Browse Access Control Softwares

Access control software - Expert commentary

4 smart ways to use security to power the business of the future
4 smart ways to use security to power the business of the future

In the new era of work, our relationship with the workplace is defined by flexibility and mobility. Employees are working across the home, office, and blended spaces more than ever before, as well as working varied hours to suit the modern work schedule.  This new hybrid workforce model holds the potential for more diverse talent and better productivity, but it also comes with its challenges – one being how to ensure security, health, and safety in the workplace.  Strong and smart security ecosystem While nearly one-third of companies report that they’ve implemented a hybrid model, according to a recent survey by STANLEY Security, many still have much to do to prepare their office for the future.  Building a strong – and smart – security ecosystem is crucial in preparing for the future. As such, businesses should consider technologies that help protect their people, as well as safeguard their assets, optimise their operations, and secure their network. 1)Protect your people  Implementation of a security ecosystem combines health, safety, and security hardware and software solutions seamlessly Nearly 60% of mid-market and enterprise businesses across the UK and US report that the health and safety of their employees and customers are a primary concern when implementing modern and hybrid working models.  This begs the question: How can businesses create a safe and healthy work environment when 59% are planning to bring employees back on-site in some capacity within the next 18 months? The answer lies, in part, in the implementation of a security ecosystem that combines various health, safety, and security hardware and software solutions seamlessly. Integrating platform Nearly half (46%) of business decision-makers say they are interested in adopting an integrated platform such as this. This means integrating traditional and digital security solutions, then leveraging the data and insights they produce to further enhance the workplace experience. Take this example:  With employees and visitors moving in and out of the office at different times, a business may lack oversight of occupancy or density levels, people flow, workspace scheduling, visitor check-in processes, and more. However, with visitor management, access control, and other building/business systems integrated, employees can reserve a workspace for a specific date and time and be granted access to the building. Leveraging AI and machine learning Visitors can pre-register, answer a health screening questionnaire, and receive a mobile credential before arriving. Once the visitor arrives on-site, the system can alert the respective department – all without the close contact typically required for traditional visitor check-in processes. When layering artificial intelligence and machine learning on top of the data, a business may identify trends in people flow and opportunities to optimise congested areas. They may also see that certain rooms within the building get more use than others and leverage these insights to manage their space more effectively.  All of this is powered by a security ecosystem that can help a business better protect its people while realising other benefits in the process. 2) Safeguard your assets Businesses are concerned about the security of their assets when it comes to the hybrid workforce model Even more, businesses are concerned about the security of their assets when it comes to the hybrid workforce model. About 72% of leaders say this is, in fact, their primary concern with the hybrid approach.  This figure isn’t surprising when you consider the impact of the pandemic, which left many businesses closed either temporarily or permanently, with few people allowed on-site to manage facility operations.  As a result of the pandemic, we saw tech adoption accelerate at an astonishing rate – simply because businesses had to implement cloud and remote technologies to survive during a time when buildings were closed indefinitely.  Remote management and visibility This was particularly true for security solutions, such as cloud video surveillance and cloud access control solutions like wireless IoT-connected locks. Nine out of 10 businesses (91%) report that they have already implemented cloud security technology; of those, nearly half (48%) stated that this was due to the pandemic. These technologies allow for remote management and provide visibility into business operations at the same time. In a retail setting, for example, cloud video surveillance allows businesses to identify and track not only criminal activity, but also foot traffic patterns, peak operating hours, staff shortages, and more.  Loss prevention strategy When integrated with the retailer’s point-of-sale (POS) system, businesses can gain greater insights into their traffic counts, end cap effectiveness, loyalty card activity, and a variety of POS exceptions, such as high-dollar transactions, repeated transactions, excessive returns, employee discounts, and more. For retailers especially, a security ecosystem means a more efficient loss prevention strategy that helps safeguard assets and profits. 3) Optimise your operations The “future of work” is still very much a work in progress, but one thing is clear: Businesses are looking for ways to increase efficiencies, drive cost savings, and, ultimately, optimise their operations – especially now with the challenges posed by price inflation. A relatively untapped opportunity for businesses to achieve these goals lies within their security infrastructure. Security technology and solutions gather incredibly rich data which, when unlocked, can help businesses understand how their buildings are being used, when the busiest times are, where there are highly trafficked areas, and more.  Leveraging cloud video surveillance systems, businesses could identify emerging staff training needs Cloud video surveillance systems For example, by leveraging the insights produced by cloud video surveillance systems, businesses could identify emerging staff training needs, which could ultimately result in improved employee satisfaction and reduced attrition. However, much of this data sits untouched within the infrastructure, leaving businesses unaware of the opportunities in front of them. 44% of businesses that currently use a cloud security system for its primary use say they want to know how else this technology can be utilised, and an additional 20% aren’t even aware that it could be used in other ways. AI and analytics The interest in adoption is promising for the office of the future, especially when we see that the majority of businesses (78%) would consider using AI and analytics technologies to optimise their operations, helping their business to operate more effectively and efficiently.  The increase in adoption of cloud technology – paired with the rise in interest in AI, machine learning, and advanced analytics – could make it possible for businesses to uncover invaluable insights from their security infrastructure and leverage them to adapt and build business resilience. 4) Secure your network Advanced technology help businesses improve their cybersecurity, making it harder for hackers to gain entry With cyber threats becoming more prevalent, businesses are increasingly looking to secure their networks and protect their data. More than half (54%) of those surveyed expressed interest in using AI, machine learning, and advanced analytics to secure their network by identifying and eliminating cybersecurity threats.  Advanced and automated technology can help businesses improve their cybersecurity, making it harder for hackers to gain entry to the larger corporate network. Modern cybersecurity tools that use AI and machine learning can detect anomalies in network traffic or alert and act on suspicious behaviour.   Cybersecurity software For example, if an IoT device suddenly begins broadcasting and establishing connections with multiple devices, cybersecurity software could detect this abnormal behaviour, send an alert, and suspend traffic or quarantine an endpoint immediately – saving precious time during a potential breach.  A single data breach could result in widespread distrust from workers and customers, potentially leading to decreased business as well as litigation issues. As such, businesses need to take action to update and strengthen their defences so that they can avoid downtime and continue to operate with peace of mind.  Prepare your business for the future Businesses will continue to look for more ways to extract value out of their existing infrastructure, including their security technology. For many, the tools to do so are already in place, it’s just a matter of unlocking the insights with a security ecosystem.  With such an ecosystem – one that helps protect a business’ people, assets, and network, while optimising operations – companies can better safeguard the future of their workspaces and usher in the new era of work with confidence. 

Fix up look sharp
Fix up look sharp

Metal theft is nothing new, but the impact of the pandemic has left many in financial uncertainty, couple this with the rising price of metal, and one result is an increase in the level of acquisitive crime. It seems there is no limit to the types of materials stolen. Just recently, lead stolen from church roofs has caught the media’s attention again, but this type of theft reaches to more commonplace materials too, including steel, cast iron, and aluminium, and even items like street signs and fencing panels. As such, publically accessible infrastructure could be left vulnerable if measures aren’t taken to properly protect them. Perimeter fencing solution Begin this process by thoroughly checking and assessing the perimeter fencing of the site. Here, you’re looking for any signs of tampering or wear and tear, and checking if the fencing is still robust. If the fixings in fencing systems can be removed easily, the entire perimeter fencing solution risks being compromised with little effort. Both the fixings themselves, and the metal fence panels they secure can be targets for theft, and if stolen would significantly reduce the security on and around the site. The connectors, fittings, and fixings are arguably the most integral part of any security fencing installation The connectors, fittings, and fixings are arguably the most integral part of any security fencing installation. They’re responsible for holding the fencing and gates together and keeping them in place. Remember, fencing solutions will only be as robust as the components used to hold them together, if these have inherent flaws, the fencing and gates in question will be more vulnerable to attack. Equal level of protection This is because poor quality fixings can often be easily broken or removed by their design or placement, so it’s best to steer clear. Further, while fencing labelled as ‘quick and easy installation’ may sound cost effective, if it takes no time to install, it’s likely it will also be quick to take down, defeating the purpose of perimeter fencing. There’s a multitude of varying types of fixings available on the market, and it’s important to remember that not all fencing and gates provide an equal level of protection. Below we take a closer look at fixings that should be avoided where possible. Standard head screws Standard head screws and bolts. This can be extended to anything that looks like it can be easily removed with a screwdriver or drill. Security Torx or ‘Star’ screws. These were once an effective tamper-proof fixing, however, in more recent times the driver bits have become more readily available in most DIY toolkits, and as such these fixings are now far from secure. Installing screws on the outside of the fence line. Leaving the fixings accessible from the outside of the fence ultimately means you’re exposing them to anyone and everyone, authorised or not. This enables them to attempt to remove the fixings without the added deterrent of having to climb the fence and risking being caught. Low quality fixings. All fixings should be galvanised or stainless steel to ensure they don’t rust away. Tamper-proof fixings Vertical bar fencing and metal railings have concealed bolts and screws So now we know what not to specify, let’s take this one step further and discuss some of the most effective design components found in fencing systems. Look for security fencing with ‘tamper-proof fixings’. We believe this is so essential, that all Jacksons metal fencing is produced using these in one form or another. Vertical bar fencing and metal railings have concealed bolts and screws, while the welded mesh panels have tamper-proof screws with unique heads that can’t be loosened or fastened with normal tools. Be wary when specifying fencing types such as steel palisade fencing; not only does this type of fencing hinder surveillance and provide an unattractive aesthetic, but the bolts and rivets are also very easily accessible meaning it isn’t very secure. Twin wire panels V mesh and twin wire panels can be attached to posts in different ways. Most commonly this will be via the use of clips. These vary in the level of security they provide, for example, generic mesh clips secured with generic Torx screws can be easily removed using a standard toolkit. However, there are other products on the market which make use of anti-vandal connectors and tamper-proof fixings. Once tightened, the hexagonal part of the nut breaks off, leaving a smooth dome These fixings can only be accessed from the secure side of the fence, significantly improving the level of security. Shear nuts are arguably one of the most secure fixings which should ideally be used on gate hinges. They are a type of breakaway nut which are almost impossible to remove once installed. Once tightened, the hexagonal part of the nut breaks off, leaving a smooth dome that is hard to grip with normal tools. Knit mesh fencing With tightly knit mesh fencing such as 358 mesh, panels can be fixed to the posts in different ways, but again not all ways are secure. Some manufacturers use smaller clips and screws/bolts, however, the clips are susceptible to damage – being so small, and it also leaves the edge of the panels exposed to tools that could prise the panel away from the posts. Close-knit mesh panels with clamp bars and tamper proof bolts are highly secure. Concealed panel to post connectors and tamper proof bolts help to further enhance the security of the fencing, these are commonly used in vertical bar and metal railings. Highly secure finish Here rails are sleeved onto the pales and welded for a seamless, highly secure finish. There are no bolts or rivets that could be removed to enable swing pales to be set aside and gain access. The role that fixings and connectors play is absolutely crucial to the level of security of the perimeter fencing. This article touches on the myriad of different options available on the market, but if in doubt, don’t hesitate to consult an expert on what type of components should be used when specifying fencing and gate solutions for your specific project.

Why face recognition as a credential is the ideal choice for access control?
Why face recognition as a credential is the ideal choice for access control?

In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

Latest EVVA news

EVVA to showcase mechanical and electronic locking solutions at international event in Vienna, Austria
EVVA to showcase mechanical and electronic locking solutions at international event in Vienna, Austria

Under the headline “Start-up since 1919”, EVVA presented the company to journalists from eight countries at a two-day international media event from 13 to 14 November 2019. True to EVVA's innovative spirit, the event started with a start-up tour of Vienna. On the second day, the media representatives were able to participate in an exclusive press conference and tour of the Wienerberg facility where they were given personal insights into the site and a current outlook on future challenges and new opportunities - keyword ‘digitalisation’. In the conference, Stefan Ehrlich-Adám, CEO of the EVVA Group, Michael Kiel, Group Division Executive of Operations and Johann Notbauer, Group Division Executive of Market Innovation and Technology reported on the most important milestones since EVVA was founded 100 years ago. In addition to this, they presented upcoming product and manufacturing innovations and gave an outlook on the future of security technology. Mechanical locking systems Having witnessed constant innovation since its foundation in 1919, the internationally renowned and recognised supplier of high-quality security systems has been successfully combining tradition with innovation for 100 years, making it one of the world’s leading manufacturers of mechanical and electronic locking systems. Stefan Ehrlich-Adám, CEO of the EVVA Group, gave an outline of the company, “Since the company was founded as the ‘Invention, Experimentation and Application Institute’, it has been defined by courageous and forward-looking entrepreneurship and the pursuit of innovation”. EVVA's innovative strength is visible in the invention and patenting of the GPI and MCS mechanical systems A successful example of EVVA's innovative strength - and at the same time an important milestone in the company's expansion - was the invention and patenting of the GPI and MCS mechanical systems, which are still important today, four decades ago. But the permanent further development also continues for the mechanical locking systems. “As patents expire after 20 years, we need to continually develop mechanical locking systems and come up with new ideas.” EHRLICH-ADÁM explains. Electronic locking systems The cultivation with in-house electronic locking systems division on the European market demonstrates EVVA's pioneering spirit. In the 1970s, the Viennese family-owned company EVVA was considered to be the world’s first company in the industry to use computer programs to calculate and control the most complex master key systems. Meanwhile, Xesar and AirKey are well-established on the market and they are a unique solution for the challenges of global megatrends in the security industry. “We had a head start with our in-house development when electronic locking systems were introduced about 25 years ago. And from the very beginning, we had important expertise in the area of mechanical locking systems and to this day we are constantly striving to complement this as well as possible with electronic access control systems. The combination of mechanical locking systems and electronic access control systems is the technically sensible response to the specific security and organisational needs”, said Ehrlich-Adám. In-house research and development We aspire to invent and develop durable, very high-quality products in-house; therefore we have an in-house research and development department, which has grown substantially in recent years. “The engineering is done by us and we decide on the product concept. We know the market, the customers and know which solutions the operators expect”, explained Ehrlich-Adám. EVVA employs around 460 people at the main production facility in Vienna and has rapidly increased its workforce, particularly in the area of electronic systems and software, coupled with ongoing investments in machinery. For EVVA, the transition from mechanical systems to mechatronic systems ultimately means an increased need for technicians and software engineers. “Going forward, we will also invest in staff who are able to assist with installations”, Ehrlich-Adám explained. In addition to securing and creating jobs, the Viennese family-owned company is also pursuing a targeted CSR strategy at the site, which is being implemented through the Clean Production Approach. The proportion of clean production is currently at 60%. EVVA locking systems EVVA locking systems have been installed throughout the world, for instance, on the Queen Mary ocean liner In addition to the main site in Vienna, there are now a total of ten subsidiaries throughout Europe and a network of already over 1,000 electronic and other mechanical locking system sales partners. These are an important factor in our further expansion and international success. Interesting target markets include Southeast Asia and Australia. EVVA locking systems have been installed throughout the world, for instance, on the Queen Mary ocean liner, in Copenhagen's opera theatre, the new Juventus Stadium in Turin, as well as St. Stephen's Cathedral in Vienna. “Our well-developed sales network is one of our greatest strengths. Our core competencies include the project planning, calculation and realisation of large systems,“ Ehrlich-Adám said. Industry 4.0 and excellence In the second part of the conference, Michael Kiel, Head of Operations, outlined EVVA's status and its plans in the area of Industry 4.0. “EVVA does not see Industry 4.0 as just digitalisation, but also a variety of opportunities for its own development of excellence. We have defined four development focus areas for our claim to excellence associated with Industry 4.0: Digitalisation; Automation, Site development Collaborations. Our highest priority has always been, and will continue to be, to bring “the people” with us, through the relevant qualification measures and participation in projects”, Kiel explained. Digitalisation A flagship tool for ‘lived digitalisation’ is EVVA’s Order Fulfillment Tool, which was developed in-house. It provides order support by showing the current status of orders. With the Next Generation Cross Link Production (Xpro) project, EVVA is pursuing several goals: On the one hand, the goal is to create a blueprint for a flexible manufacturing system. To achieve this, in collaboration with TU Vienna, EVVA ‘digitally upgraded’ a machine, adding collaborative robotics to it. On the other hand, we are also accelerating digitalisation in the sense of going “paperless” with drawingless Computer Aided Manufacturing (CAM), which is already in use as a prototype. Automation For EVVA, the mid-term goal is to use ‘digital twins’ to create fully digital models of production to plan and optimise processesFor EVVA, the mid-term goal is ultimately to use ‘digital twins’ to create fully digital models of production to plan and optimise processes and procedures. To achieve this, a digital production plan with simulation and optimisation will be implemented by 2020, as part of the AutProSim research project with the Fraunhofer Institute.  “By 2023, EVVA will invest a volume of 20 million euros in shaping the development of excellence, of which two thirds will be spent on high-quality automation solutions”, Kiel explained, adding “We will particularly drive forward new technologies for 3D printing of plastic parts for machine construction and image processing for testing scenarios that are integration into the automation line.” Collaborative robots But EVVA is also increasingly using collaborative robots (cobots) to support employees in simple, monotonous tasks, such as sorting. “Using automation, we can bring certain tasks and consequently orders from low-wage countries back to the Wienerberg facility. Apart from reducing errors and raising the qualification level, cobots will allow EVVA to increase its competitiveness”, Group Division Executive Michael Kiel explained. On the topic of site development, Kiel explained why Industry 4.0 is connected to internationalisation. “As part of our Powerplant Strategy with satellite sites, in the future the three sites of Vienna, Tišnov and Krefeld will become a Powerplant, meaning that they will be production units for the manufacturing of components and automated assembly. In turn, the satellite sites will consist of eight Europe-wide distribution sites for manual assembly of smaller production batches.” By 2023, EVVA plans to have established all Powerplants and satellite sites as a unified process chain. Collaborations EVVA is a co-partner of the Austrian Center for Digital Production on research of end-to-end digitalisation Finally, Kiel outlined the various research collaborations as the fourth development focus area on the path to excellence. For instance, we have worked together with TU Vienna on feasibility studies on the possible ways in which cobots can be used or machine-to-machine communication solutions in production. EVVA and the Fraunhofer Institute are The University of Vienna, in turn, is supporting EVVA in the development and expansion of the centurio.work production platform. Furthermore, EVVA is a co-partner of the Austrian Center for Digital Production (CDP), where, among other things, we are researching end-to-end digitalisation from order placement through to production and delivery. A look into the future “For EVVA, however, the aim of excellence development is not just about continuous development, but about regularly determining our position. For example, next year, EVVA will face the industry benchmark, “Fabrik 2020 – die beste Produktion Österreichs” (Factory 2020 – Austria’s best production),” Kiel concluded. Finally, Johann Notbauer, Group Division Executive of Market Innovation and Technology reported on trends and developments, also based on recent impressions in Silicon Valley at ARM and Microsoft. In his view, the possible scenarios are based on two future technologies: 1. Artificial intelligence (AI) and machine learning, linked to 2. Connectivity. Both topics are also linked to the disruptive changes for the security technology sector. Machine learning According to Notbauer, machine learning will be disruptive, as machines in the future will be “intelligent” – and therefore the processing and evaluation of the continually calculated data will be done by the machines themselves. Various other possible applications arise from linking digital data with physical data. Digital data is generated through the various touchpoints; physical data refers to diverse sensory data. In the future, we will be able to gain an even greater understanding of how end components and entire systems are used by combining these different forms of data in a targeted way. Intelligent systems The calculated algorithm would be able to recognise when and for which component a battery failure will occur" Notbauer described an application example “For instance, for a Xesar system it will be possible in the future for all ‘intelligent’ components to continually measure their own voltage curve and this data could then be centrally evaluated in a ‘neural’ network.” “The calculated algorithm would be able to recognise when and for which component a battery failure will occur. In turn, this optimises the sustainability and maintenance costs of the system and gives the sales department valuable information for a required modernisation of the whole system. The added value and benefit for the customer consists is in “predictive maintenance”, i.e. failure-free operation linked to cost-optimised maintenance”, explained Notbauer. Connectivity The second biggest driver of innovation is connectivity, as a result of the many new opportunities that the game changing 5G has opened up. “5G makes it possible for us to connect production machines directly to the cloud. There is no longer any need for a local programmable logic controller, which is time-consuming to program. This takes place in a central cloud – quickly set up and quickly changed if products or the market demand changes,” explained Notbauer. This trend is called ‘access as a service’. However, despite machine learning and 5G - EVVA will continue to drive forward innovations in mechanical locking systems, in addition to the benefits of new Technologies as there is still a mechanical element at the end of the chain.

Telenot and Securiton among other market providers have confirmed participation in Security Essen 2020
Telenot and Securiton among other market providers have confirmed participation in Security Essen 2020

Security Essen is continuing to consolidate its position as a platform for the security industry. Numerous companies have confirmed their participation in the leading international trade fair, which will take place at Messe Essen from 22 to 25 September 2020. Particularly pleasing: In addition to many long-standing customers, the registrations also include companies which will take part in Security Essen again for the first time after a break. Amongst others, Telenot and Securiton will present their innovations at Messe Essen. "We are delighted about the exhibitors' commitment to Security Essen," says Oliver P. Kuhrt, CEO of Messe Essen. "This emphasizes the significance of Security Essen as an important platform for the security industry". Innovations in burglar alarm technology The application specialist for everything to do with alarm and security systems will present its innovations Thomas Taferner, Head of Marketing and Sales at Telenot Electronic, justifies the return to Security Essen as follows: "We are delighted to be on board again at Security Essen 2020. In the past three years, we have increasingly tested smaller events. But Security Essen has proved to be the only all-encompassing trade fair for us where the entire industry from the installing specialist company to security officers from industry, planning offices, trade associations, building property insurers, CID advisory centers, fire departments and many other target groups obtains information. “The trade fair is particularly interesting for us in 2020, because Telenot will present extensive innovations and will greatly expand its spectrum. In addition to burglar alarm technology, we now also have fire alarm technology in our portfolio and, from 2020, access control technology, too." Also after a break, Securiton Deutschland will take part in Security Essen again. The application specialist for everything to do with alarm and security systems will present its innovations in Hall 3 - the exhibition area for access, mechatronics, mechanics, systems and perimeter protection. Locking technology and electronic access systems The two North Rhine-Westphalian companies Dom and Wilka have been continuous exhibitors at Security Essen for many years already. Moreover, they have already registered again for Security Essen 2020. Dom Sicherheitstechnik GmbH & Co. KG, headquartered in Brühl, is a manufacturer of innovative locking technology and electronic access systems. Wilka Schließtechnik GmbH is at home in the key Velbert region. Robert Schlieper, Managing Partner, Wilka: "In our industry, the focus is naturally on the security topic. For more than 150 years, Wilka has represented high quality standards in an area where it really matters that the product delivers what it promises. We are always looking forward to the interesting discussions on our stand""At Security, we have shown our (potential) customers exactly that for years already - patented mechanical cylinders, locks and locking systems for a wide range of requirements and the innovations from the field of electronics. And of course, we are always looking forward to the interesting discussions on our stand, because personal contact is rarely as easy to establish as it is there". Participation in Security Essen 2020 Many other companies - including market leaders, niche providers and new entrants - have also already confirmed their participation in Security Essen 2020. From Germany, these include Abus August Bremmicker Söhne, EVVA Sicherheitstechnik, Kötter Security, lunaHD, NSC Sicherheitstechnik, Salto Systems, T-Systems International, Videor E. Hartig and the Wagner Group. The trade fair will be a premiere, for example, for the Bosch start-up SAST. The young company will present its Internet of Things platform for security cameras for the first time at the trade fair. Security Essen is also seeded for international stars: Hanwha Techwin Europe, Hikvision, Inim Electronics, Vanderbilt International, Zhejiang Dahua and Zhejiang Uniview, among others, have confirmed their participation in the world's leading trade fair. Open, functional architecture After a construction period of around three and a half years, the modernisation of Messe Essen has been concluded since September 2019. From now on, exhibitors at and visitors to Security Essen will benefit from open, functional architecture, short distances, eight spacious, single-storey halls and plenty of daylight. For example, visitors can, for the first time, expect a complete and coherent range of available video products in the new Hall 5.

EVVA’s Xesar 3.0 electronic access control system offers improved usability and several new features
EVVA’s Xesar 3.0 electronic access control system offers improved usability and several new features

EVVA has upgraded its electronic access control system Xesar. "The EVVA developers have given Xesar 3.0 a total upgrade and equipped it with Service Pack 1,” said Erich Gärtner, Head of the Xesar Product Management department. With Service Pack 1, it is now even easier for EVVA partners and Xesar users to manage their facilities. It equips Xesar with a huge range of new features, while also making the system considerably more intuitive to use. User-friendly features "The new upgrades are all based on our principle of simple and intuitive operation. Our main objective was to make the new features as simple as possible for the user," according to Gärtner. One of the most important new features is, for example, that software updates can be run while the system is being serviced, saving time.Filter settings that need to be used repeatedly can be saved as presets in the user data The help messages are also new. They are displayed by clicking on question marks that are highlighted in yellow and can be hidden again with a click, without completing disappearing. They can answer questions about operating the device and explain particular input boxes, lists or fields. It is also now even easier to manage lists in the system: "For me, the filter preset function is one of the most user-friendly innovations," Gärtner said. Filter settings that need to be used repeatedly can be saved as presets in the user data. The number of presets is unlimited and they can be changed at any time. Automatic backups "There will now be automatic backups when you start and stop the system in the installation manager," Gärtner explained. You can specify a time for a backup to be performed every dayYou can, however, also specify a time for a backup to be performed every day or you can still run a backup manually. An automatic backup is performed before every update, which makes data loss almost impossible. It is especially easy to organise user groups. With Xesar 3.0, user groups can now be organised easily and can be customised according to your requirements. Existing user groups can be copied, altered and assigned either only read permission or full write permission. "All in all, top-notch service! The more than 25 other functions, which I could not list here, are proof of this," said Gärtner.

Related white papers

10 top insights in access, cloud and more

Protecting dormitory residents and assets

Top 5 ways to ensure visitor safety and security