LG IrisAccess® 3000 Iris Recognition System
LG IrisAccess® 3000 Iris Recognition System

Adding iris recognition to a security environment doesn't have to mean getting rid of everything you've invested in to date - LG IrisAccess® 3000 complements token or PIN-based system to provide a high integrity security overlay that boosts ROI and security efficacy of the security systems already in place.Even partial measures can add a whole new dimension to your security - most companies want improved security to safeguard both human and physical assets.  But this should not entail a costly overhaul -  LG IrisAccess 3000 integrates easily with standard security infrastructure with Wiegand or serial output, and runs on MS SQL and Oracle databases.  Up to 128 portals can be controlled off one host.  It works in one-to-many search mode, or in 1 to 1 verification mode with many PIN and token-based systems, including a variety of smart-card formats.  Ideal application for data centres, laboratories, and other sensitive areas - information gathering is key to any enterprise and ensuring proprietary data on your company, your customers and your competition remains confidential is critical.  Laboratories - clean environments need a security system which can provide super security despite protective gear, gloves and goggles - and LG IrisAccess 3000 delivers just thatMore accurate, faster, more stable than any other biometric - LG IrisAccess 3000 draws from a feature-rich iris to capture an image (it's just a picture) that digitises 240 degrees of freedom to produce a small 512-byte template to deliver real-time authentication accuracy that is unmatched.  System enrolment is simple and fast - authentication even faster... - a proximity-activated, voice-prompted, mirror-assisted interface makes for easy enrolment and use.  Enrolment takes less than 2 minutes.  Authentication less than two seconds.  Eyeglasses/contact lenses present no problem for use. TCP/IP compatible, networkable, and expandable with built-in countermeasures and other security features - LG IrisAccess 3000 has integration flexibility and addresses special operational security concerns in ways no other security system - biometric or otherwise - can match.    

Add to Compare
Upgrade access control systems with a completely cable-free, even more cost-effective solution – Aperio® Offline
Upgrade access control systems with a completely cable-free, even more cost-effective solution – Aperio® Offline

Aperio® Offline access control doors now allow access control system manufacturers (OEMs) and system integrators to offer even more favourably priced solutions, thus creating a competitive advantage for themselves. All they need to do is integrate Aperio® components into their system, an easy task. Aperio® Offline is particularly suitable for doors which cannot be wired, are used very little or are a distance away from other doors. Very easy to install, an Aperio® Offline cylinder or escutcheon is mounted onto the door and then integrated into the access control system. Access authorisations are saved onto existing RFID user cards or transponders. Doors are all managed using the same access control system, whether they feature Aperio® Offline or Online. Users receive new or modified access authorisations from a central point. One special feature in Aperio® Offline is its status message capability used to indicate low battery status or a jammed lock and transmit other door signals to the access control system via the cards or transponders. This allows system maintenance to rectify faults or replace batteries within a short space of time. Lost user cards and transponders can be cancelled by placing them on a blacklist or become automatically invalid after a specific period of time. Able to support up to 16 time schedules, Aperio® Offline also offers a permanently open mode (office mode) and door status change (toggle mode). For customers or end-users, the greatest advantage lies in the fact that they can now choose the right access control system for every door scenario. Regardless of whether the door is Aperio® Online or Offline, both can be administered using the same access control system.  Aperio® Offline cylinders or escutcheons can also be easily used for Aperio® Online if operators wish to integrate a door into an online system at a later date. In such a case, the door is incorporated into the access control system via a wireless communications hub, thus providing a favourably priced, non-wired, online solution.

Add to Compare
Traka presents its latest standalone touch screen key management system
Traka presents its latest standalone touch screen key management system

Traka, a division of ASSA ABLOY presents the Traka Touch L Series intelligent touch screen key management system. Traka Touch is a standalone key management solution that operates independently of a company’s IT system via an embedded Windows software and SQL Server database. No server is required to maintain its database. The system is managed via the full colour 7-inch multi-language touch screen on the front panel, from the initial administrative setup of users and keys to the management of day-to-day user access. As with conventional Traka systems the Touch gives the administrator control over the access levels for each particular user. To gain access to keys, users must identify themselves using a PIN code, swipe card or biometric recognition. LEDs indicate which keys a user can and can’t take when they access the cabinet. The Traka Touch provides a real time audit of all key transactions and the unit’s solid state memory can store up to 250,000 events. Administrators can view a report of all key usage and search for a key that is “out of system” via the touch screen. “The new Traka Touch is a secure, cost-effective means of ensuring that only authorised individuals have access to keys, while making them readily available to authorised users 24/7. It is not always feasible for organisations to allow access to IT infrastructures and networks and Traka Touch addresses this” said Robert Smith, Managing Director, Traka plc.

Add to Compare
SMARTair from TESA – Flexible access rights management
SMARTair from TESA – Flexible access rights management

One size does not fit all when it comes to managing a facility's access rights. With SMARTair™ from TESA, security managers have a choice between 4 levels of access control, each tailored to the needs of different doors and premises. And you don't need to choose one: all of them can work together in the same organisation, providing exactly the appropriate rights management solution for each door—online or offline, high or medium security. SMARTair™ Stand-Alone is suited for smaller premises and low-traffic doors. Facility managers update access rights at the door using the supplied programming card. No access control software is needed. SMARTair™ Offline provides an extra layer of security. In addition to SMARTair™ Stand-Alone features, access rights can be scheduled and it's easy to generate a manual audit trail for any door in the facility. The SMARTair™ Update on Card option adds more automated access rights management, and is suited to buildings with more doors and higher footfall. Access rights are managed via a wall updater. Facility managers can update access directly via user cards, schedule access rights when needed, and generate automatic audit trails with the easy-to-use system management software. SMARTair™ Wireless Online provides the maximum level of system control for large, busy and high-security doors or buildings. A network of wireless hubs links doors to the company's access control system. It's easy for security managers to update or deny access rights wirelessly, or to generate real-time audit trails for any lock in the organisation. Moreover, system managers can open doors remotely via a web browser or mobile app. Facility managers can pick 1, 2, or even all 4, of these SMARTair™ solutions to fine tune their organisation's access rights management. And SMARTair™ gives facilities managers the power to manage access to more than just doors. As well as electronic cylinders, escutcheons, locks, and wall readers, SMARTair™ provides locks for cabinets, lifts, vending machines, and lockers. With SMARTair™ from TESA, it is simple to manage the rights of every lock within one single, secure access system.

Add to Compare
LG IrisAccess 4000 - The iris recognition system that's a generation ahead of the rest
LG IrisAccess 4000 - The iris recognition system that's a generation ahead of the rest

LG IrisAccess 4000 is the third generation of the world's number one deployed iris recognition platform.  Offering increased application versatility and integration flexibility, enrolment and recognition is easier than ever.  Intuitive visual user interface enables users to quickly position themselves for enrolment or recognition as images of both eyes are captured virtually simultaneously.  Audio prompts improve speed of enrolment and recognition performance while motor-driven auto-tilt mechanism makes adjusting the camera for proper height a simple ‘one touch of a finger' proposition.  What's more, every model of the IrisAccess 4000 contains a camera supported by dedicated illumination that makes badging for credentialing a snap.When it comes to multi-factor authentication, IrisAccess 4000 is extraordinarily flexible.  iCAM4000 and iCAM4100 with optional device-embedded SmartCard readers from the world's leading card reader producers give IrisAccess the ability to function with HID iCLASS, DESFire, and MiFARE and CAC-compliant cards.  When a reader is present, a card icon placed on the casing indicates where the card should be placed for fast verification.  Card reader-equipped models of iCAM4000 and iCAM4100 are designated with a 10 suffix, so become 4010 and 4110 respectively.Multifactor authentication can also be delivered by the 16-element keypad that comes standard on the iCAM4100 unit.  The authentication options afforded by being able to configure iris authentication by left, right, either or both eyes plus a smartcard token, and in the case of the iCAM4100, a keypad, are simply unmatched by any other iris recognition offering on the market.iCAM4000/4010iCAM4000/4010 is compact, low profile and designed with architectural aesthetics in mind. It's kiosk-configurable, and can be flush or recessed mounted.  An iCAM4010-- with an embedded SmartCard reader provides more than multi-factor authentication.  Information residing on the card enhances human factors performance to prompt correct setting of the imager to an individual user's height.  An option that will prompt the card to trigger language for audio prompts, will make the system ideal for use in a multi-ethnic milieu, or in countries with more than one official language. iCAM4100/4110 The iCAM4100/4110(SmartCard-equipped, as described above) includes a keypad accepting up to 10 digit PINs affording an additional level of two-factor authentication.  Every iCAM4100 incorporates a 40-character LCD, making possible communication regarding authentication status.  It also fits well in human resource management applications, as upon identity authentication, keypad and display afford a means to exchange information about payroll, vacation days, shift-work, or other HR data etc.System Security FeaturesIrisAccess delivers security features and performance that set it apart from other iris recognition and most other biometric systems.  Safe storage, for example, means no biometric templates are stored on any external system components.  Experts concede that countermeasures built into LG IrisAccess set the standard for the industry and note in this area, many other biometric systems leave much to be desired. Security is also a key driver when it comes to software.  The LG iData software line for access control and a tool kit for building identity-dependent applications provides FIPS compliant encryption, and offers other alternatives, as well as PKI. Other System ComponentsIrisAccess 4000 System incorporates other system-designed elements.  A low profile IdentityController(ICU) offers easy greater integration convenience while ensuring that biometric templates are kept safe, protected and secure, off the imager.  The DoorController(DCU) is also available for use in stand-alone access control applications.The Advantage of Iris RecognitionThe physical or behavioural characteristics on which biometrics are based afford a more reliable basis for authentication than other easily compromised identity options relying on something one knows or carries.  There are more measurable characteristics in the iris, the visible coloured ring around the pupil, than in other biometrics.  Every human iris is unique.  Compared to other biometrics, iris recognition is the most accurate, fastest, and scalable option.  Iris patterns are also very stable. Barring trauma, an iris pattern will not change over time as characteristic measurements of finger, hand, voice or faces do.

Add to Compare
Clay – access control via the cloud from SALTO
Clay – access control via the cloud from SALTO

Clay by SALTO is a ground-breaking new product that provides an electronic access control solution with vastly better functionality and performance than is possible in a traditional mechanical solution. Until now many SME’s (Small Medium Enterprise’s) have been unable to take advantage of many of the top technological solutions in access control largely because of the cost and complexity of those systems. Clay™ combines a cloud-based intuitive software platform that is easy and fast to understand and manage, with high quality and design hardware that is easy and quick to install, providing the same features as wired systems at less than 70% of the cost. Its increased security comes from users being able to easily and intuitively establish, consult, change and cancel specific access rights by person and place and time, and all in real-time, thus eliminating the problems and limitations of their existing mechanical solutions, such as the costs associated with changing locks, keys, and cylinders when keys get lost. Clay™ incorporates SALTO Systems’ wireless hardware, capitalising on SALTO’s outstanding products that have seen the company become one of the world’s top electronic lock manufacturers, with more than one million electronic locks installed globally. The key hardware element is the Clay™ IQ that serves as the hub between the wireless lock and the cloud, and is so simple to set up, users need only plug it into a standard electrical socket. Neither router configuration, nor any other cabling is required. SALTO has grown to be the market leader in Data-on-Card and wireless access control solutions by focusing on and delivering what the market needs to stay secure not just today, but tomorrow as well. The revolutionary new Clay™ product utilizes the versatility of the cloud to give owners of SME businesses the ability to control their building access remotely and manage it in real-time via any device with an internet connection, providing security that is both flexible and future-proof.

Add to Compare
Traka intelligent, keyless, electronic lockers
Traka intelligent, keyless, electronic lockers

Managing assets effectively helps businesses to run more smoothly and increases efficiency - knowing where equipment is located; controlling who has access; saving time at shift start up - all combine to make a powerful business case.  At the same, time damage and losses are reduced because users have an increased sense of ownership and accountability;  wasted administration time in resolving issues is eliminated and this helps to reduce demands on your staff, so they can concentrate on profitable work - it also makes important equipment more available to those who really need it, 24/7. Who uses our intelligent lockers? Traka intelligent lockers are used in a number of Government offices, Airports, Police, Distribution Centres, Power Stations and a range of commercial organisations to manage a diverse range of equipment - anything from tools and specialist equipment to data communications and portable computing equipment.  Hospitals use Traka for managing access to a special variant of our intelligent lockers so that only authorised staff can gain access to controlled drugs and Police use them to control and restrict access to crime scene evidence and confiscated property, thus ensuring that it is not tampered with. In reality, organisations use Traka intelligent lockers because they want to ensure that only authorised, competent and trained staff can gain access to valuable or dangerous equipment - both for security and compliance reasons. What type of equipment do they hold? As an example, Traka intelligent lockers can be used to house and control access to pooled or shared equipment and portable assets such as: Airwave and security radios Controlled drugs Arm mounted data terminals Breathalyzers Police evidence Mobile phones Laptops Specialist tools

Add to Compare

Browse Access control systems & kits

Access control systems & kits - Expert commentary

Wireless technology is transforming motion detection
Wireless technology is transforming motion detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localisation. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymised and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

Automatic gates: Making the right investment for access control
Automatic gates: Making the right investment for access control

The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for post and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing whilst obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc whilst sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for manoeuvre. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.

4 ways to keep your workplace protected from COVID-19
4 ways to keep your workplace protected from COVID-19

The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupants in any emergency requires preparation and clear communication. This is especially critical in a health crisis involving an infectious disease. These are some of the essential best practices that could help organisations reduce the impact on their employees and operations during this pandemic. 1. Use a visitor management system With a visitor management system, organisations have a single source of real-time and historical insights into who is, or was recently, in the workplace. This is especially important because of the need to perform contact tracing should anyone in the organisation show symptoms of COVID-19, meaning everyone they have been in contact with needs to be contacted and asked to isolate. Yet still, first impressions are made at the front desk or lobby, where the visitor experience needs to be a positive one. At the same time, though, any emergency event requires that there be strict control over who is entering the workplace. This policy also needs to be clearly communicated to visitors. Doing this minimises risk to visitors as well as the workforce. In addition to delivering a high-quality visitor experience, the ideal visitor management system must: Enable organisations to meet regulatory compliance mandates and facilitate check-in at a self-service kiosk to minimise wait times. Customise the visitor experience to support specific security needs, such as accelerating and simplifying check-in or requiring additional security pre-checks. Automate compliance as it relates to visitor access rules with historical visit reports. 2. Pre-check questions at visitor registration kiosks Organisations can strengthen security at the registration kiosk using a flexible, enterprise-grade visitor management system to add visitor sign-in steps. This has proven successful in the past when used to control the spread of infectious disease during an outbreak. An example of this is a U.S. children's hospital which managed to reduce facility infection rates by 25 percent over a two-year period using a commercial, off-the-shelf physical identity and access management (PIAM) solution from HID Global. The solution provides two particularly important capabilities that can be used by organisations to protect their workplace from the uncontrolled spread of an infectious disease: Enhance visitor registration policy with additional mandatory questions to help identify any visitors who may need other screenings. Extend the visitor registration kiosk with a mandatory pop-up asking further questions during visitor check-in. 3. Understand who has visited your workplace Successful controlling the spread of infection throughout a facility requires the ability to automatically maintain an auditable trail of activity. This can be done using an enterprise-grade visitor management system that makes it easy to retrieve historical visit reports. This provides a timeline of who was in the workplace, and when they were there. Key features include: A single dashboard providing useful visitor insights at your fingertips. Historical reports that provide visitor details including location and contact information, all in compliance with General Data Protection Regulation (GDPR) and other privacy regulations. 4. Clearly communicate how infection risks can be reduced Global organisations must actively communicate with visitors and employees on the outbreak of infectious diseases and follow best practices outlined by the World Health Organization (WHO). Here are several things organisations can do in this area to help maintain a safe and healthy workplace: Re-enforce and communicate WHO best practices with guideline posters in the front lobby and throughout the workplace. Add posters that also encourage regular and thorough washing of hands. Encourage everyone to cough or sneese into their shirt sleeve in their flexed elbow or cover their mouth and nose with a tissue. Encourage everyone to keep a relatively safe distance from each other and use alternatives to handshakes when saying hello. Organisations must contend with a variety of workplace challenges during the outbreak of an infectious disease. These challenges can be solved with best practices that include a comprehensive visitor management system that automates critical check-in policies and maintains an auditable trail of visitor activity.  

Related white papers

11 considerations for embedded system RFID readers

Beyond security: access control for multi-tenant sites

Access control & intelligent vehicle screening