TAC Access Controllers(34)
High performance security system you can rely onAirports, utility companies, hospitals, universities and national laboratories, they all require seamless and 100-percent effective security systems they can depend on day in and day out. TAC and I/NET Seven provide powerful and reliable security solutions for some of the world’s most demanding applications, with features that make your systems easy to install, operate, integrate, expand and maintain, throughout the life of your facilities. No other security products give you the power of I/NET with the impeccable reputation and industry-leading performance of TAC. You can rely on TAC for all your security needs.Robust, stand-alone four-door access controller features:Up to four readers and four doors per controller for flexible configurationsFlash memory for easy online software updatesSupports two-man rule and escorted access for increased securityConfigurable audio tones to indicate valid card read, invalid card read and other types of eventsLarge alarm buffer protects integrity of alarm dataSmall footprint for easy installationDynamic memory management allows maximum storage of card holders and transactionsWide range of enclosures, battery options and power options lowers installation costsAdd to Compare
Browse Access Controllers
Access control controller products updated recently
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-based products We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile credentials applications We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customised action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future of biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video management platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access control world An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
Vandalism and arson attacks at schools have been on the rise in the Swedish city of Malmö since 2001. In the five years between 2001-2006, school property damage cost the city more than 60 million Swedish Krona (SEK), the equivalent of nearly $6.5 million USD. In addition to parents not feeling safe about sending their children to school, academic performance also dropped, as many students found it difficult to concentrate with so much disruption.The municipality of Malmö realized that something had to be done to increase security at its schools. The cost in damages was intolerable and the children's safety was a key issue. With a new state-of-the-art security solution, including an advanced video analytics system from VideoIQ, Malmö was able to achieve significant cost savings while offering students and faculty a new level of proactive security protection. The challengeAside from arson attacks providing a constant source of worry, one of the biggest problems in Malmö was vandals breaking windows and panes of glass. On one occasion in particular, 600 panes of glass were smashed at a school which cost 1.2 million SEK. Some students contributed to the archaic atmosphere at the schools by regularly pulling fire alarms, causing everyone in the school to immediately evacuate while the fire department surveyed the scene, only to determine there wasn't a threat. With each incident, feelings of anxiety and concern grew while time spent learning in the classroom was diminished. With no security system or mechanism in place, the school had to find a way to protect the staff and students and identify the culprits. To meet that need, Malmö municipality contacted systems integrator TAC Säkerhet to discuss the purchase and installation of a state-of-the-art surveillance system. Mårcus Djerf, business area manager at TAC Säkerhet, said: "The city of Malmö believed that the amount of money being spent to repair property damage caused by arson and vandalism could be far better spent on things like new computers and technology for the students, or on field trips. They sought something that would help prevent crime while allowing them to save considerable money."The solutionWith no security system or mechanism in place, the school had to find a way to protect the staff and students and identify the culprits The right solution for the schools came in the form of video surveillance cameras mounted at strategic, highly trafficked places across five schools. It was critical, however, that the solution didn't just consist of "dumb" cameras that passively record events while acts of crime go undetected. Said Djerf: "While recording events could help provide forensic evidence after an incident had taken place, Malmo wanted to be proactive and address potential security issues before they happened. We looked for an intelligent analytics system that would serve as the ‘front line' for the schools since they did not have any security guards on-site."TAC recommended the use of VideoIQ's HD Intelligent Video Analytics Engine, which acts as a digital guard, providing instant alerts and security protection across nearly any environment or condition, including bad weather and at night. The technology is in use at hundreds of customer sites around the world and is recognized for its ability to transform passive video surveillance into a dynamic, real-time and proactive system for early warning and security protection.Djerf said: "The VideoIQ HD system continuously watches for security threats across all of the cameras at all of the schools. Just one HD can simultaneously analyze eight video streams from eight different cameras. When an intruder comes onto the property, the system instantly captures a video clip and sends it to our remote guards and security personnel at the Malmö City Alarm Center who can then contact the police, fire department or other emergency responders.""The combination of VideoIQ's next-generation analytics and remote guards is the ideal approach to minimize costs while maximizing security protection," said Scott Schnell, president and CEO of VideoIQ. "Our technology works accurately and reliably in any weather, is simple to install and has been in use for years at schools, chemical sites, water facilities, border crossings, and many other kinds of businesses that want to keep their most prized assets safe."The VideoIQ HD system continuously watches for security threats across all of the cameras at all of the schoolsTAC also chose the VideoIQ HD Analyzer for its self-learning capabilities which enable it to learn and get smarter with each incident detected. The analyzer watches and learns its environment, as well as patterns of motion, so that it can instantly distinguish between a person, automobile, cat, tree, or any other object. Additionally, the system responds to rules established by the user, enabling a high level of customization and specificity to minimize false alarms and increase accuracy."VideoIQ's self-learning technology is a huge asset because the system recognizes viable threats instantly and accurately, which reduces the number of false alarms generated. This enables security personnel to respond only when needed, saving the city of Malmö considerable time, energy and money," said Djerf.The self-learning capabilities were not the only user-friendly feature that the VideoIQ HD Analyzer offered. VideoIQ is the only video analytics technology without required calibration and TAC found the system to be extremely easy and fast to install, without any lengthy testing or set-up time required. Said Djerf: "VideoIQ's plug-and-play approach saved us considerable effort, while ensuring very reliable protection." Another reason TAC chose the VideoIQ HD Analyzer is because it can work with any type of stationary analog PTZ or other video camera - whether color, black and white, thermal or ones that use infrared illumination. The ability to support a heterogeneous camera environment was essential since the cameras used by the Malmö schools come from a variety of camera manufacturers and vendors.The right solution for the schools came in the form of video surveillance cameras mounted at strategic, highly trafficked places across five schoolsThe resultAfter just one year of having the security system in place, the municipality of Malmö reduced costs by an astounding 90 percent and the city saved 3 million SEK on a reduction in smashed panes and broken glass alone. Djerf said: "Malmö's expenses were improved within a very short space of time. They now have more money which can be used to make other needed improvements at the schools. The security system is seen as an investment and one that will help reduce crime for years to come."Additionally, the number of false alarms has been reduced dramatically and both school personnel and students feel safer. Several of the teachers have reported an improved school environment and that the children find it easier to concentrate on their studies. "TAC's goal is to offer our customers effective solutions that improve security while increasing profitability. VideoIQ's intelligent security products are an important part of this equation and we are proud to provide the city of Malmö with a reliable, effective and easy-to-manage security system," said Djerf.
Chiron’s IRIS alarms-over-IP used in Danish education projects International building systems integrator TAC has utilised the operational benefits of Chiron Security Communications' IRIS alarms-over-IP monitoring solution to help protect a large educational institution in Denmark. As part of TAC's ongoing contract to install integrated access control and intruder alarm systems at a large number of on-site university buildings, Chiron's IRIS 840 IP dialler is being installed at each location.TAC's Project Manager - Technical support, Henrik Olsen, explains that his client required security coverage for up to 150 separate buildings within its large, distributed campus area, all of which will be linked to a common management system at a centralised control room. "We opted to use Chiron's IRIS system at every one of the locations because it's simple to install and engineer, as well as being reliable in operation in our experience," he says.So far, some 10 buildings have been completed in this ongoing project and the Chiron systems are transmitting alarm signal information via IP links to a third party alarm receiving centre, Rednings-Ringen, Lemvig A/S. Mr Olsen adds that the university employs some 5-10,000 staff and has around 30,000 students. Once fully installed, he adds, the IRIS system may be expanded to include visual verification of alarm alerts.Meanwhile, in another important move, TAC has also selected Chiron's latest IRIS Touch system for use with its powerful I/NET Seven integrated building control solution. Offering a comprehensive package for end users such as telecoms providers, manufacturing plants, military bases and government institutions, I/NET Seven's distributed architecture incorporates HVAC, digital video, lighting and access control. "We opted for IRIS Touch because it offers the most usable and user-friendly system available on the market and as such complements the I/NET Seven system perfectly," Mr Olsen comments."We opted to use Chiron's IRIS system because it's simple to install and engineer, as well as being reliable in operation in our experience"Chiron's Corporate Account Manager, Vikram Datar, adds that the advantages of IRIS and IRIS Touch alarm transmission and monitoring systems include faster alerting, cheaper line monitoring, a range of value-added services such as building management system monitoring, plus improved network resilience. IRIS Touch is a recent major update to the IRIS range that provides a variety of extra user-friendly features as well as a fresh new design and operating interface, which makes life much easier for end users and installers alike. It now boasts independent, Europe-wide VdS verification and accreditation - the benchmark standard most widely recognised across Europe."IRIS is now supported by around 100 monitoring centres across Europe and being used by businesses including Travelex, the largest retail foreign exchange specialist in the world, High St retailers such as Halfords, Toys ‘R' Us and Topps Tiles, leading financial institutions, as well as schools, petrol station operators, chemist chains and a variety of other companies," Mr Datar notes.Many alarm panel manufacturers are also now offering IRIS technology embedded within their panels, while an increasing number of insurers are backing the system too. IRIS offers the reassurance of secure primary and back-up communications routes between a monitored site and alarm receiving centre, while providing the ability to make tangible operating cost savings and significantly adding value to a company's existing IT network.
Day Automation, a TAC partner integrates security with building controls Day Automation Systems, headquartered in Victor, N.Y., experienced an 85 percent increase in product sales in 2008 from the previous year. Day Automation is the volume-leading partner for TAC, the building management, energy services and security solutions business of Schneider Electric. Day Automation attributes its strong showing to its dedication to expanding from building controls into the security market. With four office locations, Day Automation represents TAC for heating, ventilating and air-conditioning (HVAC) control, security and door access control, and digital video surveillance systems in Central and Eastern New York State.Day Automation, a TAC partner since 1978, began selling security the mid-90s, believing that it had the potential to be a major growth engine for its business. Success did not come easy or happen overnight; rather, it took a major commitment from management along with dedicated resources."We've recommended integrating security into building management systems for years, and I think the marketplace is becoming receptive to the advantages of this approach," said Eric Orban, president of Day Automation. "Integrated systems provide a tremendous amount of value, and our customers see the difference that Day Automation brings to the table. Our focus on quality is demonstrated by the fact that most of our business is generated by word of mouth from end-user customers to consulting engineers. As a result, we've been able to expand our security business through existing HVAC customers."In 2003, after observing other control integrators adding security to their portfolios and analyzing the security market, the Day Automation management team committed to making security a major part of its business and began to grow the offering. The company added resources to focus solely on security and to build out the expertise in-house by investing in the right people and putting a dedicated sales force in place.Day Automation, a TAC partner, attributes its strong showing to its dedication to expanding from building controls into the security market. "At that time, the marketplace saw us only as an HVAC systems integrator," observed Orban. "We anticipated that there would be a perception that we lacked security expertise and experience, so we made it our mission to attract and retain knowledgeable and dedicated people on staff. It's critical to be viewed in the marketplace as competent and capable - and this starts with building your knowledge base one person at time."This meant hiring a dedicated security sales professional from the industry as well as hiring students out of college and providing them with extensive on-the-job training and mentoring. Once the expertise and a sales force were in place, the next step for the partner was to carefully analyze the marketplace to determine the type of customers that would most benefit from its solutions. Then the Day Automation sales team began tapping into its existing customer base, which consisted mainly of HVAC customers."Our strategy today is that when we lead with BAS, we follow up introducing security. And when we lead with security, we introduce our BAS solutions," explained Orban. "We always make sure to bring all of our expertise to the table in order to maximize on the total opportunity."
Five things to consider for AI with video technologyDownload
OSDP is the strongest access control for your businessDownload
Preparing your organisation with quality situational awarenessDownload
- Vanderbilt ACT365 addresses access control security concerns at Study Abroad University, London
- Kwikset secures D.R. Horton homes by providing SmartCode 888 Deadbolt Lock
- LOCKEN secures Enedis national network’s substations by providing access control solutions
- HID Global provides RFID tags to EMBL Grenoble for better handling of biological samples at cryogenic temperatures