection Both these solutions have won a wealth of trophies between them such as Benchmark Innovation, GIT Security, PSI Premier and Detektor International awards. Designed to excel in several sectors, both have earned stripes and praise for excellence in banking and retail in particular. Vanderbilt SPC intrusion system is also known for its cybersecurity protections The Vanderbilt SPC intrusion system is also known for its cybersecurity protections and the bespoke communication platform, FlexC, that was built from the ground up with cybersecurity in mind. Open access control platforms ACT Enterprise and SiPass integrated (a product made by Siemens AG) will also be available for demonstrations. Both access control platforms are renowned for their integrations. ACT Enterprise integrates with Vanderbilt’s SPC, as well as world-renowned brands like Milestone, Hikvision and KONE to name a few. Most recently, Bluetooth Low Energy readers and Biometric fingerprint readers have been released by Vanderbilt in conjunction with ACT Enterprise 2.10. User-centric SiPass Integration SiPass integrated, a powerful open access control management software, scales from small to large, complex deployments. The user-centric design of SiPass delivers ease of operation and maintenance, with self-explanatory and straightforward menu structures and buttons. Another striking feature is its ability to replace traditional keycards with Android and iOS mobile devices, or wearables like Apple Watch and Android Wear. This feature addresses the game-changing shift toward smartphone technology. ComNet will also highlight their specialty in the transmission and networking aspect of data, video and audio, and their solutions’ ability to work seamlessly across any of the three standard communications media, as well as in multiple network architectures. All ComNet products come with a lifetime warranty and “Made in the USA” quality, making ComNet an excellent choice for all single-source solutions for any transmission product needs. DNA Fusion access control software DNA Fusion, seamlessly connects with security technologies — including video, biometrics Open Options will join their ACRE sister-companies, making their debut at Intersec, to showcase their powerful DNA Fusion access control software, as well as their Mercury-based hardware. In addition, Open Options plans to highlight exciting integrations, such as video management software from Milestone, XProtect. Open Options has been a pioneer in the open platform community focused on helping customers improve security by building trust through the most connected experience. Today, the company continues to be a provider of innovative access control solutions with the experienced, highly qualified service and support teams in the industry, providing access that connects. Open Options’ flagship access control platform, DNA Fusion, seamlessly connects with security technologies — including video, biometrics, wireless locks and more — to provide customers with a best-in-class security solution. Intersec Dubai takes place January 19-21, 2020. One can visit the ACRE companies at StandS1 C19.
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
- HID DigitalPersona fingerprint biometric solution added to BigWise Stellar POS for greater security
- Armor At Hand partners with AASA and use Smart Shield to boost school safety nationwide
- WorldReach employs Cognitec’s technology to enable ID document applications with smartphones
- Matrix provides time-attendance and access control solution at Al-Khodari Sons Company