Access control systems & kits(893)
Nedap’s new end-to-end security solution is the first to offer digital protection for access control by unifying best practices from both IT and physical security. Protecting access control systems Until now, the latest best practices protecting IT systems from digital threat haven’t been used for physical access control systems. This is an oversight that is leaving many companies vulnerable to cyber attacks. Nedap and AET Europe have worked together to overcome this by developing AEOS end-to-end security. Taking a forward-thinking new approach, they have combined the best practices of both IT and physical security in an all-in-one access control system. Albert Dercksen, Head of R&D at Nedap, explains why AEOS end-to-end security is needed: “IT and physical security have been following different rules to protect systems. But modern access control systems are, in fact, IT systems connected to corporate networks and should be treated as such. That’s why we’ve applied the digital security principles used in IT to AEOS, our physical access control system.” Communication secured from end-to-end In AEOS end-to-end security, Nedap and AET Europe have combined the IT principles of encryption and strong authentication. This ensures storage in every element of AEOS is secure, as is communication between all elements. Both DESFire keys and digital certificates are stored in a Secure Access Module (SAM) inside door controllers. This leaves card readers with no role in decrypting data, so secure communication between card and controller is guaranteed and, by storing digital certificates in the same SAM, strong authentication is achieved to ensure secure communication between controller and server. Protect critical infrastructure In this way, AEOS end-to-end security offers far higher protection against both physical and digital threats. It also enables keys to be updated securely and centrally, without having to physically attend each card reader. AEOS end-to-end security meets a stringent level of security requirements across Europe, and is already being used to protect critical infrastructures in several countries. In France, for example, it has gained CSPN certification from the French information security agency, ANSSI.
Thanks to EVVA's hybrid cylinder, users no longer need to choose between mechanical or electronic solutions. From now on, mechanical systems and electronic systems have been ideally combined in a single cylinder, the hybrid cylinder. Electronic AirKey and Xesar cylinders can be combined with all current, modular, mechanical EVVA systems. Many new options It is down to individual circumstance to decide whether to opt for internal or external electronic or mechanical security. In any case, the hybrid cylinder offers a multitude of clever solution variants for customers to sensibly enhance your range of available EVVA products. Benefits at a glance Mechanical and electronic systems combined in a single cylinder Suitable for combination with all current, modular, mechanical systems Quick and simple conversion of mechanical systems Electronic, individual profile with combi key
With the new CLIQ® Go app, businesses can unlock the power of access control, saving time and unnecessary workload in the process. CLIQ® Go locking technology allows users to manage security and access rights on the move, on the road and from anywhere in the world.Manage your system with the CLIQ® GO appThese days, all you need is an app to help you find a route, choose a restaurant, read a spreadsheet or check your bank balance. Now there’s an app that can help you manage your company locking system, too. Designed for busy managers, CLIQ® Go saves time and puts a digital solution in the palm of their hand. “CLIQ® Go is the ideal security system for small- to medium-sized businesses,” says Kevin Hoare, CLIQ® Business Development Director at ASSA ABLOY. “Managers don’t want to be wasting time changing all their locks because someone lost a key—and with CLIQ® Go they don’t need to. The ability to configure access control is at their fingertips.” Managers can administer their CLIQ® Go system in the cloud and from a mobile phone, tablet or PC, via a brand new, intuitive app. A few taps and swipes of the screen is all it takes to revoke, supervise or amend individual access rights. Keep your business on the move The mechatronic CLIQ® Go system combines the best of mechanical and electronic security to meet the needs of a busy workplace. The electronic lock’s power is provided by a battery inside every programmable key, meaning it works independently of mains power. The system is designed to fit existing doors and lock cases, making it cost-effective and hassle-free to install. Site security can get the CLIQ® Go upgrade with minimal disruption to day-to-day operations. The cylinders and keys are built to withstand the elements, so can be used on interior and exterior openings, and work across multiple types of enclosure – not just doors but cabinets, cupboards and padlocks, too.
The world is experiencing a smart revolution. However, the intercom sector is not on the same page as this momentum in that traditional IP or even analogue systems still dominate. Akuvox aspires to open a new intercom epoch with its ground-breaking R29S, a smart Android video door phone with a large touch screen. An elegant yet robust body elaborately converges the latest technologies in intercom, telecommunication, video surveillance, alarm systems and access control based on a fully-exploited Android OS. Combining advanced features with easy operation, it represents the highest level of its kind in the industry. Smart phone similarities R29S is comparable to a smart phone for use in buildings; it is natural and convenient for users to either swipe on the 7-inch touch screen to find names or to search contacts manually which are listed alphabetically in a pre-built phone book. R29S also imports the latest facial ID authentication as an option, which is becoming popular in smart phones. With it, residents no longer have to worry about forgotten cards, passwords or mobile phones - Just smile to gain access! Enterprise-grade quality Akuvox started its business with SIP phone for business settings, which places high demand on the communication quality, and has been able to fuse its SIP expertise with Android for intercom. As such, the communication between R29S and other intercom devices features swift message transmission and high clarity, even in busy areas. Building an intelligent environment Android gives new power to R29S. Running on Android, R29S can easily connect with other security devices through its built-in interfaces or ports for enhanced security and smarter control of building surroundings. Some of these include intruder alarm, fire alarm and extra access control system. Its integration with external IP cameras in accordance with ONVIF standards enables wider surveillance coverage and generates a greater sense of security, while its compatibility with IP phone systems via SIP means easy access to services, for example seeking help from security guards when spotting suspicious people loitering around. Catering to unique lifestyles SDK/Android API is offered to tech-savvy customers for personalising the function of R29S for communities from varied cultures or for diverse application scenarios, such as a customised UI that better suits the aesthetic perception and habit of usage of the local people. These merits of R29S are what Akuvox believes to be the criteria of a fully-fledged Android intercom for the smart age. To put it simply, they offer a smooth and straightforward user experience, lifelike communication between users at intercom endpoints, smart and easy integration with other digital systems and maximum freedom in customisation and innovation. So, are your Android intercoms the real deal?
ISONAS has taken its Software Development Kit to the next level and now offers a simple integration with the ISONAS Pure IP™ hardware solutions, giving customers real choice in their access control hardware. Access control evolution Partners can now create a powerful solution and add the next evolution in access control hardware to their product selection; while benefiting from future proofing their selections, reducing costs and giving them choice in their access control hardware. This comprehensive software development kit from ISONAS, makes it easy to integrate 3rd party access control software with the ISONAS Pure IP hardware families. ISONAS SDK platform While other SDK’s use low-level, error-prone TCP/IP communication to integrate, the ISONAS SDK platform supports high-level management mechanisms for event management, local discovery, communication and configuration. Using the .NET framework, the ISONAS SDK allows users to customise which features and functions of the ISONAS hardware to implement. With the ISONAS SDK, partners can add choice to their access control hardware solutions and go to market in no time. An open platform philosophy is nothing new to ISONAS. The company has a long history of integrations and with this significant investment into a modern SDK, ISONAS is furthering its mission to become a global player in open architecture hardware and software.
Facilitates the delivery of citizen centric services, building trust and convenience Allows the quick, efficient and secure issuance, modification or revocation of mobile IDs Improves law enforcement interaction with citizens Prevents counterfeiting through electronic authentication Works across multiple platforms and operating systems Opens the door to new revenue opportunities Can be easily and securely verified, both online and offline
A unique device, the 3D Terminal works by obtaining a high resolution, nail to nail image. The level of detail is impressive, making it the most accurate fingerprint in the world. The accuracy ensures maximum security, and due to the level of details obtained, even the most challenging fingerprint conditions are met: intrusions such as dirt, dust, oil, water, etc. pose no challenge. Shallow fingerprints and even deliberately erased ridges are still accurately read. An unmatchable level of security.
Akuvox’s avant-garde indoor monitor is leading the evolution of intercom technology via SIP&Android. Its simplicity brings intuitive operation, convenience and comfort to home owners, whilst adding taste to home interiors. Universal SIP standard A SIP end point, IT82 conducts exceptionally intelligible audio communication with other devices in a security system, such as door phones and IP phones. When it is built with an optional camera, HD video is also at users’ fingertips. Its audio and video interoperability with other devices enables residents to call from one single platform to obtain various services, for example sending a home repair request to the property manager. Seamless systems integration Akuvox has been digging into Android technology for years, and offers top-of-the-line Android-based security products. As such, with IT82, stellar user experience is one thing; its compelling integratability into most security systems is another. To begin with, it allows for easy installation of 3rd-party applications. It also serves as a control panel that combines all home automation gadgets. All aspects the home are right under users’ noses in one screen. In case of hazards, such as a fire or gas leak, it is capable of issuing immediate alerts so that proactive actions are taken. Easy Management In terms of routine management, its auto-provisioning feature makes maintenance of all indoor monitors within a residential community as easy as pie and highly efficiently for the estate manager. This covers device configuration, firmware upgrades, message posting, advertisement pushing, and more.
The MP5000 was built for US Federal government security specialists wanting a system that could be rapidly deployed and operated as a regular security gate or barrier system. Demonstrated in a full-scale crash test, the barrier stopped and disabled a 15,000lb G.V.W. (66.7kN) vehicle moving at 40mph (64kph). Following the certification test, the system was fully functional and sustained only minor distortion of the barrier ramp (approximately .75 inches). Quick deployment for secure roadways Once positioned, the Delta mobile barricade is separated from its transporter and lowered into position by means of a Battery-Operated Hydraulic Power System, which is then used to raise or lower the barrier for normal or emergency tasks. The controls to run the barrier can be located on the barrier, at a fixed secure post, or from a hand-held push button controller. The guard need not go to the barrier to raise or lower it from its guard position. 15-minute installation Within 15 minutes of being sited, the Delta mobile crash barrier lowers itself into position with built-in hydraulic jacks. There is no hand cranking. Wheels are restored at the sides and then the vehicle ramps are folded out, completing the deployment. To move the barrier, the procedures are simply reversed. Both the operation of the barrier as well as deployment and retrieval are push-button controlled. A standard system includes a battery-operated power unit, replenished from either a solar array or multiple local low voltage sources. Optionally, a Delta Hydraulic Power Unit operated on a locally supplied power or full manual system, or combination, is available. Both the locally powered and battery powered hydraulic pumping unit can be sized to provide pass-through rates suitable for most inspection and identification station requirements. The barricade operates at rates between 10–15 seconds for a full up-down cycle. Sustained rates of 40 cycles per hour can be maintained indefinitely, depending on the available recharging methods employed. DSC1000 commercial barrier The DSC1000 is the commercial extension of the MP5000. Many municipalities, event organisers and others that stage temporary events, ranging from farmers’ markets to concerts and sporting events, have requested a commercial barrier that can be towed into place and protect attendees from errant drivers. Using Delta’s Soft Stop technology, the DSC1000 stops such drivers from inflicting harm. With no foundation or electrical hook-up needed, two people can set up and take down the DSC1000 barrier in minutes. The barricade’s self-contained power system provides all the power necessary to raise and lower the unit onto its trailer and open and close the barrier. This battery-powered system re-charges with a solar panel or external means. Controls can be locked or operated at the barricade or remotely. In many cases, the tragedies that the DSC1000 will negate are accidents. Authorities want the vehicle stopped but they also want to avoid injury to the driver as much as possible. Therefore, contrary to the “hard stop” created with anti-terrorist crash-tested barricades, testing of the new DSC1000 demonstrates that the collision did not distort the passenger compartment of the vehicle. Instead, Soft Stop technology decelerates and stops the vehicle over a short distance, technically referred to as “occupant ride down” acceleration. MP5000 battery-powered hydraulic barricade operator Filling the gap between low-duty cycle manually-operated and high-duty cycle systems, the MP5000 incorporates a heavy-duty rechargeable internal battery, charger, solar panel and rechargeable, portable booster battery pack. It provides up to 200 cycles per day of powered operation, up to 40 cycles in a one-hour period on direct battery. On trickle charge, it handles 1,000 cycles a day; perfect for rapidly upgrading manually operated systems. Recharging options for most duty and operating rates are available.
This wireless locking device is easy to install and maintain, and gives small businesses, education, medical and retail premises a simple way to filter access through any door, without the expense or complication of a complete electronic access control system. KeyPad Escutcheon design and installation A slim, modern design and capacitive keypad makes the SMARTair™ Standalone KeyPad Escutcheon well suited to securing collective areas such as common bathrooms, storerooms and maintenance cupboards; staff, changing or copy rooms in schools, colleges and universities; and clinics and other private areas in hospitals or dental surgeries. The Standalone KeyPad Escutcheon is ideal for securing any door or site where a full access control system is unsuitable, unaffordable or unwanted. It’s easy even for non-technical staff or contractors to install the SMARTair™ Standalone KeyPad Escutcheon: there’s no wiring or drilling, and no software to configure. Simply replacing the current mechanical lock with a SMARTair™ Standalone KeyPad Escutcheon adds electronic PIN security to a door equipped with a standard lock. Convenient authentication Keys can be lost, copied or stolen; the SMARTair™ Standalone KeyPad Escutcheon provides a convenient, modern solution. User PINs can be added quickly at the door without the need for software installation, just by using the programming card. It supports up to 100 different 4- to 6-number PINs, and has an audible buzzer to confirm permission. The device also supports standard RFID cards up to 500 cards per device which offers the possibility to choose between the most convenient authentication option. Like every SMARTair™ product, the new Standalone KeyPad Escutcheon is available for Euro, Scandinavian and DIN profiles, and fits wooden, glass and narrow doors. Power is supplied to the keypad by a standard lithium-ion battery — meaning maintenance costs and workload are minimal. Integrated, software-powered system For premises looking to trial the benefits of access control, the Standalone KeyPad Escutcheon can also be a first stepping stone to a more integrated, software-powered system. The new device can be upgraded to work as part of a modular, fully scalable SMARTair™ system which provides real-time access control and audit trails. With an upgraded system, users can open doors with contactless smart cards using a range of standard RFID technologies, or remotely using a secure smartphone app, and administrators can issue or revoke keycards in an instant using a secure online tool. SMARTair™ access control is the affordable, intelligent upgrade to old-fashioned mechanical keys. And with the new Standalone KeyPad Escutcheon, it’s easier than ever to boost security at any small or medium-sized business, medical, education or retail premises with SMARTair™. Because, if what’s most valuable is on the inside, you don’t want just anyone opening the door. For more information visit www.tesa.es/discoverwireless
As part of the technological investment and keeping up with market demand, Touchless Biometric Systems has created a durable device which responds to biometric mobility, the 2D Portable. Vertical application TBS 2D solutions are applicable for several industry verticals, such as student attendance in universities, offices, retail, hospitality, leisure, homes, and the 2D Portable specifically addresses all the situations where temporary sites, customer facing situations or users on the go are of importance. This Linux-based device facilitates biometric access control or time and attendance anywhere. Aside from its internal memory which stores information, connectivity via WLAN or 3G enables the synchronisation of data or verification of users’ information. A camera and an RFID module allow for an additional verification step, for example using barcode or QR codes and electronic badges respectively. High security and multi-functionality for mobile use Portable terminal with capacitive touch sensor Excellent identification performance Logical Access Control, Time and Attendance (T&A) Real-time data synchronisation with server Identification or verification Small- and large-sized user groups Personalisable touchscreen User-friendly operation and configuration Customer-specific modifications Network operation as part of the TBS biometric subsystem
The CIVINTEC uTouch Android 5.1 quad-core is a programmable, general-purpose intelligent terminal. It comes with an SDK complete source code for third party systems integration, and a software developer to build innovative applications, such as time attendance, access control, visitor management, club/ membership management, e-payment and kiosk services. The risk of card cloning uTouch supports 125KHz & 13.56MHz smart card CSN or encrypted protected data from RFID smart cards utilising key diversification and mutual authentication routines, with one or more SAM for secure data encryption. Smart phones as ID credentials for door access uTouch supports BLE (Bluetooth Low Energy) and NFC technology ISO18092 NFC tags and NFC smart phones in Peer to Peer mode to work with all brands of smart phone to build effective keyless mobile applications. An adjustable reading distance between the smart phone and the door is ideal to account for different door opening solutions. Network management & data transmission The TCP/IP integrated terminal connects directly to the IP network for an easy and low-cost network system, while 4G and Wi-Fi make it flexible for wired or wireless communication for different situations. Based on Android O.S. 5.1 and embedded 1.4GHz quad-core processor, the highly sensitive capacitive touch screen offers a faster, more efficient, intuitive and comfortable self-service and user experience. The battery and PoE function ensure stable working operation during power failure and it also utilises PoE-enhanced stability for low-cost installation. CIVINTEC demonstrated uTouch, along with the full range of CIVINTEC solutions, at IFSEC International 2017.Add to Compare
The CIVINTEC uTouch Android 5.1 quad-core is a programmable, general-purpose intelligent terminal. It comes with an SDK complete source code for third party systems integration, and a software developer to build innovative applications, such as time attendance, access control, visitor management, club/ membership management, e-payment and kiosk services. The risk of card cloning uTouch supports 125KHz & 13.56MHz smart card CSN or encrypted protected data from RFID smart cards utilising key diversification and mutual authentication routines, with one or more SAM for secure data encryption. Smart phones as ID credentials for door access uTouch supports BLE (Bluetooth Low Energy) and NFC technology ISO18092 NFC tags and NFC smart phones in Peer to Peer mode to work with all brands of smart phone to build effective keyless mobile applications. An adjustable reading distance between the smart phone and the door is ideal to account for different door opening solutions. Network management & data transmission The TCP/IP integrated terminal connects directly to the IP network for an easy and low-cost network system, while 4G and Wi-Fi make it flexible for wired or wireless communication for different situations. Based on Android O.S. 5.1 and embedded 1.4GHz quad-core processor, the highly sensitive capacitive touch screen offers a faster, more efficient, intuitive and comfortable self-service and user experience. The battery and PoE function ensure stable working operation during power failure and it also utilises PoE-enhanced stability for low-cost installation. CIVINTEC demonstrated uTouch, along with the full range of CIVINTEC solutions, at IFSEC International 2017.
The new Aperio® H100 packs the security, flexibility and affordability of Aperio® wireless access control into one slim, cleverly designed door handle. At IFSEC International, London, 20–22 June 2017, a pre-launch showcase for the product and its seamless integrations attracted positive reviews from OEMs and end-users looking for innovative solutions to secure internal doors. ASSA ABLOY private IFSEC event The product was exhibited in conjunction with 7 different OEMs (Nedap, Genetec, Pacom, RBH, Controlsoft, Maxxess and HID), with a demo-block and brochure, plus ASSA ABLOY installation and promotional videos. Over 100 ASSA ABLOY customers also attended a private event outside the IFSEC 2017 venue, where the new Aperio® H100 was also presented. Among the Aperio® H100’s many features, visitors to the showcase and presentation highlighted its ease of installation. Two screws are all it takes to retrofit the Aperio® H100 to an existing door, with no drilling or wiring needed. Customers remarked on the H100’s robust build quality, designed for indoor office and facility doors with high traffic. Aperio® H100 from a logistics perspective From a logistics perspective, OEMs saw major benefits in having just 2 part numbers (for left and right handles), which removes any confusion around thicknesses when ordering the product. The Aperio® H100 fits doors between 35mm and 80mm thick — almost any format of interior door. It is compatible with most common European (DIN) and Scandinavian mortice locks, in wooden, steel, tubular frame, or glass doors with standard lock cases. Because there are only 2 versions, customers can hold stock, which improves their delivery times significantly. After the new Aperio® H100 was presented during a Nedap media breakfast, Jeroen Harmsen, Product Manager at Nedap Security Management, commented: “It’s a great match with our new door opening solution. We’re very proud of the fact that we are one of the first security management systems that have integrated ASSA ABLOY’s new product.” RFID credentials compatibility Connectivity is another major strength: the Aperio® H100 is compatible with multiple RFID credentials, including iCLASS®/ISO14443B, iCLASS® SE, Seos®, MIFARE® Classic, Plus and EV1, and DESFire® SE and EV1. “HID Global customers highly praised the new addition to the ASSA ABLOY Aperio® product family,” says Jaroslav Barton, Product Marketing Physical Access Control EMEA at HID Global. “They were overwhelmed by the rare combination of the neat design, state-of-art security based on Seos® technology and simple installation and ordering.” The Aperio® H100 can work within an online access control system or offline as a standalone device. Its battery slots inside the handle, ensuring a minimal footprint and a discreet contemporary look. To learn more about the full Aperio® range of online and offline cylinders, escutcheons and locks — including locks for server racks — you can view a short film at www.assaabloy.co.uk/aperiowirelesslocks
Looking for a security solution that gives the user complete control of their system remotely and the installer with greater profitability and functionality? The search is over with the PyronixCloud and HomeControl+ App! With remote programming and diagnosis of the system using InSite UDL software via the PyronixCloud, there are less call-outs for the installer and therefore less costs. The ability to diagnose issues before going to site also cuts down the time the installer has to spend at any given location, which again optimises the process and cuts down the cost. PyronixCloud communication gateway The initial installation is also easier with the PyronixCloud. Instead of port forwarding or setting up of static IP, the installer simply creates a PyronixCloud account. Acting as the communication gateway, the PyronixCloud permits the panel to interact with the HomeControl+ App. This provides users complete real-time control of their system from anywhere in the world on their smart device! They can arm and disarm, control automation outputs, check the status of every device on the system and more! Superior security solution Compatible with either the PCX 46 APP or Enforcer 32WE APP, the installer can initially fit hybrid or wireless security, safe in the knowledge that they are fitting a superior security solution, that can meet the individual needs of the property and the user alike. A superior security solution with online management, an on-the-go smartphone app, easy wireless expansion and more profits is ready and waiting to protect!
Adding iris recognition to a security environment doesn't have to mean getting rid of everything you've invested in to date - LG IrisAccess® 3000 complements token or PIN-based system to provide a high integrity security overlay that boosts ROI and security efficacy of the security systems already in place.Even partial measures can add a whole new dimension to your security - most companies want improved security to safeguard both human and physical assets. But this should not entail a costly overhaul - LG IrisAccess 3000 integrates easily with standard security infrastructure with Wiegand or serial output, and runs on MS SQL and Oracle databases. Up to 128 portals can be controlled off one host. It works in one-to-many search mode, or in 1 to 1 verification mode with many PIN and token-based systems, including a variety of smart-card formats. Ideal application for data centres, laboratories, and other sensitive areas - information gathering is key to any enterprise and ensuring proprietary data on your company, your customers and your competition remains confidential is critical. Laboratories - clean environments need a security system which can provide super security despite protective gear, gloves and goggles - and LG IrisAccess 3000 delivers just thatMore accurate, faster, more stable than any other biometric - LG IrisAccess 3000 draws from a feature-rich iris to capture an image (it's just a picture) that digitises 240 degrees of freedom to produce a small 512-byte template to deliver real-time authentication accuracy that is unmatched. System enrolment is simple and fast - authentication even faster... - a proximity-activated, voice-prompted, mirror-assisted interface makes for easy enrolment and use. Enrolment takes less than 2 minutes. Authentication less than two seconds. Eyeglasses/contact lenses present no problem for use. TCP/IP compatible, networkable, and expandable with built-in countermeasures and other security features - LG IrisAccess 3000 has integration flexibility and addresses special operational security concerns in ways no other security system - biometric or otherwise - can match.Add to Compare
LG IrisAccess 4000 is the third generation of the world's number one deployed iris recognition platform. Offering increased application versatility and integration flexibility, enrolment and recognition is easier than ever. Intuitive visual user interface enables users to quickly position themselves for enrolment or recognition as images of both eyes are captured virtually simultaneously. Audio prompts improve speed of enrolment and recognition performance while motor-driven auto-tilt mechanism makes adjusting the camera for proper height a simple ‘one touch of a finger' proposition. What's more, every model of the IrisAccess 4000 contains a camera supported by dedicated illumination that makes badging for credentialing a snap.When it comes to multi-factor authentication, IrisAccess 4000 is extraordinarily flexible. iCAM4000 and iCAM4100 with optional device-embedded SmartCard readers from the world's leading card reader producers give IrisAccess the ability to function with HID iCLASS, DESFire, and MiFARE and CAC-compliant cards. When a reader is present, a card icon placed on the casing indicates where the card should be placed for fast verification. Card reader-equipped models of iCAM4000 and iCAM4100 are designated with a 10 suffix, so become 4010 and 4110 respectively.Multifactor authentication can also be delivered by the 16-element keypad that comes standard on the iCAM4100 unit. The authentication options afforded by being able to configure iris authentication by left, right, either or both eyes plus a smartcard token, and in the case of the iCAM4100, a keypad, are simply unmatched by any other iris recognition offering on the market.iCAM4000/4010iCAM4000/4010 is compact, low profile and designed with architectural aesthetics in mind. It's kiosk-configurable, and can be flush or recessed mounted. An iCAM4010-- with an embedded SmartCard reader provides more than multi-factor authentication. Information residing on the card enhances human factors performance to prompt correct setting of the imager to an individual user's height. An option that will prompt the card to trigger language for audio prompts, will make the system ideal for use in a multi-ethnic milieu, or in countries with more than one official language. iCAM4100/4110 The iCAM4100/4110(SmartCard-equipped, as described above) includes a keypad accepting up to 10 digit PINs affording an additional level of two-factor authentication. Every iCAM4100 incorporates a 40-character LCD, making possible communication regarding authentication status. It also fits well in human resource management applications, as upon identity authentication, keypad and display afford a means to exchange information about payroll, vacation days, shift-work, or other HR data etc.System Security FeaturesIrisAccess delivers security features and performance that set it apart from other iris recognition and most other biometric systems. Safe storage, for example, means no biometric templates are stored on any external system components. Experts concede that countermeasures built into LG IrisAccess set the standard for the industry and note in this area, many other biometric systems leave much to be desired. Security is also a key driver when it comes to software. The LG iData software line for access control and a tool kit for building identity-dependent applications provides FIPS compliant encryption, and offers other alternatives, as well as PKI. Other System ComponentsIrisAccess 4000 System incorporates other system-designed elements. A low profile IdentityController(ICU) offers easy greater integration convenience while ensuring that biometric templates are kept safe, protected and secure, off the imager. The DoorController(DCU) is also available for use in stand-alone access control applications.The Advantage of Iris RecognitionThe physical or behavioural characteristics on which biometrics are based afford a more reliable basis for authentication than other easily compromised identity options relying on something one knows or carries. There are more measurable characteristics in the iris, the visible coloured ring around the pupil, than in other biometrics. Every human iris is unique. Compared to other biometrics, iris recognition is the most accurate, fastest, and scalable option. Iris patterns are also very stable. Barring trauma, an iris pattern will not change over time as characteristic measurements of finger, hand, voice or faces do.Add to Compare
One size does not fit all when it comes to managing a facility's access rights. With SMARTair™ from TESA, security managers have a choice between 4 levels of access control, each tailored to the needs of different doors and premises. And you don't need to choose one: all of them can work together in the same organisation, providing exactly the appropriate rights management solution for each door—online or offline, high or medium security. SMARTair™ Stand-Alone is suited for smaller premises and low-traffic doors. Facility managers update access rights at the door using the supplied programming card. No access control software is needed. SMARTair™ Offline provides an extra layer of security. In addition to SMARTair™ Stand-Alone features, access rights can be scheduled and it's easy to generate a manual audit trail for any door in the facility. The SMARTair™ Update on Card option adds more automated access rights management, and is suited to buildings with more doors and higher footfall. Access rights are managed via a wall updater. Facility managers can update access directly via user cards, schedule access rights when needed, and generate automatic audit trails with the easy-to-use system management software. SMARTair™ Wireless Online provides the maximum level of system control for large, busy and high-security doors or buildings. A network of wireless hubs links doors to the company's access control system. It's easy for security managers to update or deny access rights wirelessly, or to generate real-time audit trails for any lock in the organisation. Moreover, system managers can open doors remotely via a web browser or mobile app. Facility managers can pick 1, 2, or even all 4, of these SMARTair™ solutions to fine tune their organisation's access rights management. And SMARTair™ gives facilities managers the power to manage access to more than just doors. As well as electronic cylinders, escutcheons, locks, and wall readers, SMARTair™ provides locks for cabinets, lifts, vending machines, and lockers. With SMARTair™ from TESA, it is simple to manage the rights of every lock within one single, secure access system.Add to Compare
Traka, a division of ASSA ABLOY presents the Traka Touch L Series intelligent touch screen key management system. Traka Touch is a standalone key management solution that operates independently of a company’s IT system via an embedded Windows software and SQL Server database. No server is required to maintain its database. The system is managed via the full colour 7-inch multi-language touch screen on the front panel, from the initial administrative setup of users and keys to the management of day-to-day user access. As with conventional Traka systems the Touch gives the administrator control over the access levels for each particular user. To gain access to keys, users must identify themselves using a PIN code, swipe card or biometric recognition. LEDs indicate which keys a user can and can’t take when they access the cabinet. The Traka Touch provides a real time audit of all key transactions and the unit’s solid state memory can store up to 250,000 events. Administrators can view a report of all key usage and search for a key that is “out of system” via the touch screen. “The new Traka Touch is a secure, cost-effective means of ensuring that only authorised individuals have access to keys, while making them readily available to authorised users 24/7. It is not always feasible for organisations to allow access to IT infrastructures and networks and Traka Touch addresses this” said Robert Smith, Managing Director, Traka plc.Add to Compare
Aperio® Offline access control doors now allow access control system manufacturers (OEMs) and system integrators to offer even more favourably priced solutions, thus creating a competitive advantage for themselves. All they need to do is integrate Aperio® components into their system, an easy task. Aperio® Offline is particularly suitable for doors which cannot be wired, are used very little or are a distance away from other doors. Very easy to install, an Aperio® Offline cylinder or escutcheon is mounted onto the door and then integrated into the access control system. Access authorisations are saved onto existing RFID user cards or transponders. Doors are all managed using the same access control system, whether they feature Aperio® Offline or Online. Users receive new or modified access authorisations from a central point. One special feature in Aperio® Offline is its status message capability used to indicate low battery status or a jammed lock and transmit other door signals to the access control system via the cards or transponders. This allows system maintenance to rectify faults or replace batteries within a short space of time. Lost user cards and transponders can be cancelled by placing them on a blacklist or become automatically invalid after a specific period of time. Able to support up to 16 time schedules, Aperio® Offline also offers a permanently open mode (office mode) and door status change (toggle mode). For customers or end-users, the greatest advantage lies in the fact that they can now choose the right access control system for every door scenario. Regardless of whether the door is Aperio® Online or Offline, both can be administered using the same access control system. Aperio® Offline cylinders or escutcheons can also be easily used for Aperio® Online if operators wish to integrate a door into an online system at a later date. In such a case, the door is incorporated into the access control system via a wireless communications hub, thus providing a favourably priced, non-wired, online solution.Add to Compare
Managing assets effectively helps businesses to run more smoothly and increases efficiency - knowing where equipment is located; controlling who has access; saving time at shift start up - all combine to make a powerful business case. At the same, time damage and losses are reduced because users have an increased sense of ownership and accountability; wasted administration time in resolving issues is eliminated and this helps to reduce demands on your staff, so they can concentrate on profitable work - it also makes important equipment more available to those who really need it, 24/7. Who uses our intelligent lockers? Traka intelligent lockers are used in a number of Government offices, Airports, Police, Distribution Centres, Power Stations and a range of commercial organisations to manage a diverse range of equipment - anything from tools and specialist equipment to data communications and portable computing equipment. Hospitals use Traka for managing access to a special variant of our intelligent lockers so that only authorised staff can gain access to controlled drugs and Police use them to control and restrict access to crime scene evidence and confiscated property, thus ensuring that it is not tampered with. In reality, organisations use Traka intelligent lockers because they want to ensure that only authorised, competent and trained staff can gain access to valuable or dangerous equipment - both for security and compliance reasons. What type of equipment do they hold? As an example, Traka intelligent lockers can be used to house and control access to pooled or shared equipment and portable assets such as: Airwave and security radios Controlled drugs Arm mounted data terminals Breathalyzers Police evidence Mobile phones Laptops Specialist toolsAdd to Compare
Clay by SALTO is a ground-breaking new product that provides an electronic access control solution with vastly better functionality and performance than is possible in a traditional mechanical solution. Until now many SME’s (Small Medium Enterprise’s) have been unable to take advantage of many of the top technological solutions in access control largely because of the cost and complexity of those systems. Clay™ combines a cloud-based intuitive software platform that is easy and fast to understand and manage, with high quality and design hardware that is easy and quick to install, providing the same features as wired systems at less than 70% of the cost. Its increased security comes from users being able to easily and intuitively establish, consult, change and cancel specific access rights by person and place and time, and all in real-time, thus eliminating the problems and limitations of their existing mechanical solutions, such as the costs associated with changing locks, keys, and cylinders when keys get lost. Clay™ incorporates SALTO Systems’ wireless hardware, capitalising on SALTO’s outstanding products that have seen the company become one of the world’s top electronic lock manufacturers, with more than one million electronic locks installed globally. The key hardware element is the Clay™ IQ that serves as the hub between the wireless lock and the cloud, and is so simple to set up, users need only plug it into a standard electrical socket. Neither router configuration, nor any other cabling is required. SALTO has grown to be the market leader in Data-on-Card and wireless access control solutions by focusing on and delivering what the market needs to stay secure not just today, but tomorrow as well. The revolutionary new Clay™ product utilizes the versatility of the cloud to give owners of SME businesses the ability to control their building access remotely and manage it in real-time via any device with an internet connection, providing security that is both flexible and future-proof.Add to Compare
This is an 8 Input and 8 Output device that allows an ACT controller to be used in applications where signalling to other equipment is required. Examples of this are elevator control, alarm systems, CCTV switching applications, I/O Mapping etc.Main Features 8 form C relays 8 supervised inputs Tamper protection 2 status LEDs Polycarbonate housing Input and output names Timer for each output Output switched off or on by log event, input, timezone ACTWinPro support Inputs and outputs Logged Normally open/closed Inputs monitored by timezone Supervised Inputs optionAdd to Compare
Who is accessing your company’s most sensitive data? Where? When? And if someone without authorisation did, how would you know? Some of the world’s best-known companies have succumbed to data breaches that proved expensive in terms of both cost and reputation. The focus is usually on a digital attack. Passwords and anti-hacking procedures come under scrutiny, particularly in a world where so much of our information lives in the cloud. However, there is another way that company data can fall into unauthorised hands: someone could walk right up to your server and access it physically, with equally disruptive results. Shared data centres The risks increase when companies use shared data centres, or ”colocation”, which has become an increasingly popular option. According to 451 Research KnowledgeBase, the global colocation market could grow from $23 billion in 2014 to $37 billion by 2017. All our “big data” has to go somewhere and shared data centres provide a cost-effective solution, even for information of the most sensitive kind. Of course, data centres have stringent security procedures, but is it wise to fully entrust your valuable data -sensitive customer information- to a third party? Can you be certain that a third party’s security procedures meet your legal compliance commitments, to the European Data Protection Directive, the Sarbanes–Oxley Act, the PCI Data Security Standard and other personal and commercial data protection regulations? Further, do you even know who you share server space with? It could be a direct competitor. Disruption of physical security and potential breach as a result may not even be deliberate or malicious. Server rooms have a steady flow of authorised traffic: cleaners, maintenance staff, repair technicians and more. Unfortunately, accidents happen. Data centre security management For these reasons, data centre security management needs to be high on any company’s agenda, as high as cyber-security. In an interview with datacenterknowledge.com, Jason Cook, CTO of BT Americas, suggested: “Physical security is still one of the easiest ways to get access to data. With all of the sophistication in current technology, what’s the point, if someone can walk in and open the door?” IBM estimates the average cost of a single data breach at $3.79 million. Fortunately, technologies that can help secure servers—even in colocation data centres—cost a lot less than that. A high-security mechanical lock might seem like a solution, but a mechanical system can be expensive to run, due to the costs of secure key management and replacement when keys go missing. Once issued, there’s no way to change a physical key’s user rights. A mechanical-key audit trail- who had access to your servers, when, for how long- will probably not be enough to conduct a proper investigation in the event of any type of breach. Even high-security perimeter doors and CCTV-powered server room security will not suffice, if your server rack has an old-fashioned mechanical lock. Server cabinet locks are the last line of defence against a physical breach, yet mechanical keys are still a common sight in data centres. This is becoming increasingly unsatisfactory, especially when that server could hold the key to your business success. KS100 Server Cabinet Lock One solution is ASSA ABLOY’s Aperio® KS100 Server Cabinet Lock. The KS100 adds real-time access control capabilities to a server cabinet, drawer or rack. It brings server racks into an existing third-party access control system, without breaking the bank. KS100 electronic locks work with smartcards using all standard RFID technologies, including iCLASS® from HID, Seos™, MIFARE® and DESFire. Installation is quick and easy, with power via a Power over Ethernet (PoE) connection. Once installed, KS100 locks integrate with your access control system and communicate wirelessly through an Aperio® Communication Hub. With online integration, when any of your smart credentials is presented to the lock, access decisions are communicated from and recorded by the system wirelessly. With Aperio®, lost cabinet keys no longer compromise server security: smart credentials are simply de-authorised and a valid replacement can be quickly re-issued. The current status of any lock can be revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 invaluable for incident investigation. With Aperio® server cabinet locks, businesses have the freedom to manage access to their own equipment and data, even in colocation data centres. Do you know exactly who last had access to your servers, and when? Install Aperio® and next time your data manager asks, the answer is yes. Key facts The data centre colocation market could be worth $37 billion by 2017 Companies have a legal requirement to protect sensitive customer data, under the European Data Protection Directive and other regulations Investigating any breach properly requires detailed audit trails, which mechanical keys cannot provide An Aperio® KS100 Server Cabinet Lock can integrate with an installed access control system, boosting security wirelessly and adding full audit trail capabilities to server space, even in shared data centres For more on how Aperio® can secure a data centre, see www.assaabloy.co.uk/securedata.Add to Compare
Browse Access control systems & kits
- WEY deploys advanced and cost-effective command and control rooms for Suntec City
- WEY deploys fully integrated control room solution based upon WEY Distribution Platform for SIG, Geneva
- WEY Technology control room solutions enhance security at Landesmuseum Zurich
- Chapel Hill-Carrboro City Schools implement 3xLOGIC Hybrid NVRs across district