Genetec Access Controllers (1)
Addressing longstanding customer demand for non-proprietary access control solutions, the Synergis Master Controller (SMC) from Genetec is a controller that allows users to modernise their security operations, migrate to an IP-based access control solution, while leveraging their networking infrastructure and existing equipment and wiring. The SMC is a key component of Synergis, Genetec’s IP access control solution, which facilitates real-time monitoring of access events and alarms, as well as cardholder management and reporting. When used within Security Center, Genetec's unified security platform, the SMC becomes a catalyst for organisations to evolve to a unified approach for security management. Genetec customers can seamlessly blend their IP video surveillance, access control, license plate recognition, and intrusion monitoring needs within a single unified platform. "For some time, we'd been wanting to move to a unified security solution for access control and video, but could not afford to waste the significant infrastructure investment we had already made in our access control installation,” states Dick Hamann, Vice President Information Technology and Resources/Chief Information Officer, Seminole State College of Florida. “What we really needed was a solution that could leverage and take control of our existing equipment. When Synergis Master Controller was brought to our attention, we decided to set up a pilot site to test it in one of our buildings. The SMC exceeded our expectations; we were impressed with how easy the migration was and how well it performed. The success of this pilot essentially clears the path for us to fully migrate the rest of our facility, while also enabling us to take advantage of Security Center video to build a unified system." To help customers speed up deployment time, reduce costs and ensure that their security investment will be protected for years to come, the SMC features native support for non-proprietary access control hardware from Mercury Security and HID Global. Supported interface modules include the VertX V100, V200 and V300 from HID, and the MR52, MR50, MR16IN and MR16OUT from Mercury. The SMC supports 32 downstream modules, connecting to up to 64 readers, as well as being able to monitor hundreds of zones and alarm points. Both Mercury and HID modules can be supported on the same SMC. Thanks to advanced security functionalities, SMC users can implement greater levels of security to protect their workforce, visitors, and assets. To ensure the highest level of security, communications between the SMC and Synergis software are authenticated and encrypted. Using the SMC's and Security Center’s threat management capabilities, users can quickly respond to changing security conditions and alter the behaviour of their security system accordingly. Users now have the power to restrict or override physical entry to a specific area, building, or across an entire organization, or can trigger a full lockdown at a moment's notice. As a true IP device with two on-board Gigabit Ethernet ports, the SMC allows users to efficiently leverage their corporate or security network and reuse much of their existing access control infrastructure such as readers, credentials, compatible interface modules, and wiring to transition into a fully IP-based access control system. “Above and beyond offering additional hardware options to our customers and freedom of choice, the SMC will also make it easier and less costly for users wanting to modernize their legacy access control system and move to a unified security platform," says Jimmy Palatsoukas, Senior Manager of Product Marketing at Genetec. Genetec also offers its customers access to a full line of enclosures and power supplies, as well as several pre-wired enclosures with the SMC, power supply, HID, and Mercury modules. These off-the-shelf and pre-wired kits help reduce wiring and hardware deployment time. To further simplify the installation process, advanced options available with the SMC allow customers to configure their access control software, doors and SMC units prior to actual installation. DHCP support and an advanced controller discovery tool virtually automate the enrolment process. Maintenance activities such as upgrades and troubleshooting are made easy thanks to an intuitive web interface.Add to Compare
Browse Access Controllers
Access control controller products updated recently
While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimising operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilising data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behaviour. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customisation while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.
From analogue to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamour for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone has entered a restricted area: – it simply isn’t efficient. For similar reasons, a building manager wants a single interface to control heating and lighting to match fluctuating occupancy levels, particularly in a hybrid working model. Applying the digital glue The demand from end-users for system convergence is growing, but to achieve full interoperability you still need to apply some ‘digital glue’ and that requires expertise. Yet bringing together disparate systems from different manufacturers can be problematic. Just as you get things to work, someone upgrades their solution and your carefully implemented convergence can start to come unstuck. Managing an implementation can quickly become more complicated, today’s quick-fix can become tomorrow’s headache This is one of the principal issues with all types of new technology; not everyone will choose the same path to reach the desired goal – it’s the old VHS/Betamax argument updated for building management and security systems. Managing and maintaining an implementation can quickly become more complicated than it first appears and without proper oversight, today’s quick-fix can become tomorrow’s technical headache. Effective support for a hybrid workforce Today’s hybrid workforce is a response to the pandemic that looks set to become an established part of working life for many companies across the world. Security systems have a massive role to play in facilitating this transformation that goes beyond simple intrusion detection, access control, and video monitoring. They can identify the most densely populated areas in a building to comply with social distancing guidelines and provide efficient use of space. The insights gathered from a security system can also be used to identify patterns of behaviour, which can then be used for planning and directing the use of building space to help create the best possible working environment while also minimising heating, lighting, and air conditioning expenditures. Identity credentials can help manage compliance with industry regulations by limiting access to certain areas Similarly, identity credentials – either biometric or mobile-based – can help manage compliance to industry regulations by limiting access to certain areas only to approved employees. Creating and maintaining the appropriate level of functionality requires a combination of innovative solutions and industry experience. The complete security package It’s not just physical security that’s important – cybersecurity is a major focus, too. Bringing together both the physical security and cybersecurity realms is increasingly becoming a ‘must have’ capability. What is evident is that the pace of technological change is faster than ever. Today’s functionality simply wouldn’t have been possible just a few years ago, while today’s leading-edge developments may seem commonplace in five years.
To comply with regulations for the credentialing of airport and airline employees and contractors, airports have to undertake complex and time-consuming processes to issue and administer badges or face hefty fines. To help airports of all sizes automate and simplify this process, Genetec Inc. (‘Genetec’), a technology provider of unified security, public safety, operations, and business intelligence solutions, announces its new Genetec™ Security Center Airport Badging Solution (ABS). Multiple different systems The Security Center Airport Badging Solution provides an industry-first: a simple, out-of-the-box solution for airports that ensures compliance, simplifies the badging process, and lowers the overhead needed to run a badging department. ABS reduces the need to work with multiple different systems and reduces incompatibility issues. This not only minimises the risk of potential human error that comes with disparate systems and manual processing, but also saves time and increases efficiency. Multiple disconnected systems ABS streamlines and automates background checks within an airport’s unified physical security platform “To manage their badging process and employee background checks, some airports have until now had to resort to a variety of single-purpose systems, while others have opted for complex Identity Management System (IDMS) that tend to be better suited for larger airports,” explained David Lenot, Critical Infrastructure Practice Lead at Genetec Inc. “While both options allow airports to remain compliant with regulations, these solutions present operational inefficiencies. ABS helps reduce human error that can stem from managing multiple disconnected systems and avoids the complexities of large-scale Identity Management Systems.” ABS streamlines and automates background checks within an airport’s unified physical security platform – Genetec™ Security Center. Regular identity verifications With a design based on standards set forth by each country’s regulatory bodies and specificities from security background vetting services and clearinghouses, Security Center ABS helps airports deliver the required information in the correct format to successfully submit and process each employee application, and consistently meet audit and compliance requirements set by authorities such as regular identity verifications via the Rapback process. All data collected on each badge applicant is compiled and stored within the system. Customised dashboards are included within Security Center to showcase insights such as real-time applicant statuses, and unaccounted for badge percentages so that airport administrators can make more informed decisions, especially when it comes to meeting audit and compliance regulations.
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward?
Many of the threats facing the energy and utility sector are related to cybersecurity, as recent incidents have confirmed. Another problem is that operating systems for utilities tend to be outdated, which presents extra challenges in a connected world. There are also physical security demands, not to mention regulatory and social issues. We asked this week’s Expert Panel Roundtable: What are the security trends in energy and utilities?
Related white papers
10 top insights in access, cloud and more
Protecting dormitory residents and assets
Top 5 ways to ensure visitor safety and security
Empowering cameras with AIDownload
The rise of ethical facial recognitionDownload
Connected video technology for safe citiesDownload
Webcast: Access control integration increases security while reducing costsDownload
- Abloy UK secures Thames Water Contract
- Qognify provides Cayuga VMS to enhance monitoring solutions at IFEMA MADRID
- New England Craft Cannabis farm to deploy Salient Systems’ VMS platform at its eight locations
- Dahua Technology’s video and access control solution enhances safety in Empresa Panamena de Alimentos food company’s facilities