ASSA ABLOY - Aperio® Access control systems & kits (2)
Aperio® Offline access control doors now allow access control system manufacturers (OEMs) and system integrators to offer even more favourably priced solutions, thus creating a competitive advantage for themselves. All they need to do is integrate Aperio® components into their system, an easy task. Aperio® Offline is particularly suitable for doors which cannot be wired, are used very little or are a distance away from other doors. Very easy to install, an Aperio® Offline cylinder or escutcheon is mounted onto the door and then integrated into the access control system. Access authorisations are saved onto existing RFID user cards or transponders. Doors are all managed using the same access control system, whether they feature Aperio® Offline or Online. Users receive new or modified access authorisations from a central point. One special feature in Aperio® Offline is its status message capability used to indicate low battery status or a jammed lock and transmit other door signals to the access control system via the cards or transponders. This allows system maintenance to rectify faults or replace batteries within a short space of time. Lost user cards and transponders can be cancelled by placing them on a blacklist or become automatically invalid after a specific period of time. Able to support up to 16 time schedules, Aperio® Offline also offers a permanently open mode (office mode) and door status change (toggle mode). For customers or end-users, the greatest advantage lies in the fact that they can now choose the right access control system for every door scenario. Regardless of whether the door is Aperio® Online or Offline, both can be administered using the same access control system. Aperio® Offline cylinders or escutcheons can also be easily used for Aperio® Online if operators wish to integrate a door into an online system at a later date. In such a case, the door is incorporated into the access control system via a wireless communications hub, thus providing a favourably priced, non-wired, online solution.Add to Compare
Who is accessing your company’s most sensitive data? Where? When? And if someone without authorisation did, how would you know? Some of the world’s best-known companies have succumbed to data breaches that proved expensive in terms of both cost and reputation. The focus is usually on a digital attack. Passwords and anti-hacking procedures come under scrutiny, particularly in a world where so much of our information lives in the cloud. However, there is another way that company data can fall into unauthorised hands: someone could walk right up to your server and access it physically, with equally disruptive results. Shared data centres The risks increase when companies use shared data centres, or ”colocation”, which has become an increasingly popular option. According to 451 Research KnowledgeBase, the global colocation market could grow from $23 billion in 2014 to $37 billion by 2017. All our “big data” has to go somewhere and shared data centres provide a cost-effective solution, even for information of the most sensitive kind. Of course, data centres have stringent security procedures, but is it wise to fully entrust your valuable data -sensitive customer information- to a third party? Can you be certain that a third party’s security procedures meet your legal compliance commitments, to the European Data Protection Directive, the Sarbanes–Oxley Act, the PCI Data Security Standard and other personal and commercial data protection regulations? Further, do you even know who you share server space with? It could be a direct competitor. Disruption of physical security and potential breach as a result may not even be deliberate or malicious. Server rooms have a steady flow of authorised traffic: cleaners, maintenance staff, repair technicians and more. Unfortunately, accidents happen. Data centre security management For these reasons, data centre security management needs to be high on any company’s agenda, as high as cyber-security. In an interview with datacenterknowledge.com, Jason Cook, CTO of BT Americas, suggested: “Physical security is still one of the easiest ways to get access to data. With all of the sophistication in current technology, what’s the point, if someone can walk in and open the door?” IBM estimates the average cost of a single data breach at $3.79 million. Fortunately, technologies that can help secure servers—even in colocation data centres—cost a lot less than that. A high-security mechanical lock might seem like a solution, but a mechanical system can be expensive to run, due to the costs of secure key management and replacement when keys go missing. Once issued, there’s no way to change a physical key’s user rights. A mechanical-key audit trail- who had access to your servers, when, for how long- will probably not be enough to conduct a proper investigation in the event of any type of breach. Even high-security perimeter doors and CCTV-powered server room security will not suffice, if your server rack has an old-fashioned mechanical lock. Server cabinet locks are the last line of defence against a physical breach, yet mechanical keys are still a common sight in data centres. This is becoming increasingly unsatisfactory, especially when that server could hold the key to your business success. KS100 Server Cabinet Lock One solution is ASSA ABLOY’s Aperio® KS100 Server Cabinet Lock. The KS100 adds real-time access control capabilities to a server cabinet, drawer or rack. It brings server racks into an existing third-party access control system, without breaking the bank. KS100 electronic locks work with smartcards using all standard RFID technologies, including iCLASS® from HID, Seos™, MIFARE® and DESFire. Installation is quick and easy, with power via a Power over Ethernet (PoE) connection. Once installed, KS100 locks integrate with your access control system and communicate wirelessly through an Aperio® Communication Hub. With online integration, when any of your smart credentials is presented to the lock, access decisions are communicated from and recorded by the system wirelessly. With Aperio®, lost cabinet keys no longer compromise server security: smart credentials are simply de-authorised and a valid replacement can be quickly re-issued. The current status of any lock can be revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 invaluable for incident investigation. With Aperio® server cabinet locks, businesses have the freedom to manage access to their own equipment and data, even in colocation data centres. Do you know exactly who last had access to your servers, and when? Install Aperio® and next time your data manager asks, the answer is yes. Key facts The data centre colocation market could be worth $37 billion by 2017 Companies have a legal requirement to protect sensitive customer data, under the European Data Protection Directive and other regulations Investigating any breach properly requires detailed audit trails, which mechanical keys cannot provide An Aperio® KS100 Server Cabinet Lock can integrate with an installed access control system, boosting security wirelessly and adding full audit trail capabilities to server space, even in shared data centres For more on how Aperio® can secure a data centre, see www.assaabloy.co.uk/securedata.Add to Compare
Browse Access control systems & kits
- ASSA ABLOY - Aperio®
Access control system products updated recently
Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognise an attack can help mitigate the threat, as ABB’s Rob Putman explains. Edge devices and data analytics As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage edge devices and data analytics, as well as remote connectivity, in the wake of the COVID-19 pandemic. As the threat surface evolves, the industry must guard against attacks on key physical infrastructure, carried out by a range of malicious actors, including nation states and criminals intent on blackmail. The chemicals sector, a high-value target for cyber-criminals Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost In 2017, not long after a ransomware attack that targeted Maersk, the world’s largest shipping firm, made the news around the world. Another cyber-attack, this time targeting physical industrial assets, generated fewer headlines, and yet could have resulted in both real, as well as financial, damage. Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost, both financial and reputational, to the operator, should production be interrupted or stopped entirely. Cyber security vulnerabilities put physical assets at risk The attack in question, a ‘Triton’ custom malware attack on a petro-chemical facility in Saudi Arabia, targeted a safety system, taking over system controllers. Bugs in the code triggered an emergency shutdown, but could have led to the release of toxic and explosive gases. It was a vivid reminder of how cyber security vulnerabilities are increasingly putting companies’ key physical assets at risk. Two more-recent high-profile incidents illustrate my point. In February, a Florida water treatment plant was hacked. The malicious actor remotely accessed the system for three to five minutes, during which time they opened various functions on the screen, including one that controls the amount of sodium hydroxide (NaOH) in the water. The hacker changed the NaOH from about 100 parts per million to 11,100 parts per million, which could have resulted in a mass poisoning event. Colonial Pipeline cyber-attack incident Then, in May, the Colonial Pipeline system that originates in Houston, Texas and carries gasoline, and jet fuel, suffered a ransomware attack. Using a VPN, hackers targeted back-office IT systems, forcing Colonial to shut down IT hosts and network infrastructure, severing communication with those OT systems that are responsible for communicating ‘transactional data’ associated with fuel delivery. In this instance, a single compromised password disrupted Colonial’s ability to invoice its customers. This dependency on OT data stopped pipeline and business operations, and the company was elected to pay the hackers an initial ransom of US$ 4.4 million, in order to restore operations. The Colonial attack was multi-dimensional, in that it not only impacted Colonial’s business, but also the wider US economy and national security, since the pipeline transports nearly half of the east coast's fuel supplies. Outdated IT system elevates physical risk The increased interconnectivity between IT and OT can also create vulnerabilit Attacks such as these prove that, armed with little more than a laptop, an email account and access to the dark web, determined hackers can cause disproportionate damage to physical infrastructure. As mentioned at the outset, the increased interconnectivity between IT and OT can also create vulnerability. Producers often want to know: Is it risky to connect a production asset or their operational environment to the Cloud? My answer is, if you do so without having done any risk audits around people, processes and technology, or without enhancing and maintaining that environment, then yes, that is risky. For example, we often observe that the life cycle of a production asset far outlasts the IT systems that are used to run it. Take a cement kiln. Several generations of plant operators may have come and gone, but that asset may still run, using legacy software, such as Windows XP and why not? Need to replace aging distributed control systems Well, that’s fine, if you are not concerned about having that asset compromised, and all that entails. A ‘flat’ IT network, an aging distributed control system, and machines with legacy versions of Microsoft Windows, all these elements, which are still commonplace in many industries, make it much easier for attackers to find and infiltrate a company, without needing sophisticated tools. The age-old mantra of not interfering with a piece of equipment or software that appears to be working, often applies to the individual assets. For example that cement kiln that are still controlled by the same Windows XP-based control software. However, if we’re honest, things have changed quite a bit, not because something was broken, but because innovation came in. That same kiln control system is most likely connected to other systems, than when first commissioned and that opens it to exposure to threats that it was never designed for. The human element There is a misconception that IoT-connected devices can open companies to risk There is a misconception that IoT-connected devices can open companies to risk, but many recent, high-profile cyber-attacks have been conducted from a laptop, by hacking someone’s VPN, or are a simple phishing/malware attack. In all these cases, the human element is partly to blame. Take the Florida attack. The compromised computer at the water treatment facility was reportedly running an outdated Windows 7 operating system and staff all used the same password, in order to gain remote access via the Teamviewer app, which the hacker was then able to use. Physical and human assets, key to robust cyber security Discussion on the best way to mitigate the threat is often framed solely around specific technical solutions and ignores the fact that robust foundational cyber security is really driven by two very different, but equally important, types of capital: physical assets (e.g. production machinery), and human assets. The truth is that smart digital software and industry-renowned cyber security applications, while critical, are in many cases, only as good as the weakest human link in the chain. Industry would, therefore, do well to ask itself the following question: Do we have a security problem, or a complacency problem? At this juncture, it is important to point out that the majority of companies that ABB works with, are at least aware of the threat posed by cyber attackers, and the potential impact of an attack, on their revenues, reputation and bottom line. User error and human-generated exposures Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital However, user error and human-generated exposures are where most of these attacks occur. Those human failures are mostly not due to malicious intent from employees, but to the lack of training of the employees on secure behavior. Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital. However, there are also age demographics at play here. Much of the operations employee base is heading towards retirement and often, there is no plan or ability to backfill these people. Need to invest in new digital and automated technologies If you think you don't have enough people now, in order to stay on top of basic care and feeding of the OT environment, with regards to security, what is that going to be like in 20 years? For this reason, there must be a major industry reset, when it comes to its workforce. Companies must invest in new digital and automated technologies, not only to ensure that they stay ahead of the curve and mitigate risk, but also to attract the next generation of digitally literate talent. Robust cyber security is built on solid foundations When we talk about foundational cyber security, we mean fundamentals, such as patching, malware protection, high-fidelity system backups, an up-to-date anti-virus system, and other options, such as application allow-listing and asset inventory. These basic controls can help companies understand their system setup and the potential threats, identify vulnerabilities, and assess their risk exposure. The Pareto principle states that around 80% of consequences come from 20% of the causes. In the context of cyber security, that means 80% of exposure to risk comes from 20% of the lack of security. If companies do the foundational things right, they can manage out a significant amount of this risk. Importance of maintaining and upgrading security controls However, having basic security controls, such as anti-virus software in place, is just the first step on that journey. Equally important is having someone within the organisation, with the requisite skill set, or the extra labour bandwidth, to operate, maintain and update those security controls, as they evolve. Educating, training and recruiting existing employees, and the next generation of talent, along with forging partnerships with trusted technology providers, will ensure that industry can leverage the latest digital technologies, in order to drive business value, and secure physical assets against cyber-attacks.
The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination. Transformation of the physical security industry One of the latest industries to be permanently transformed is physical security. The era of utilising security cameras is slowly changing into more advanced and more efficient technological applications - security robotic solutions. SMP Robotics is a California-based company, which is a pioneer in developing robotic technologies, powered by AI, to assist, improve and deliver on new expectations in today’s world. One of their services is smart surveillance systems. This represents a proactive approach to security. The company, SMP Robotics’ Founder and Chief Executive Officer (CEO), Leo Ryzhenko, stated “Autonomous robotic technologies will become a driving force in future security solutions.” Robotics and AI in autonomous security solutions The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards The company uses robotics and AI technology to implement autonomous security solutions, which reduce liability and overhead, as well as improving the quality of services. Robotic guards are capable of patrolling all types of facilities, in both urban and rural contexts. The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards. The inspection robots, deployed by SMP Robotics, are easily integrated with many existing security technologies, armed with obstacle avoidance and anti-collision measures, automatically recharge, and can recognise faces up to 50 metres. As the world grows increasingly complex, technology like this is essential to ensure safety for all. AI-enabled autonomous video monitoring ground vehicles The advancements in technological breakthroughs of SMP Robotics position the company and its AI-powered, autonomous video monitoring ground vehicles, to be the most adaptable to any industry, cost-effective for clients’ business needs, in providing various types of services from public safety, crime prevention, to asset protection and physical security. SMP Robotics continues to implement new innovative solutions and groundbreaking technologies in its latest generation of autonomous models. Currently, many were already deployed or in a process to be delivered to a number of key clients, in various industries throughout the globe, from oil & gas, nuclear power plants to data centers, healthcare facilities, and amusement parks. Smart security robots Tal Turner, the Vice President (VP) of Business Development and Partnerships, SMP Robotics, said “We provide autonomous, artificial intelligence, all-weather, all-surface, smart security robots that are turnkey and operate independently on their own, using real-time obstacle avoidance, face recognition, and other cutting-edge technological advancements.” According to Coherent Market Insights, the Robots as a Service (RaaS) market direction will grow by 15.9% by 2028 and reach the threshold of 41.3 billion dollars. SMP Robotics stands at the forefront of the security robotic revolution, making an impactful change to make the world a safer place.
Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head teachers are considering taking learning and large gatherings, such as assemblies outdoors, when possible. Managing ‘class bubbles’, hygiene and ventilation While Dr. Yvonne Doyle, the Medical Director of Public Health England (PHE) has publicly reassured parents that schools are not the ‘drivers’ or ‘hubs’ of COVID-19-19 infection in communities, there is a lot of pressure on school leaders to manage ‘class bubbles’, extra cleaning and hygiene, ventilation, and COVID-19 testing, to protect families and staff. It’s a logical step to switch, in certain circumstances, to outdoor activities where fresh air is on tap, and social distancing is far easier to manage. Specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms, which had been growing in popularity, even before the pandemic. These facilities offer numerous benefits as an extension of existing learning spaces and provide children the opportunity for hands-on learning, beyond a stuffy classroom. However, if outdoor spaces are routinely called upon as part of COVID-19 contingency planning, how can schools ensure that their outdoor classrooms and wider areas are secure, robust, and fit for purpose? When specifying outdoor classrooms and learning spaces, it’s essential to take into account the well-being of the students and staff, who will use them, noise pollution and acoustics. Most importantly, education managers need to ensure the surrounding area is secured and adequately protected from threats, including terrorism. Perimeter security measures for schools How can schools and nurseries secure their perimeters, so that outdoor learning is totally safe for all? A starting point is to seek out architects and suppliers, who have a good understanding of security standards. Worryingly, Jacksons Fencing’s research recently found that only one-third of architects are seeing both LPS 1175 and the UK police initiative, Secured by Design (SBD) physical security standards, specified for schools. This highlights a lost opportunity for architects to propose solutions that are appropriate to the level of risk and needs of the school, without turning the site into an unwelcoming fortress. Helping schools identify specific security needs Head teachers would be wise to work with architects, who not only know the latest security standards inside and out, but are also are willing to play a more advisory role, helping the school identify exactly what is needed. Head teachers should prioritise solutions appropriate to their site’s specific risks It’s also vital that architects don’t simply replace existing fencing and gates, with the same security systems that have been in place for years. Instead, they will need to meet changing needs and risks. Our research finds that teachers often report issues, with the school perimeter and gates, from being climbed over (28%) and causing injury, to gates not locking properly (10%). Head teachers should prioritise solutions appropriate to their site’s specific risks, which sometimes require altering of existing measures. School fencing is an important aspect of any education site. As well as defining its boundary and making a visual distinction between public and private property, the fencing and gates that surround and secure a school, will typically meet a wide variety of other important criteria, including preventing unauthorised entry to the grounds, protecting pupils, staff, and visitors from accidents and injury, deterring theft and anti-social behaviour, and reducing the risk of malicious damage, and acts of terrorism. Welded mesh panels for perimeter fencing Popular options for schools include welded mesh panels for perimeter fencing or sports areas, and railing systems to act as demarcation, in order to control foot and car traffic. Within the outlying boundary, barriers, bollards and parking posts will keep pedestrians, and vehicles safe from each other, while timber fencing and gates can be designed to control the flow of people, around the grounds and reduce the areas, where students can be hidden from view. Automated gates and access control Perimeter fencing must be complemented with safe entrances and exits for vehicles and pedestrians. Every school has unique entry-control requirements, determined by factors, such as size, location and the local environment. These needs influence the decisions you make, when preparing technical specifications for school security gates. Do you require gates to be steel or timber, manual or automated, single or double leaf? Specialist suppliers will be in the best position to offer inputs on school gates, which typically need to offer solid security and durability, with a welcoming aesthetic. Specifying access control system When specifying a school access system, it’s important to consider the areas of the school When specifying a school access system, it’s important to consider the areas of the school, such as sports fields, car parks, and children’s play and learning areas, and whether it requires playground segregation. Selected gates should meet the design of the fencing, to create a secure perimeter with no weak points, with automated gates conforming to all current safety regulations. . Noise pollution can be a problem as well, including noise coming in or leaving the school in residential areas. If more teaching is to be carried out outside, it’s worth considering acoustic barriers to reduce noise in and around the school. Timber acoustic barriers for security and privacy Timber acoustic barriers offer security and privacy, and can reduce noise levels, by as much as 32 decibels (in laboratory conditions), so are ideal for city centre schools or those located close to busy highways. There are many ways to build an outdoor classroom. Timber products can help to create a welcoming environment, such as wooden shelters, pergolas, fencing, and decking. Always check that high quality timber, ideally guaranteed for 25 years against rot and insect attack, is being used to provide an attractive, cost-effective, safe and sustainable solution, for all weather conditions. DBS approved installers And of course, installers must be DBS approved, so that they can install outdoor classrooms, during school holidays, or within term time, with minimal disruption. The COVID-19 pandemic had a huge impact on schools and learning. While nobody wants to think of fresh outbreaks of the infection, or any other virus, installing an outdoor classroom made from high-quality, long-lasting materials is a great way to future-proof school learning and ensure safety, and preparedness. Putting extra thought and care into the security angle will provide schools with decades of protection against a host of unforeseen events.
ASSA ABLOY has signed a definitive agreement to acquire Arran Isle, a designer, manufacturer and distributor of door and window hardware in the UK and Ireland. "I look forward to welcoming Arran Isle into the ASSA ABLOY Group. This acquisition delivers on our strategy to add complementary products and solutions to our core business,” says Nico Delvaux, President and CEO of ASSA ABLOY. Developing innovative products "Arran Isle is an excellent addition to our business and in particular EMEIA’s UK and Ireland market region. The acquisition brings well-known architectural and fenestration hardware brands to our portfolio. Arran Isle has built a reputation developing innovative products and a market-leading approach to customer service with a passionate and experienced team,” says Neil Vann, Executive Vice President of ASSA ABLOY and Head of EMEIA Division. Arran Isle has some 560 employees and was established in 1971. The company has manufacturing and distribution sites in the UK, Ireland, Europe and China. Sales for 2020 amounted to about MGBP 100 (approx. MSEK 1,200). The acquisition will be accretive to EPS from the start. The acquisition is subject to regulatory approval and customary closing conditions and is expected to close during the fourth quarter of 2021.
To help support the Fire Door Safety Week 2021 campaign, ASSA ABLOY Opening Solutions UK & Ireland has announced the launch of a new best practice guide - ‘Fire Doorsets’ guide, on how to specify, install, maintain and inspect fire-certified doorsets in residential and commercial buildings. ‘Fire Doorsets’ guide The ‘Fire Doorsets’ best practice guide has been compiled, based on the knowledge and expertise of ASSA ABLOY’s FDIS-trained inspectors, as well as key insights, and information gathered from a range of third-party accreditation bodies, and trade associations, including the Door and Hardware Federation (DHF), the Fire Industry Association (FIA) and Secured By Design (SBD). The best practice guide is intended to help all those responsible for fire safety in residential and commercial environments The best practice guide is intended to help all those responsible for fire safety in residential and commercial environments, such as architects and specifiers, installers, landlords, local authorities, building owners and facilities managers, particularly at a time when fire safety is in the spotlight, due to the national Fire Door Safety Week 2021 campaign. Fire Door Safety Week 2021 campaign Scheduled to run from September 20 - 26, 2021, the Fire Door Safety Week 2021 campaign hopes to raise awareness of the critical role that fire doors play in saving lives and protecting property. Established by the British Woodworking Federation (BWF) and supported by the BWF Fire Door Alliance, the awareness campaign illustrates why it’s crucial to understand the factors that ensure a fire door performs as intended, with product manufacture, quality, installation and maintenance, all playing a part. Eryl Jones, Managing Director of the ASSA ABLOY Door Hardware Group, said “The correct specification, maintenance and management of fire doors can be the difference between life and death for people, not to mention the damage fires can cause to property and valuables. In our new ‘Fire Doorsets’ guide, we tackle all considerations, throughout a fire doorset’s lifecycle.” Empowering fire safety personnel He adds, “From standards, certification and security, to their design, specification and installation, right through to their ongoing usage, maintenance and inspection, our intention is to help empower those responsible for fire safety, with everything that they need to know.” Some of the statistics surrounding fire safety in the United Kingdom (UK) are staggering" Eryl Jones further said, “Some of the statistics surrounding fire safety in the United Kingdom (UK) are staggering. There are 20,000 commercial fires in the United Kingdom every year. Research suggests that the economy has lost £1 billion in GDP and 5,000 jobs from preventable fires in commercial properties. One study found that larger fires in schools cost on average £2.8 million to repair and in some cases, as much as £20 million.” Fire doorsets play critical role in protecting life, property He adds, “Last year, a Freedom of Information request responded to by 147 UK local authorities, found 63 per cent of planned fire door maintenance and replacement did not progress, as scheduled. It’s clear that there’s still plenty of work to be done around improving awareness of the critical role that fire doorsets play in protecting life and property." Eryl Jones concludes, "We hope our new guide acts as an invaluable resource for those tasked with fire safety in buildings, ensuring everyone throughout the doorset’s lifecycle plays their part, in upholding the highest fire safety standards.”
ASSA ABLOY has signed an agreement to sell its Nordic locksmith business CERTEGO to Nalka Invest, which invests in small- and medium-sized businesses primarily in the Nordic region. This transaction reinforces the strategic focus on the core security solutions business of the ASSA ABLOY Opening Solutions EMEIA Division. CERTEGO is a pioneer locksmith and security solutions installation business in the Nordic region. It provides planning, installation and managing of mechanical, electro-mechanical and electronic security solutions for customers across multiple verticals. Security solutions installation market CERTEGO has a network of around 70 locations with some 1,200 employees in Sweden, Finland, Norway and Denmark. The impact from the divestment on ASSA ABLOY external sales is around SEK 1.5 bn. "I find it satisfying that with Nalka Invest we were able to find a committed, experienced owner that gives the business a new home and creates new opportunities for the future,” says Nico Delvaux, President and CEO of ASSA ABLOY. The impact from the divestment on ASSA ABLOY external sales is around SEK 1.5 bn “Recent trends in the security solutions installation market, including the growing need to offer a comprehensive range of different solutions, has led us to reconsider the merits of continued ownership of CERTEGO. We have concluded that a divestment would allow EMEIA to focus resources in its core business.” Customary closing conditions “I am confident that Nalka Invest will take CERTEGO to the next level as part of their business transformation and wish them and the CERTEGO team every success in their future endeavours,” says Neil Vann, Executive Vice President of ASSA ABLOY and Head of EMEIA Division. The transaction will have a positive effect on ASSA ABLOY´s operating margin going forward. The divestment will result in a capital loss and exit costs amounting to approximately MSEK 200. The acquisition is subject to regulatory approval and customary closing conditions and is expected to close during the third quarter of 2021.
Related white papers
Top 5 ways to ensure visitor safety and security
Moving to mobile: A guide for businesses switching to mobile access control
Attention OEMs: 5 Ways RFID Readers Can Secure Your Markets
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download
Positive Technologies research finds ATM vulnerabilities enable illegal cash withdrawals, such as in Wincor Cineo ATMs
- Positive Technologies research finds ATM vulnerabilities enable illegal cash withdrawals, such as in Wincor Cineo ATMs
- G4S ensures state-of-the-art diplomatic security services provided at foreign embassies in Jordan
- Inner Range and Antron Security deliver secure access control and robust security at Grade A London office building, The Bailey
- ASSA ABLOY’s Code Handle offers a secure and cost-efficient access control solution for primary schools