Mercury Security Access Controllers(25)
Mercury Security continues its commitment to open architecture access control with its intelligent controller platform that delivers extensive support for third-party applications, while offering advanced security and enhanced performance. Built on the Linux operating system, the new LP intelligent controllers offer the greatest flexibility for OEMs, channel partners and end customers to choose the controller configuration that best fits their needs. Key Highlights: Open Architecture: High performance, reliable platform enables use of hardware with Mercury OEM partners’ software solutions Device Integration: Supports a wide range of third-party integrations and applications Enhanced Security: Embedded crypto memory chip and data-at-rest encryption provides a secured layer of protection of sensitive data. OSDP Protocol: Secure channel security for reader connectivity and extended applications such as biometrics and high assurance credential authentication Versatile Interoperability: Same reliable interface and identical footprint as the EP controllers, enabling seamless upgrades for existing deployments For organisations seeking an open access control platform, the industry’s best reliability, cybersecurity, and an extensive device integration library, Mercury’s LP intelligent controllers are the clear choice.Add to Compare
Browse Access Controllers
Access control controller products updated recently
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that it is now offering multiple FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis access control system. Personal Identity Verification In a market that has been traditionally weighed down by limited solutions that are often proprietary, these new options offer non-proprietary, open-architecture choices to efficiently validate Personal Identity Verification (PIV and PIV-I) for federal employees and contractors. By unifying all systems in the Security Center Synergis platform, security teams can better mitigate risks" “Older physical security technology no longer meets federal standards or complies with the latest regulations, that’s why government agencies are looking to modernise their operations. By unifying all systems in the Security Center Synergis platform, security teams can better mitigate risks, increase operator efficiency and reduce cybersecurity efforts all while remaining compliant with the latest FIPS standards” said Justin Himelberger, Enterprise Systems Business Development Manager—Federal & DOD at Genetec. Genetec offers two FICAM-certified options: Onboard authentication using Mercury LP4502 controller: Ideal for new installations, this option is an efficient and cost-effective approach to achieving FIPS 201 compliancy. By embedding pivCLASS authentication firmware into a Mercury LP4502 controller, users reduce their hardware expenditure and benefit from a speedy authentication process. Authentication using HID PAM: Ideal for retrofits, customers can upgrade their existing systems by adding a dedicated pivCLASS Authentication Module (PAM) from HID to their installation. Genetec – Mercury Security partnership “Genetec and Mercury Security have been close partners for years and we are pleased to offer our US Federal market customers FICAM-compliant solutions that are nonproprietary and based on an open-architecture. The Mercury LP4502 controller with Genetec Synergis access control system enable customers to comply with the most stringent access and identity federal standards with the minimum amount of disruptions,” said Matt Barnette, President of Mercury Security.
LifeSafety Power Inc. continues to expand its popular rack mount solutions, now adding the integration of Honeywell ProWatch to the FlexPower Gemini line. The Gemini RGH rack mount power management system supports seamless hardware integration of Honeywell ProWatch door controllers and centralised power in a single, space-saving design. Rack mount power management Gemini RGH is a compact, 19-inch rack-mounted enclosure engineered for data centers, IT closets, server rooms or other areas where space is limited. It integrates ProWatch door controllers and power controller boards in a pull-out, easy-to-access mechanical housing, giving systems integrators the convenience of a tiered drawer configuration for their Honeywell access control specifications. RGH is the continuation of LifeSafety Power’s award-winning Gemini line. Gemini covers the most widely specified access controller configurations, with rack mount designs for Mercury, SWH, AMAG, HID and Honeywell controllers, as well as ‘power-only’ rack mount footprints recently made available with the newly released RGL. Gemini Series carry UL and ULC listings, as well as other certifications. Compact housing for door controllers “The Gemini line continues to expand in response to our customer’s requests for compact, integrated housings for the most popular door controllers along with power,” said Larry Ye, President and CEO of LifeSafety Power. “As space for technology and equipment becomes increasingly limited, Gemini meets the need for access control and power integration in an abbreviated, yet easy-to-service footprint.”
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is showcasing its unique portfolio of video, access control and communications platforms that provide users with the highest levels of system integration, management and incident response technology at Expo Seguridad 2019 (booth #2524). Solutions on display include the Latin American public debut of Maxxess InSite awareness and response coordination system, the enhanced eFusion security management software and Maxxess’ MX+ Web Dashboard, the newly designed Ambit event management communications software, and a new Multi-Form Panic Solution that provides the lowest cost of entry for proactive protection. Combining systems and human intelligence Maxxess solutions empower people and transform security operations to deliver new levels of situational awareness"“Maxxess solutions empower people and transform security operations to deliver new levels of situational awareness and business intelligence,” said Nancy Islas, President of Maxxess Systems. “By combining systems intelligence and human intelligence, our unique open architecture and intuitive platforms truly offer powerful, scalable solutions that can help stop events from happening, and better control incidents from the moment they begin.” The Maxxess solutions being demonstrated at Expo Seguridad 2019 include: Maxxess InSite awareness and response coordination system combines “system intelligence” and “human intelligence” to detect and respond to unfolding events in real time – all of which are queued, organised and displayed on a highly-intuitive user interface. Maxxess InSite enables early incident detection and action, allowing users to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess InSite Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality. Over 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. eFusion security management software is a “system intelligence” solution that integrates and correlates data from surveillance, access control and various other physical security and facility operations’ data onto a comprehensive monitoring and reporting dashboard. eFusion security management software eFusion provides video and access system management and control capabilities along with alarm monitoring eFusion provides video and access system management and control capabilities along with alarm monitoring; remote access credentials tracking, authorisation, and de-authorisation; door/access status; and more. Proven globally in installations around the world, new enhancements to eFusion include new Flow Control with auto expiration, and advanced data processing. Flow Control allows users to configure the specific door(s) that must be used first to gain primary access to a facility with programmable timer setting. Advanced data processing correlates databases to accommodate complex relationship rules between the authoritative database and the Maxxess database. Enhancements to MX+ Web dashboard To further simplify user engagement with eFusion, Maxxess Systems’ MX+ Web Dashboard has also been further enhanced with new features including system-wide lockdown; Video Management System (VMS) integration; mobile cardholder management operations with badge printing; and access control status indication in an easy-to-read graphical format and schedule configuration. Ambit event management communications software provides real-time “human intelligence” for alerts, notifications and status assessment via users’ smartphone and/or tablets, along with access control management. Ambit’s extensive communications and access control functionality provides security management and first responders with the critical on-site information and access system management they need to best handle unpredictable crises. Ambit and Multi-Form panic solution Maxxess Systems’ new Multi-Form Panic Solution provides the lowest cost of entry for proactive protection A cloud-based solution, new enhancements to Ambit include: an app design for easier operation including: a status update window; an easily accessible panic button; support for multiple photos from the field; the ability to assign reports to designated groups and/or individuals; enhanced filtering for target audiences to receive mass broadcasts; NC4 integration to external intelligence software to enhance information gathering; auto-location detection for event status posts; and a texting option for users without the app to receive relevant mass broadcasts. Also featured is Maxxess Systems’ new Multi-Form Panic Solution, which provides the lowest cost of entry for proactive protection. Available for implementation with any Maxxess System platform or as a stand-alone solution, it can be configured on any mobile device, PC keyboard or wearable device. Expanding technology partners list Maxxess Systems also continues to expand its roster of technology partners and integrations with the addition of: Mercury LP and MR62e controllers; OTIS Elevator Compass Overwatch; enhanced Milestone Systems’ MIP and Geutebruck GeViScope integrations; as well as new integrations with Salient Systems, Avigilon, ISS (Intelligent Security Systems), Nedap and RemotePoint.
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
Physical security supports a future-proof cyber security strategyDownload
- ASSA ABLOY secures Centre Hospitalier Métropole Savoie with its Aperio locking technology
- Cognitec offers face recognition system to enhance casino security
- Matrix provides time-attendance and access control solution at Al-Khodari Sons Company
- PACOM’s 8002 integrated access and alarm controller helps Mimoto Parking keep Spain’s motorbikes safe and secure