Gallagher Command Centre is a powerful access and control solution designed to give you complete site control. Fully configurable to suit the unique needs of your site, Command Centre allows you to define, manage and report on all aspects of your system. Everything that happens on-site is relayed to your Command Centre operators in real time, enabling a swift and appropriate response to security threats. Seamless integration with complimentary security and site management solutions means Command Centre delivers on its promise. You’re in command. Command Centre v8 introduces new Site Plan functionality for greater situational awareness and responsiveness; Broadcast notifications to Mobile Connect for better communication in emergency situations; and Status and Overrides REST APIs for increased integration flexibility. To learn more about Gallagher Command Centre, please visit security.gallagher.com or contact your local Gallagher representative.
With Openow™, facility managers and security administrators have more control and no longer need to administer physical credentials. And it’s fast and easy to upgrade an existing SMARTair® system to work with Openow™ or to install mobile-ready, wireless SMARTair® access control from scratch. The new Openow™ app has been designed around convenience, security and user experience with virtual keys. Information transfer between administration software, smartphone app and the SMARTair® device is protected by end-to-end encryption. “Right from set-up — involving simple, secure email subscription — users find the Openow™ app a joy to operate. Tap a SMARTair® lock with your phone carrying a valid virtual key, and the door unlocks. The device you carry everywhere — the smartphone — now replaces a separate RFID card with MIFARE®, DESFire, iCLASS® and other proximity technologies.” explains Félix Morán SMARTair® Product Manager at ASSA ABLOY. Openow™ also adds further layers of security to every premises Facility managers find life a lot simpler when managing access rights with the Openow™ mobile solution. Change the validation time in the administration software to automatically update a user’s virtual key (when the phone has a signal). Cancel a virtual key and it vanishes immediately from a user’s app. Facility managers can check and amend the validity of each virtual key whenever they want, and wherever they are. The complete mobile solution includes the SMARTair® device range, with wireless escutcheons and cylinders plus wall readers; the intuitive SMARTair® TS1000 software; user credentials, e.g. cards and the new Openow™ app. Business owners and directors project the right image for their premises when they offer mobile credentials via Openow™. Phones replace plastic key-cards, so there’s no need for a card activation terminal on reception or elsewhere. Users also save time, because there’s no longer any need to collect or validate an access card: your key is already on your smartphone. Openow™ makes it easy to organise virtual keys inside the app, check how long they are valid, and protect them further with an individual PIN. If you have virtual keys from multiple sites or premises, Openow™ easily handles those, too. No more key-card, or wondering where you left it; no more appointments to pick one up or have it revalidated. With Openow™, if you have your phone, you are already carrying your keys. The SMARTair® Openow™ app is free to download now from Apple’s App Store and the Google Play Store. For more information, see www.tesa.es/discoverwireless Across the EMEA region ASSA ABLOY offers SMARTair® under several trusted security brands, including TESA, Mul-T-Lock, ASSA, JPM, KESO, RUKO and TRIOVING.
The new Aperio® H100 packs the power and flexibility of wireless access control into one slim, cleverly designed door handle. With easy retrofitting to almost any interior door and comprehensive RFID compatibility, the new Aperio® H100 handle makes extending access control to more doors cost-effective by integrating with a vast range of third-party systems. The Aperio® H100’s stylish design is perfect for indoor office and facility doors. The Aperio® H100 can work within an online access control system or offline as a standalone device. A battery fits inside the handle, ensuring a minimal footprint and a discreet look to gel with any contemporary door style. The Aperio® H100 is easy to retrofit on existing doors, with no drilling and no wiring required. Any existing mechanical cylinder can still be used. The Aperio® H100 is specified with maximum flexibility and designed to fit almost any format of interior door. The Aperio® H100 is compatible with most common European (DIN) and Scandinavian mortise locks, in wooden, steel, tubular frame or glass doors with standard lock cases. It comes in left- and right-hand versions for a door between 35mm and 80mm thickness, with optional U-handle and USB adaptor. The Aperio® H100 is compatible with multiple RFID technologies, including iCLASS®/ISO14443B, iCLASS® SE, Seos®, MIFARE® Classic, Plus and EV1, and DESFire® SE. “Like all Aperio® devices, our new handle can upgrade site security for a very affordable price,” says Matthias Weiß, Product Manager Aperio® at ASSA ABLOY EMEA. “The Aperio® H100 further extends a range which adds access control wirelessly to exterior and interior doors, from fire and safety doors with regulatory requirements to meeting rooms, labs and offices.” The new Aperio® H100 handle completes a comprehensive range of Aperio® wireless access control devices that already includes online and offline Aperio® cylinders (C100/C900) and escutcheons (E100/E900); an online and offline lock (L100/L900); and a wireless lock for bringing server racks and cabinets (KS100) into the same access control system as doors.
The H4 Video Intercom integrates a 3 MP camera with a high-performance intercom and features exceptional wide dynamic range, low-light, noise reduction and echo-cancelling technologies for clear viewing and two-way communication with visitors. Combined with Avigilon Control Center (ACC) video management software, this secured entry system enables operators to quickly and easily identify and communicate with a visitor before remotely granting access.
The modern workplace never rests. People are always on the move and the environment is subject to constant change. As a result, the need for effective, flexible control and security is increasingly important. Every site has its own challenges and requirements; from the protection of files and documents to restricting access to sensitive areas in a medical centre or having real-time information about employee movements around a complex company. Intelligent online access control For every one of these needs and more, SMARTair™ Pro Wireless Online offers the ideal access control solution. This secure wireless system is quick and easy to install and provides cost-effectiveness by keeping energy use and maintenance costs to a minimum. The new SMARTair™ solution is an intelligent online access control system that uses bi-directional encrypted radio frequency communication to upgrade security and convenience for all building users. SMARTair™ wireless, battery-powered door devices communicate with the central control system via TCP/IP hubs. With SMARTair™, system administrators can now open secure doors from anywhere, configure a user’s access rights remotely, or obtain real-time audit trails for any access point within the organisation. Lost or stolen cards can be instantly cancelled. Simple and intuitive system software makes it easy for facility managers to receive active e-mail warnings and real-time reports, access real-time door updates, or modify the time and scheduling of access rights. Key components The system has a simple but effective architecture consisting of four key elements. Door and wall devices include wireless electronic escutcheons, cylinders and wall readers that can be installed at any type of exterior or interior door or access point. The SMARTair™ admin software is an intuitive management tool that offers flexibility and real-time control, accessible also from a secure portal that works inside almost any standard web browser. Communication hubs are the nexus between the management software server and the wireless online devices. Each can connect up to 30 access points at a distance of up to 30 metres. Finally, SMARTair™ supports all major RFID technologies, including iCLASS® by HID, MIFARE CLASSIC, DESFire and SKIDATA. It’s also compatible with multiple credentials for user convenience, including the SMARTair™ mobile phone app (Android, iOS, WinPho), cards, tags, bracelets and stickers. For more information visit www.tesa.es/discoverwireless
Complete access control and video management A browser and an internet connection are all that's required to access Vanderbilt’s latest addition to its cloud-based arsenal. ACT365 is a complete access control and video management solution. Ease of use and convenience are key ingredients to the product’s strength and depth in the field. ACT365 eases the installer's job for simple and quick installations and performing maintenance tasks remotely. The result is delivering ultimate control while saving time and money. With access to all sites from one online interface, installers can get more done, more easily, and in less time. Managing systems remotely Moreover, as ACT365 hardware is connected directly to the IP network, and no software needs to be installed as hosting is effectively outsourced, it ensures that the IT headaches of creating backups, VPNs, and port forwarding are things of the past. ACT365 also allows end-users the ability to manage their systems remotely including viewing live cameras. This remote monitoring capability makes it well-suited to multiple sectors. For example, dealing with early morning deliveries at a retail store is an ideal example of ACT365 in its prime. From the ACT365 app on their smartphone, the store manager can identify the courier through a live video feed and then remotely open the doors of the loading bay to allow the delivery to be made. The manager can monitor all of this remotely and once the delivery is finished, they can close the loading bay door and it will automatically rearm. Spotting misuse of gym membership Another instance of ACT365’s firepower can be seen at gyms or other types of membership clubs. If gym members are passing their access fobs to friends who are not members, ACT365 enables the gym manager to quickly match up access control events with relevant camera footage and email the clips to those members who are allowing their fobs to be misused. This is an effective way of ensuring the practice does not continue. As seen through numerous product demonstrations during IFSEC, ACT365’s features put the customer first. They eradicate once burdensome responsibilities that can now be promptly completed through the click of a button on mobile or desktop devices. Vanderbilt’s investment and innovation in cloud-based solutions harness the best efforts of the company’s core qualities – agility, adaptability, and dependability. Through the power of remote monitoring available from ACT365, Vanderbilt offers both installers and end-users convenience thorough simplicity.
“Where security is at home” at Security Essen, Hall 3, Booth F69. From 25 to 28 September, EVVA is presenting the home of security at Security Essen. At Stand 3F69, the latest products and updates can be tried out on the spot. The trade fair also marks next year's 100th anniversary of the long-established company.This will be the 23rd time that security experts from important branches of industry meet at this trade fair for four days and experience security innovations live. Security Essen is an excellent platform for presenting the latest trends in security technology. EVVA has been a byword for mechanical and electronic locking systems of the highest engineering standard for almost 100 years. What began in 1919 with the establishment of EVVA "Erfindungs-Versuchs-Verwertungs-Anstalt" still shapes the corporate philosophy: The company not only carries out research itself, but also develops and manufactures its own innovative access systems. EVVA is still a family-run business today and one of the most internationally successful companies in the industry. In 2019, it will be celebrating its 100th anniversary in style. Security Essen will mark the kick off of next year's 100th anniversary. New in the world of mechanics and electronics Trend scouts and curious visitors will be rewarded at EVVA’s stand 3F69 in Hall 3: Xesar has not only been upgraded, but further developed, with an entirely new system architecture included in the new Xesar 3.0 update. The new software makes it much easier for Xesar users to maintain control at a consistently high security level and with the greatest possible flexibility. The next generation of AirKey can be tested – with many smart, new features such as Send a key and Geotagging. EVVA experts will explain how to best utilise and combine electronic components. They will also be happy to answer questions on mechanical systems and to present the products and services in an interactive atmosphere. EVVA’s latest innovations at Security Essen: Xesar 3.0. Big ideas have been made a reality: Xesar has been upgraded and an entirely new system architecture has been developed with the new Xesar 3.0 update. The new software makes it much easier for Xesar users to maintain control at a consistently high security level and with the greatest possible flexibility. The advantages are plain to see: high scalability combined with many new features that open up an entirely new range of potential applications. AirKey. Smart, new features: AirKey represents modern and smart security: let your smartphone be the key. This access control system offers flexibility, independence and simple application. For anyone seeking maximum flexibility and maximum security – be it professionally or privately. SYMO: Need to shorten or lengthen a cylinder easily on site? No problem, with EVVA’s SYMO range. And on-site assembly is quicker than ever. The individual SYMO components can also be used in different systems.
The new CLIQ® Connect solution is a simple and cost-effective way for facility managers to administer mobile workers’ access control rights. Facility managers can update, amend, revoke or renew access rights remotely using the CLIQ® Web Manager software and the latest Bluetooth technology paired with a mobile phone. This enables a mobile worker in any location to access locks. They simply open the CLIQ® Connect app on their mobile phone to transfer updated access permissions instantly to their programmable CLIQ® key via Bluetooth. Flexible access control and key management CLIQ® is a locking system with high-end microelectronics powering programmable keys, cylinders and padlocks. It provides flexible access control and key management solutions for all kinds of locking applications, including those at critical infrastructure sites. With CLIQ®, each employee or contractor has tailored, individual access rights based on the specific time and date needed, all stored in their own programmable CLIQ® key. A lost key no longer threatens site security: system administrators simply remove its access permissions via the user-friendly CLIQ® Web Manager software — anytime and from anywhere. CLIQ® Connect app The new CLIQ® Connect app, part of the trusted CLIQ® ecosystem, makes mobile workflows even smoother. A keyholder no longer needs to update access rights physically in person, carry additional updating devices, or even return to base. CLIQ® Connect supplements — rather than replaces — wall or desktop programming devices (PDs). No additional hardware is needed, so off-site workers can amend their access rights without any need to carry mobile PDs. All they need is a smartphone and the CLIQ® Connect app. Data transfer between system and app is encrypted. The app pairs any programmable CLIQ® Connect key, via a secure cloud connection, with the CLIQ® Web Manager system. To change a keyholder’s access rights, the system administrator simply accesses the CLIQ® Web Manager software — from anywhere — and updates it. The keyholder makes a secure Bluetooth connection between the programmable CLIQ® Connect key and the app to instantly update their access permissions. Audit trails for any CLIQ® Connect key can be generated on demand, or automatically uploaded when a key’s access rights update takes place. The CLIQ® Connect key and companion app bring real-time security into the mobile era. Streamlining complex workflows “We designed CLIQ® to help our customers make their complex workflows more efficient,” says Kevin Hoare, Director Business Development CLIQ® at ASSA ABLOY EMEA. “With CLIQ® Connect, it’s now even easier to amend any time- or location-limited access rights that have been issued to remote workers. CLIQ® Connect significantly boosts site security, because access rights with very short validity are much easier to administer — making it even less likely that any lost key would pose a security threat. It slashes the time wasted on administering access rights, and saves money that would be spent on programming devices and key management systems.”
With the new CLIQ® Go app, businesses can unlock the power of access control, saving time and unnecessary workload in the process. CLIQ® Go locking technology allows users to manage security and access rights on the move, on the road and from anywhere in the world.Manage your system with the CLIQ® GO appThese days, all you need is an app to help you find a route, choose a restaurant, read a spreadsheet or check your bank balance. Now there’s an app that can help you manage your company locking system, too. Designed for busy managers, CLIQ® Go saves time and puts a digital solution in the palm of their hand. “CLIQ® Go is the ideal security system for small- to medium-sized businesses,” says Kevin Hoare, CLIQ® Business Development Director at ASSA ABLOY. “Managers don’t want to be wasting time changing all their locks because someone lost a key—and with CLIQ® Go they don’t need to. The ability to configure access control is at their fingertips.” Managers can administer their CLIQ® Go system in the cloud and from a mobile phone, tablet or PC, via a brand new, intuitive app. A few taps and swipes of the screen is all it takes to revoke, supervise or amend individual access rights. Keep your business on the move The mechatronic CLIQ® Go system combines the best of mechanical and electronic security to meet the needs of a busy workplace. The electronic lock’s power is provided by a battery inside every programmable key, meaning it works independently of mains power. The system is designed to fit existing doors and lock cases, making it cost-effective and hassle-free to install. Site security can get the CLIQ® Go upgrade with minimal disruption to day-to-day operations. The cylinders and keys are built to withstand the elements, so can be used on interior and exterior openings, and work across multiple types of enclosure – not just doors but cabinets, cupboards and padlocks, too.
Vanderbilt released the latest version of ACT Enterprise on 25 September at the 2018 Security Essen event. What is it? ACT Enterprise is the control software suite for ACTpro hardware and streamlines the installation, management, and monitoring of the ACTpro access control system. The latest ACT Enterprise features include integration with Vanderbilt’s award-winning SPC intrusion system, a rules mapping engine, and a smartphone app. Why does it matter? The ACT Enterprise Apple and Android compatible apps mean real-time monitoring, user management and administration from your smartphone. You can lock and unlock doors, authorise users and check who’s in and who’s out – wherever you are. The ability to integrate with SPC further highlights the depth that the new feature set brings to the product’s strength. Now on one screen you can have high-quality graphical maps showing all access and alarm points from both systems, and you can control all devices with the click of a button. How does it work? One of the key new features in this ACT Enterprise release is rules mapping. The rules mapping engine offers the customer an intuitive method to create rules based on access control events and Boolean logic. It does this by permitting the creation of logical relationships between system elements through a drag-and-drop interface. For the end user, this addition ensures that system interactions can be seamlessly introduced on a system-wide basis, thereby enabling a higher level of added value to be realized, both for security and business-based functionalities. The ACT Enterprise rules mapping engine ensures intuitive, easy-to-use I/O management for trigger detection with compatible devices. These devices are usually attached to a door or an automated electrical that closes the circuit on the I/O unit. When this circuit is closed, an alarm is sent over the network, and ACT Enterprise captures that.
Nedap’s new end-to-end security solution is the first to offer digital protection for access control by unifying best practices from both IT and physical security. Protecting access control systems Until now, the latest best practices protecting IT systems from digital threat haven’t been used for physical access control systems. This is an oversight that is leaving many companies vulnerable to cyber attacks. Nedap and AET Europe have worked together to overcome this by developing AEOS end-to-end security. Taking a forward-thinking new approach, they have combined the best practices of both IT and physical security in an all-in-one access control system. Albert Dercksen, Head of R&D at Nedap, explains why AEOS end-to-end security is needed: “IT and physical security have been following different rules to protect systems. But modern access control systems are, in fact, IT systems connected to corporate networks and should be treated as such. That’s why we’ve applied the digital security principles used in IT to AEOS, our physical access control system.” Communication secured from end-to-end In AEOS end-to-end security, Nedap and AET Europe have combined the IT principles of encryption and strong authentication. This ensures storage in every element of AEOS is secure, as is communication between all elements. Both DESFire keys and digital certificates are stored in a Secure Access Module (SAM) inside door controllers. This leaves card readers with no role in decrypting data, so secure communication between card and controller is guaranteed and, by storing digital certificates in the same SAM, strong authentication is achieved to ensure secure communication between controller and server. Protect critical infrastructure In this way, AEOS end-to-end security offers far higher protection against both physical and digital threats. It also enables keys to be updated securely and centrally, without having to physically attend each card reader. AEOS end-to-end security meets a stringent level of security requirements across Europe, and is already being used to protect critical infrastructures in several countries. In France, for example, it has gained CSPN certification from the French information security agency, ANSSI.
HID Location Services platform addresses workplace optimisation, on a growing market need for accurate, real-time location awareness and analysis of your workplace. The system combines the power of Bluetooth Low-Energy (BLE), Wi-Fi, and cloud-based technologies to provide a unique seamless user experience inside and outside of the workspace. Organisations receive increased visibility into the precise location of their workplace in a defined space (indoor positioning/outdoor positioning) and can use predictive analytics to quickly understand space usage and building operational efficiency.
Traditionally, an advanced access control system has consisted of several layers of hardware, with each layer comprised of multiple components. The LNL-2220 flattens this into a single layer, eliminating the separate controller layer entirely.The LNL-2220 revolutionises access control system architecture by allowing Ethernet connection directly from an entry location to the server. It provides the security, functionality, and modularity of Lenel's proven hardware platform, by combining an IP-enabled intelligent system controller with a full-featured, two-door reader interface module. It is a new class of device that makes access control simpler, more powerful and more reliable, and is the perfect solution to enable any reader to become an IP reader.Key features include:Native Ethernet for direct connection from its processor to the security LANUp to eight times the throughput of serial-to-Ethernet conversion used in previous generation devicesFaster downloads, a dramatic increase in performance, reduced installation time, and fewer connections-for greater reliabilityThe convenience of IP-to-the-edge with the security of dedicated reader wiring through the secure perimeterOn-board reader ports support D1/D0, Clock/Data, F2F, and the OSDP open standard for bi-directional communication with access readersComplete flexibility in choice of reader brand, technology and form factorBroadest support for biometric and smart card technologies in the industryDownstream RS-485 port connects up to 32 devices (64 doors), providing an inherent growth pathFault-tolerant, with the highest level of offline performance possibleAdd to Compare
Access Control Technology (ACT) Ltd. has launched a new access control solution that has been designed to suit all types of SME’s located in a single building and not requiring more than 32 protected doors. The ACTpro 1500 single door IP controller can be set-up and administered via its built-in web server or through the established ACTWin software application. Key features include voltage monitoring, break glass monitoring, status LEDs for fault indication and cable management improvements such as a raised PCB and more space in the enclosure. It is expandable to up to 32 doors via ACTpro door stations and supports 15,000 users. For sites with only one ACTpro 1500 the built-in web server is ideal for setting up and administrating the access control system. The web server reduces the potential for IT issues e.g. getting access to a PC, passwords, etc when installing applications. The simplicity of the web interface decreases the time spent on configuring and administering the system and on training the end user. The ACTpro 1500 system can be accessed, via a web browser, from any PC on the LAN The new ACTpro reader range combines ACT reliability with a modern and elegant design that will fit into any environment. These multi-format RFID readers are available as pin, pin & proximity or proximity only options. Suitable for both indoors or outdoors they have mullion, surface or flush mount options. Download ACTpro 1500 Access Control Solution BrochureAdd to Compare
The ACTpro 4000 two door controller from Access Control Technology (ACT) Ltd is the latest product to be added to the hugely popular ACTpro range of access control solutions. This two door controller has been designed to suit installations where the traffic volumes are large and changes to the card holder database are a daily occurrence. Networkable to up to 4,000 doors the ACTpro 4000 can manage up to 60,000 users and changes to large databases can be affected up to ten times faster than previously. Installation has been simplified by the inclusion of an auto-discovery button in the ACTWin 2.8 software. When this is pressed all the controllers and door stations on the network are located. The installer can view the controller configuration and verify network communications via a specially designed controller status web page. The ACTpro 4000 is a popular addition to the ACTpro range. This scalable card access control system has been designed to facilitate the most demanding requirements for any size of enterprise. Highly flexible and feature rich the ACTpro access control solution can currently be found in government sites, major educational facilities, pharmaceutical organisations, hospitals, prisons and retail chain stores.Add to Compare
Networkable, 1 doors/controller, 100,000 cardholders, Offline Capabilities, Networkable, TCP/IP Network Interface and RS-485 Interface, Universal / Wiegand Reader Interface, 12 V DC, 370 x 345 x 90, -20 ~ +65 C (-4 ~ +149 F), 10 ~ 90Add to Compare
Browse Access Controllers
Access control controller products updated recently
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. Impact of technological developments While market growth rates have been consistent, technological developments have dramatically impacted the market in 2018. The most prominent trend involves mobile credentials, which are poised to revolutionise the longstanding business model for access control system sales. The mobile credentials market was still in its infancy in 2018, but many end-users are already anticipating a transition to these credentials by installing compatible readers in their systems. By 2020, over 10 percent of all new readers sold in the market will be compatible with mobile credentials. Access Control as a Service Other trends to watch in 2019 and beyond include Access Control as a Service (ACaaS), which allow end-users to avoid the need to invest in costly on-site IT infrastructures to support their access control equipment. ACaaS solutions will be particularly popular to support small and mid-sized projects that service less than fifty doors. In addition, Bluetooth Low Energy (BLE) beacons will support geopositioning in an increasing number of the world’s most advanced access control systems. Through geopositioning, the exact location of specific personnel can be identified at any site in real-time. The top fifteen access control vendors represent more than half of the total size of the global access control market, but there are pockets of opportunity for new vendors, particularly to accommodate small and mid-sized projects. The mobile credential and ACaaS markets will also be highly competitive in 2019 and should attract an influx of new market entrants.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies acquires Arecont Vision after bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion acquires access control company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilise power over ethernet, making them easy to install and cost effective as they utilise existing customer infrastructures. The company is based in Boulder, Colo. 5. HID buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam announces acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal acquires U.S. Security Associates Allied Universal, a security and facility services company, finalised its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT acquires Red Hawk Fire & Security (and others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies continues to acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Is your access control as effective as you think?Download
How to get buy-in from IT departments on IP video installationsDownload
The role of IT in physical access controlDownload
- HENSOLDT upgrades Eurofighter’s radar system to enhance its capabilities and survivability
- Amthal secures St Albans School by upgrading security systems to create a secure environment
- Primark equips its distribution centres with intelligent Traka DockSafe solutions
- PACOM security and access control solution installed by Secursat at Replay in Italy