Abloy Access control systems & kits(2)
Browse Access control systems & kits
Access control system products updated recently
Gallagher 2 Door Kit - PoE+ for distributed one to two door access control using an Ethernet connection
Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable. For me, there are two sides of the answer to this question: Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate. Buying products that do not perform as advertised or do something that is unacceptable. For integrators and end users making the buying decisions, the drive to purchase products may not be based on either aspect and instead on the product that can do the best job for their business. But for others, a greater emphasis on the ethical implications of purchasing decisions drives decision-making. What is ethical consumption? Ethical consumption is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favouredEthical consumption — often called ethical consumerism — is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favoured, and products that are ethically questionable may be met with a ‘moral boycott’. This can be as simple as only buying organic produce or as complex as boycotting products made in a totalitarian regime that doesn't offer its citizens the same freedoms that we enjoy in the United States. Consider the goals of the Boston Tea Party or the National Consumers League (NCL), which was formed to protect and promote social and economic justice for consumers and workers in the United States and abroad. Some examples of considerations behind ethical consumption include fair trade, treatment of workers, genetic modification, locally made and processed goods, union-made products and services, humane animal treatment, and in general, labour issues and manufacturing practices that take these factors into account. Increase in ethical consumption The numbers show that ethical consumption is on the rise. In a 2017 study by Unilever, 33 percent of consumers reported choosing to buy and support brands that they believe are doing social or environmental good. In the same study, 53 percent of shoppers in the United Kingdom and 78 percent in the United States said they feel better when they buy products that are ‘sustainably’ produced. There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities Though the aforementioned question that sparked this conversation centres around concerns with products made in China, there are many other countries where, for example, governments/dictators are extremely repressive to all or parts of their populations, whose products, such as oil, diamonds, minerals, etc., we happily consume. There are also a number of countries that are a threat in terms of cybersecurity. It may be naive and simplistic to single out Chinese manufacturers. Impact on physical security products Product buying decisions based on factors other than product functionality, quality and price are also starting to permeate the security marketplace. While this hasn't been a large focus area from the business-to-business consumption side, it's something that should be considered for commercial security products for a variety of reasons. Hardware hacks are more difficult to pull off and potentially more devastating" There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities. Last fall, 30 U.S. companies, including Apple and Amazon, were potentially compromised when it was discovered that a tiny microchip in the motherboard of servers built in China that weren't a part of the original specification. According to a Bloomberg report, “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.” This, along with many other incidents, are changing the considerations behind purchasing decisions even in the physical security industry. Given that physical security products in general have been lax on cybersecurity, this is a welcome change. Combating tech-specific threats In early January, members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors and ensure U.S. technological supremacy by improving interagency coordination across the U.S. government. The bill creates the Office of Critical Technologies & Security at the White House, an indication that this issue is of critical importance to a number of players across the tech sector. Members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors To address a significant number of concerns around ethical production, there are certifications such as ISO 26000 which provides guidance on social responsibility by addressing accountability, transparency, ethical behaviour, respect for stakeholder interests, respect for rule of law, respect for international norms of behaviour and respect for human rights. While still emerging within physical security, companies that adhere to these and other standards do exist in the marketplace. Not buying products vulnerable to cyberattacks It may be counter-productive, even irresponsible, to brand all products from an entire country as unfit for purchasing. Some manufacturers’ products may be ethically questionable, or more vulnerable to cyberattacks than others; so not buying products made by those companies would make sense. The physical security industry might be playing a bit of catch up on this front, but I think we're beginning to see a shift toward this kind of responsible buying behaviour.
Users of security systems have long been willing to sacrifice certain aspects of security in favour of convenience and ease of use. The tide seems to be turning, however, with the industry at large showing significant concerns over cyber security. End user sentiments also seem to be following that trend, becoming more cautious when it comes to having their security systems connected to the internet. While it has become the norm for security systems to be accessible online, still it presents security threats that unconnected systems would not face. In 2018, we saw a notable shift from the convenience of a connected system to the less convenient, but more secure, standalone system. Consumers are willingly making the choice to trade convenience for security, and companies are responding. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019This in turn is driving an increase in more IoT-like deployments. Rather than the traditional client that is connected to a device to retrieve information, more often we are seeing more active devices, capable of reporting their presence and transmitting information on a scheduled basis, without the need for a client. Preventing security systems from outside threats This changes the dynamic of the network and alleviates many threats associated with traditional systems because there is no opportunity for outside threats to access your system since the device is transmitting information out vs requiring a connection to the outside world. With IoT deployments, when the device is active and sending messages out of the network segment, it is not vulnerable in the same way that the traditional systems are. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019. In 2018, we saw an increased acceptance in the residential market for smart home applications. While this has been an area of discussion for the past ten years, it is now gaining real traction. With artificial intelligent capabilities in tow, smart home deployments are more common than ever and the video analytics that accompany them are quite impressive. Cloud security for the commercial sector If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as wellIn addition to the residential market, connected platforms will likely start to impact the commercial space as well. The border between consumer and commercial user will become a little more blurred. Companies such as Google that cater primarily to home services have cloud capabilities beyond the means of many competitors, in turn giving them a favourable advantage to provide security for the cloud. If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as well. As far as ONVIF is concerned, we are excited to see how the market will adopt the newly released Profile T for advanced video streaming in the coming year. We are also excited to explore our relationship with the International Electrotechnical Commission (IEC), by continuing our work on giving devices the ability to communicate upwards and proactively. It is clear that the market is open to adopting models in the quest for more efficiency without sacrificing security.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SourceSecurity.com. Q: What do you believe are the main physical threats to data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organisation, which are: Every organisation is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organisation is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What do you think influences employees to steal data from their own organisation? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many of us think of security threats coming from an outsider, do companies still face these type of threats? Yes. Unfortunately, organisations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether it be an insider threat or an outsider threat, what are ways these individuals can steal sensitive data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What is the difference between COTS and disguised devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With these types of discrete items, can security personnel still catch individuals in the act? For example, through security screenings? Poor or nonexistent screening is the most substantial security threat to any organisation when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s surprising that so many organisations would neglect physical security when protecting their data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So how can an organisation protect against these risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organisation, with little overlap or communication. Organisations now are realising that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How can companies and government agencies combine both physical data security and cybersecurity initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What type of technology can you use to protect physical data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How does FMDS work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What are the key takeaways for organisations looking to enhance data security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognising the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organisation’s data. Organisations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organisations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
Security expert Abloy UK is inviting visitors to IFSEC 2019 to learn more about its innovative new global vision, ‘Abloy - For Trust’, and meet the company’s new brand ambassador, Finnish motor racing icon Valtteri Bottas. Held on 18th – 20th June 2019 at ExCeL London, IFSEC International is Europe's leading security event and the only global stage committed to the future of integrated security. Valtteri Bottas - who is currently top of the Formula 1 leaderboard - will be on the stand to explain why he is the ideal match to embrace and reflect Abloy’s brand values. Better representation of digital offering Abloy’s ‘For Trust’ campaign revitalises our core brand values and positions us for continued future growth"Aaron Yule, Managing Director at Abloy UK, said: “Abloy’s ‘For Trust’ campaign revitalises our core brand values and positions us for continued future growth, with refreshed branding to better represent our modern digital offering. “We’re keen for visitors to learn more about how Valtteri fits perfectly with our brand – he is trustworthy, technologically pioneering, innovative, has a first-class performance and puts teamwork at the heart of everything he does.” Products on display at IFSEC 2019 Alongside launching ‘For Trust’ with Valterri, Abloy is also showcasing a number of innovative products at IFSEC 2019. These include: PROTEC2 CLIQ - The easy-to-use access control system. It enables remote key management and provides comprehensive audit trails on locks and padlocks which fulfils the demands of regulators. It also has the ability to electronically remove lost or stolen keys from the system, meaning security can still be confidently maintained in circumstances where a key has been misplaced. PROTEC2 CLIQ can also ensure the safety of the people on site through not just managing and controlling access but delivering significant health and safety benefits by guaranteeing only the most competent and compliant staff are allowed on site, reducing risk. PROTEC2 CLIQ Connect recently won a prestigious Platinum ‘Govie’ Award in the USA, honoured as an outstanding government security product. Managing building security The CLIQ Go app enables users to control security in their building and premises from their mobile deviceCLIQ Go - The CLIQ Go app enables users to control security in their building and premises from their mobile device. Features include the ability to schedule access to rooms or give contractors time-limited access. If a key is lost, access can also be revoked using the CLIQ Go app, all managed from a cloud-based system which is ideal for SMEs, education, retail and hotels. Abloy OS - This is a contemporary, modular and scalable operating system, integrated with CLIQ Web Manager, which allows users to control door environments and secure access. The visual map-based user interface provides role and area-based access control, with a real time situational view. This accurate and convenient management of keys, identities and access reduces the resources required, thereby improving efficiency and user satisfaction. The system is Cloud hosted and is future-proofed to develop according to customer needs. Easy access and egress Escape Door System (EDS) - The EDS offers easy access and egress while ensuring compliance, safety and security with the ability to implement dynamic lockdown procedures. With the EDS, it is now possible to provide a compliant solution for an escape door when read-in/read-out access control is specified, combining the three components required for BS EN 13637 (electronically controlled escape door systems for doors along escape routes) - Blocking, Control and Trigger. Traka21 helps trace and account for every key or keyset ensuring that critical business operations are never jeopardisedTraka21 - Traka21 is a sophisticated stand-alone key management system, which combines innovative RFID technology and attractive, robust design to provide small and medium sizes businesses with the advanced management of keys or keysets in an affordable plug and play unit. Simple, efficient and cost-effective, Traka21 helps trace and account for every key or keyset, which are individually locked in place, ensuring that critical business operations are never jeopardised. Ensuring access to authorised personnel Electric locks - Products such as the Abloy EL560 solenoid lock and EL520 motorised lock work by controlling either the latch or the handle, or by motorising the bolt back once a proximity card is presented or a request to exit device is used. This ensures that only authorised personnel are able to gain access to the building, and the system will prevent any unauthorised persons from entering. This is ideal for exit and fire rated doors within the interior of premises such as business offices, public buildings, hospitals and schools. Electric locks also offer energy and emission reductions in comparison to door magnets. There are also safety benefits to be gained by choosing an electric solution, including removing the fire risks associated with the installation of door magnets on fire escape points.
Security expert Abloy UK has unveiled an innovative new global vision, ‘Abloy - For Trust’, and announced an exciting collaboration with Finnish racing icon Valtteri Bottas, to strengthen its renewed brand. ‘Abloy - For Trust’ This new vision has seen Abloy revitalise its core brand values and position itself for continued growth in the future. The Abloy branding has also been refreshed to better represent its modern digital offering. The Abloy branding has also been refreshed to better represent its modern digital offering Valtteri Bottas was identified as the ideal match to embrace and reflect Abloy’s brand values, and a very natural fit for the most valued brand in Finland. Abloy will use the collaboration to promote and reinforce its new vision and values. Locking and door solutions Aaron Yule, Managing Director at Abloy UK, explains: “Valtteri fits perfectly with the message that we want to convey across global Abloy markets. He and the Abloy brand have many common values and qualities: trustworthy, technological pioneering, innovative, first-class performance and teamwork. These features support the values we have defined in our branding, which are summed up in ‘Abloy – For Trust’.” Valtteri Bottas added: “Success requires attitude, passion and willpower. You must be able to trust people, the power of collaboration, your team, your partners and the world around you. Above all, you must be able to trust yourself. Your ability to make things better.” This aligns perfectly with Abloy’s vision, which includes Abloy’s role as a trusted advisor that understands clients’ needs and operations, developing solutions and services to enhance business and secure people and assets. Access control solutions expert Abloy is an innovator and pioneer in locking, access control, door solutions and related services Abloy is also an innovator, a pioneer in locking, access control, door solutions and related services, offering solutions that are secure and easy to use. Abloy works hard to be a first-class service provider globally, to satisfy customers who demand the highest level of security, convenience and reliability. They have also built a strong community of true professionals who are proud of their achievements, consistently setting the bar high and aiming even higher. Aaron Yule concluded: “A brand must be actively nurtured to continually develop and grow in a positive way. The world around us is changing rapidly - and Abloy are investing and developing new products and technology to meet the current and future needs of the market. We are increasingly combining digital and mechanical expertise as we develop comprehensive solutions for our customers, and now is the right time to review and communicate our new brand values and identity”
ASSA ABLOY Door Hardware & Access Control is proud to announce that it will be exhibiting at the first ever The Security Event 2019, showcasing its latest security and integrated access control technology solutions. Taking place at the NEC in Birmingham from 9-11 April 2019, the show is a major new exhibition for the commercial and residential security market and is set to welcome more than 6,000 visitors. ARX security system ASSA ABLOY Door Hardware & Access Control will be available on stand SE172, alongside Abloy and HKC, highlighting how efficient and easy to install its innovative access control solutions are for security installers. Products that will be exhibited on the stand include eCLIQ, CLIQ Go, SMARTair and Aperio, as well as its extensive electromechanical offering and the ARX access control and alarm system. eCLIQ electronic key managementeCLIQ is a fully electronic key management system that delivers flexible and secure master key management to businesses, solving key control concerns eCLIQ is a fully electronic key management system that delivers flexible and secure master key management to businesses, solving key control concerns. The compact eCLIQ locking cylinder offers the highest levels of security. With the widest range of different cylinder types, the system is designed for every kind of use, from the company entrance gate to securing alarm systems, lifts, doors and cabinets. eCLIQ also helps solve the issue of lost keys, with users able to update access authorisations when required. It is easy to install too, with no drilling required, and offers a maintenance-free solution for up to 200,000 cycles. As such, eCLIQ is the only master key system a building will ever need. CLIQ Go electronic locking system CLIQ Go is a fully electronic locking system based on the highly successful and efficient CLIQ technology. The CLIQ Go app provides a high level of security and data protection and enables control over building security from a mobile device. The flexibility of key management is unrivalled when it comes to master keying for building security. CLIQ Go provides both security installers and business owners with the capability to manage access control on the go, achieved via a quick installation that requires no witting at the door. Operators can also easily revoke access rights via the CLIQ Go app, minisiming the risk of lost keys. SMARTair is a wireless online or offline fully scalable access control system that keeps users in touch with everything that’s happening in a building – who enters, where and when – ensuring complete control of site security. The new mobile app Openow will be presented at The Security Event too, which becomes a smartphone’s secure virtual credential. Aperio integrated access control solution Aperio enables mechanical locks to be wirelessly linked to an access control system in a convenient and cost-effective way Aperio enables mechanical locks to be wirelessly linked to an access control system in a convenient and cost-effective way. With products meeting BS EN 179 and BS EN 1125 standards, Aperio can help schools, universities and commercial environments cut energy costs, reduce time money spent on maintenance, and help deliver a flexible access control solution that can be easily adapted and updated when needed. Part of the Aperio range, the new H100 door handle will also be on display. Packing the power and flexibility of wireless access control into one slim, cleverly designed door handle, the Aperio H100 offers easy retrofitting to almost any interior door. It integrates with all the existing Aperio integrations seamlessly and can work within an online access control system or offline as a standalone device. ARX access control and alarm system ARX is a security platform with integrated alarm and access control capability, covering everything from fully monitored high security hard wired access control doors to wireless Aperio doors, in both on and offline configuration. The technology supports MIFARE DESFire EV2 and HID SEOS, providing the most secure credential formats available, while being a future-proof system too – BLE Pando Reader provides the ability to use a smartphone as a credential. Fully-monitored door security ARX creates a fully-monitored door environment, including electromechanical locks utilising ASSA ABLOY Hi-O technology Designed to easily integrate into third party security systems, and other ASSA ABLOY systems such as CLIQ and Traka, ARX offers an advanced graded alarm system, allowing deployment of dynamic lockdown with mobile notification to the ARX Go app. ARX creates a fully-monitored door environment, including electromechanical locks utilising ASSA ABLOY Hi-O technology. David Hodgkiss, Director of Access Control for ASSA ABLOY Door Hardware & Access Control, said: “We are delighted to be exhibiting at the first ever Security Event 2019 at the NEC in Birmingham, which will launch a new platform for showcasing the latest technologies and solutions available to security installers. As security threats become more diverse and complex, our latest solutions ensure security installers can specify a product for a customer that will overcome these challenges and deliver exceptional performance. We have a product offering that is truly unmatched, with one in every ten lock and security installations worldwide using our solutions. And with free coffee available on stand SE172 for anyone that comes and speaks to us about our access control offers, we look forward to welcoming everyone to our stand at The Security Event 2019.”
5 steps to finding the right access control system for youDownload
Why outdated access control systems are a big problemDownload
Five things to consider for AI with video technologyDownload
SMARTair wireless access control solution brings sensitive areas at the Syrenparken mental health treatment facility under total control
London’s Riverscape office building upgrades to Boon Edam Crystal TQ revolving doors and Lifeline Speedlane Swing optical turnstiles
- SMARTair wireless access control solution brings sensitive areas at the Syrenparken mental health treatment facility under total control
- London’s Riverscape office building upgrades to Boon Edam Crystal TQ revolving doors and Lifeline Speedlane Swing optical turnstiles
- Maxxess eFusion technology ensures enhanced security and safety at some of Dubai’s elite 5-star hotels
- Global police forces recognise biometrics as the key tool for enhancing public safety and effective policing