HID Global’s iCLASS SE Platform expanded to include Credential Encoding Solution
HID Global’s iCLASS SE Platform expanded to include Credential Encoding Solution

The new iCLASS SE Encoder, a desktop solution and developer toolkit (DTK) from HID Global enables organisations to encode and instantly issue cards using a single device. The multi-technology encoder makes it easier for customers to migrate from current technologies to the higher security, adaptability and portability of the company’s iCLASS SE access control platform. The solution gives organisations the convenience of encoding a broad range of current and future technologies, with the option for customers to create and manage keys and configure readers locally or through HID Global’s iCLASS and SE Elite programme. “Migrating current systems to operate with our iCLASS SE platform has never been easier with the new iCLASS Encoder that empowers customers to encode and format an extensive range of credential technologies, on demand, through an easy and straightforward process,” said Helmut Dansachmueller, vice president of product marketing, credentials and embedded technologies with HID Global. “HID Global’s goal with the encoder is to give users the technology flexibility and confidence in their access control systems investments as they move to high frequency and future technologies.”   The iCLASS SE Encoder provides an entirely open solution and that allows organisations to encode multiple credential technologies, including both genuine HID and third-party credentials, in order to upgrade existing card populations for use with iCLASS SE platform readers. For maximum interoperability, the solution supports Seos, iCLASS SE, standard iCLASS, MIFARE Classic and MIFARE DESFire EV1. The encoder also supports 125 MHz HID Prox for encoding Prox credentials as well as migrating from HID Prox to high frequency technologies. Users can seamlessly and easily migrate from one technology to another by simply extracting access control data from an existing card and writing it to the new credential, without having to manually input data or understand encoding details. For even higher security, users can “wrap” their access control data within a Secure Identity Object (SIO) and then write it back to the same card.  Based on open architecture, the encoder enables SIOs to be added to the full range of supported cards, including MIFARE and DESFire credentials. The HID Global Developer Tool Kit (DTK) for the iCLASS SE Encoder Platform is designed for systems integrators, OEM’s and solution providers who wish to integrate contactless encoding capabilities into their products and leverage the advantages of the iCLASS SE ecosystem. Key features: Programme standard security or Elite credentials Securely manage credential keys Multiple format support Programme Genuine HID or third-party credentials by downloading appropriate Encoder Credits Developer Tool Kit (DTK) provides all the necessary tools, documentation and developer resources to allow integration of the iCLASS SE Encoder into third party applications. HID Global is also introducing a flexible credential encoding applet structure that is based on an easy-to-manage credit system. Users install only the applets they require for the technology credentials they currently need, and can add applets to support other existing or future technology credentials over time. In addition, the iCLASS SE Encoder is field-programmable and upgradeable for added versatility.   The encoder is part of HID Global’s award-winning iCLASS SE platform, which empowers users to implement a combination of credential technology, traditional smart cards and smartphones that meet the specific needs of their access control system. HID Global also plans to offer credential encoding capabilities via its FARGO printer line and its HID Secure Identity Services portal. For more information visit: https://www.hidglobal.com/developer-center/iclass-se-encoder-platform

Add to Compare
HID Global unveils turnkey ActivID Appliance solution for strong and versatile authentication
HID Global unveils turnkey ActivID Appliance solution for strong and versatile authentication

HID Global, a worldwide leader in secure identity solutions, today announced its new ActivID Appliance solution for strong authentication. Enabling organisations to protect corporate data against unauthorised access, ActivID Appliance is an essential component to ensure enterprise data security across numerous industries including banking, government and healthcare. Targeted at medium to large organisations, the versatile appliance is interoperable with the widest range of authentication methods to ensure an organisation’s employees, consultants, partners, and customers have secure and appropriate access to corporate data and online applications.   ActivID Appliance, formerly 4TRESS Authentication Appliance, is a full SAML v2 compliant identity provider, available as both a hardware appliance and a virtual appliance. Providing comprehensive multi-layered and versatile strong authentication, including ActivID Threat Detection Service, it gives enterprises the ability to secure a mobile workforce, enabling the use of personal and corporate mobile phones for two factor authentication. “HID Global works closely with customers in every industry, from banking and government to healthcare and the enterprise, and their feedback is consistent across the board – they need a reliable and secure way to validate user identity that does not add unnecessary complexity to their existing environments,” said Yves Massard, director of product line management, Identity Assurance with HID Global. “We developed the ActivID Appliance based on this input to improve the ease of deployment and management, while ensuring the highest level of security for end-users accessing data over the public Internet using all types of devices.” New ActivID Appliance Features: Simpler and improved high-availability with automatic recovery after network failure Customisable and customisable self-service portal allows users to establish and maintain their own credentials or tokens without IT admin support Control over which soft token platform is used in a particular environment (e.g. a user can decide to enable iOS, Windows and Blackberry but disable           usage from Android and J2ME phones) Version control for any and all soft tokens, providing customers with additional options for risk mitigation Multiple security domains, allowing segregated management of different groups (e.g. employees and customers) SNMP v3 monitoring Premium hardware support option with advance replacement and on-site warranty replacement Availability HID Global’s ActivID Appliance is available immediately through channel partners. Click here for more information: http://www.hidglobal.com/products/software/identity-assurance/activid-appliance

Add to Compare

Access control systems & kits - Expert commentary

Physical access control: Critical steps to ensure a smarter future
Physical access control: Critical steps to ensure a smarter future

Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption. Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalisation bringing multiple business benefits, which would simply not be possible using traditional models. Digital transformation While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment. Yet, with more organisations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximise the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge. Improved access control in smart environments These urban constructs are capable of reducing waste, driving efficiencies and optimising resources The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimising resources and increasing citizen engagement. Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. Frictionless access control During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity. Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimising the risk of infection, by removing the need to touch shared surfaces. Such systems can be customised and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful. Barriers to adoption Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant. Many are now beginning to realise that connected network-enabled solutions are here to stay Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space. Time will not stand still, and many are now beginning to realise that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature. The importance of cyber hygiene Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks. Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT). While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited. Cyber security considerations Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognised cyber security principles, incident reporting and best practices. It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security. The future of access control There is a natural dispensation towards purchasing low-cost solutions There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organisations by their association. The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world. Cyber security key to keeping businesses safe In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies. As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor. The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.

Automatic Gates – The latest development in access control
Automatic Gates – The latest development in access control

Automatic gates remain an increasingly popular security choice for family homes, business premises or public buildings – anywhere that full control over access is needed. While there is much to consider for installers when advising clients on the right solution for their property, from the size, weight and cost of a gate system, it’s useful to be aware of the latest developments in the market, as this can help to find the right option to fit their needs. The need for speed Gates can be automated to either swing or to slide open, and there are many factors to take into consideration, when advising on which option to use. However, swing gate motors tend to be slower than the speeds achievable for sliding gates, which means the latter are usually more popular, especially for commercial sites where timing can be among the more important factors. One of the most recent developments in the sliding gates market is the introduction of faster motors One of the most recent developments in the sliding gates market is the introduction of faster motors, such as those from Bft Automation, which allow for opening and closing at a quicker speed than has previously been achievable. Fast authorised access control From a security point of view, the ability to allow people and goods in and out of a property at a quicker pace reduces the risk of unauthorised entry, while waiting for a gate to close – an important consideration in both commercial and residential contexts. Other benefits of a faster motor include reduced waiting times. This can be particularly useful for properties in busy areas, where a vehicle could risk blocking traffic, while waiting to turn into a site controlled by a slower gate. Faster motors Also, a faster motor could potentially reduce the risk of an accident from vehicles entering a property at speed. For example, this might happen if someone was making their first visit to a property situated off a fast road in an unfamiliar area. Beyond these practical considerations, in today’s fast-paced world, people aren’t as used to having to wait for things and this applies to the time it takes to get in and out of their own property. So, security benefits aside, faster motors are likely to be more appealing for clients who have sliding gates fitted to their domestic property and who prioritise convenience. The choice of which of the new faster motors to use will be impacted by a number of factors, including the weight of the gates. Essentially, the lighter the gate is the higher the speed achievable. And, as always, it’s important to make sure that any installation complies with safety regulations. Intelligent torque management systems A further development in access control technology includes intelligent torque management systems A further development in access control technology includes intelligent torque management systems, which update the level of torque required to perform the gate’s operation, allowing it to work at the optimum level, regardless of weather conditions, temperature or the degree of wear and tear on the device. Depending on the typical weather conditions experienced at the site and the anticipated frequency of use, it’s worth looking at options that take these factors into account. Importance of security rights In some scenarios, it’s important for particular individuals to have security rights. In which case, there are motors available that come with personalised keys, which are unique, providing an additional level of security. Installers often face the challenge of fitting gate motors in confined spaces, potentially making for a time consuming and technically demanding task. Available space When you only have a small space to work with, simple details can go a long way to helping you. For example, by putting the fastening screws on the front of a motor’s casing, installation and maintenance are easier and more convenient, even in particularly compact areas. Working with suppliers that offer more than just a manual means you’ll have access to advice and support on how new products work in practise and what you need to consider before advising on an installation.

Why visualisation platforms are vital for an effective Security Operation Centre (SOC)
Why visualisation platforms are vital for an effective Security Operation Centre (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualise and share the multiple data sources needed in an SOC today. Security Operation Centre (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualisation platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analysed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualisation. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centres of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualisation and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Centre, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organisation’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favour of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centres, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. Hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centres. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organisations with physical and cyber security needs.

Latest HID Global news

Which security markets are embracing touchless and contactless systems?
Which security markets are embracing touchless and contactless systems?

The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why? 

Arcos Bosques Tower 1 selects HID Mobile access solution and readers for secure, touchless access control
Arcos Bosques Tower 1 selects HID Mobile access solution and readers for secure, touchless access control

HID Global, a pioneer in trusted identity solutions announced that the Arcos Bosques Torre 1 (Tower 1) has deployed its access control solutions to heighten security and better manage visitor entry.  Located in the Bosques de las Lomas neighborhood of Mexico City, the center is comprised of six buildings. The complex includes two skyscrapers and is home to high-profile law firms, industrial, mining, media, and technology companies, and one of the city’s most recognised shopping centers. HID readers and smart card technologies With the help of system integrator Logen, Arcos Bosques Corporate Center chose HID Mobile Access® solutions as well as HID readers and smart card technologies for tenants and visitors to securely pass through its 16 turnstiles and use the 32 elevators that lead to their offices. The HID solutions also give tenants the choice of using their mobile devices or physical smart cards for entry. Touchless and safe entry  HID’s mobile access solution enables administrators to remotely manage credentials by cloud-based infrastructure “Accessing the building by simply presenting a mobile phone makes a lot of sense as we look for ways to eliminate touching things during the global pandemic,” said Santiago Morett, Project Manager at Servicon, facilities manager for Arcos Bosques. “HID Mobile Access has given us touchless entry and safer building security, which is more important than ever for our tenants.” Mobile access solution HID’s mobile access solution also enables administrators to remotely create, issue, manage and revoke credentials through the cloud-based infrastructure. Servicon, the facility management company for Arcos Bosques, now has continuous building access visibility through a unified, up-to-the-minute database of the tower’s tenant names, affiliated companies, and work locations. "Building security today extends not only to who has access but also to how individuals can enter a facility,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. “HID’s access control solutions provide the foundation for optimal oversight and control while also keeping people healthy and safe.”

HID Global expands RFID tag family with HID SlimFlex Ultra technical label and HID Seal Tag edTamper Aura RFID tags
HID Global expands RFID tag family with HID SlimFlex Ultra technical label and HID Seal Tag edTamper Aura RFID tags

HID Global, a globally renowned company in trusted identity solutions, has announced two new additions to its broad family of RFID asset-tracking tags. The HID SlimFlex Ultra technical label is optimised for the strongest durability compared to other labels, and the HID Seal Tag edTamper Aura is designed to securely track and trace highly sensitive materials and digitally detects unauthorised access to sealed containers like boxes or crates. “We continue to solve customer challenges across a variety of RFID applications, from monitoring individual items under harsh conditions to ensuring that the seal integrity of secured inventory or high-value commercial shipping goods has not been breached,” said Jean-Miguel Robadey, Vice President of Industrial Smart Components with HID Global. HID SlimFlex Ultra RFID tags HID SlimFlex Ultra RFID tags’ special construction increases durability The HID SlimFlex Ultra RFID tags’ special construction increases durability when mounted to non-metallic flat or slightly curved surfaces. It joins HID’s comprehensive family of High Frequency (HF) and Ultra-High Frequency (UHF) RAIN RFID tags that withstand exposure to harsh elements, chemicals, and extreme temperature for waste management, food distribution applications, and other asset tracking applications. Custom colours are available, as well as 1D/2D barcode and laser-engraving options for special branding or other identification needs. HID Seal Tag edTamper Aura tags Affixed to metal, non-metal items or containers, HID Seal Tag edTamper Aura tag combines tamper-evident fasteners with RFID technology that transmits item ID, seal status, and a digital notification when a seal is compromised. They can be used for scanning large sets of sealed items such as weapons, racks, controlled medications, or other assets needing protection. The main advantage of the new tag is that users can itemise and detect the status of the assets, without opening the storage container during security checks, using RAIN RFID hand-held or stationary readers. HID’s diverse line of RFID tags HID offers one of the industry’s most diverse and flexible lines of RFID tags and transponders for tracking objects, monitoring activity, and improving processes. Its offering is backed by more than two decades of RFID development and manufacturing expertise.

Related white papers

School security moves to the cloud

Wireless Access Control eBook

Four areas to consider in frictionless access control