Browse Access Controllers

Access control controllers - Expert commentary

Physical security in 2021: Post-pandemic solutions
Physical security in 2021: Post-pandemic solutions

In a world forever changed by the coronavirus pandemic, companies worldwide are now expanding their concept of physical security to best safeguard their facilities and employees. Few incidents have had as much of an impact on businesses globally as the COVID-19 pandemic; much of the world is still struggling to contain COVID-19, navigating the lasting effects and exploring what the “new normal” looks like. While some organisations are still engaged primarily in “anywhere operations”, i.e. remote work, many organisations are implementing strategic physical security solutions that better protect everyone through the use of video surveillance technology and advanced intelligence capabilities. As this new normal takes hold within the business environment, security strategies will largely be centered around several key initiatives like access control, people counting, occupancy controls, temperature screening, contact tracing, and reducing office touch points. With the use of a video management system (VMS) in the shadow of COVID-19, occupancy data from a VMS can trigger a lockdown and not permit new entrants until the occupancy drops below a certain threshold; this is significantly useful for organisations that have returned to in-person work.  But there’s a caveat: though many legacy security systems are being re-evaluated to allow for touchless or frictionless access control — a move designed to eliminate the need for employees and visitors to physically touch a surface when using an access control system — upgrading the outdated technologies can be cumbersome and expensive, especially for organizations that had not planned for an interruption like the pandemic. Security contractors will be vital So, what is the solution? Security contractors will play a vital role in helping end-users across a range of vertical markets — large and small — to achieve their goals in the new paradigm. For some, this may mean leveraging existing access control and video surveillance systems with upgrades where needed. For others, an entire overhaul is made possible with budget friendly solutions for businesses to migrate to integrated access control through end-to-end security solutions that tie into existing infrastructures without major disruptions (meaning the organisation will never be left vulnerable). Cybersecurity is becoming even more intertwined with physical security There is massive transformation occurring in the security industry, most notably the movement to digitise physical access and integrate it with video management systems and surveillance. This shift means that cybersecurity is becoming even more intertwined with physical security, allowing organisations the ability to correlate the metadata of people’s behaviors and activities — a plus point for those looking to remain vigilant against future pandemic-esque business interruptions. Access, video, and audio are converging into consolidated platforms. Due to lower costs and pairings with IP-based, wireless infrastructure, there are infinite solution configurations. IT security requirements are beginning to apply to physical security because of this integrated infrastructure. Multi-factor authentication The security industry is also beginning to see a trend of multi-factor authentication, which is going to dominate in the days to come as it makes solutions more reliable. Most people carry smartphones these days, which have green check communication capabilities that allow easy multi-factor authentication. Costs are going down, and algorithms are getting better, making more people willing to try it. Some new solutions have both the fingerprint reader and a camera for facial biometrics Some new solutions have both the fingerprint reader and a camera for facial biometrics. Cameras and CCD modules cost almost nothing, and they do not have to be super high-end anymore, especially if organisations are doing one-to-one verification. It’s not just about security now; it is security, health, and safety. Access control with video, intelligent readers, and credentials is a perfect platform for next generation solutions.

Access control and door entry management: How technology is driving change
Access control and door entry management: How technology is driving change

Access control and door entry is a huge responsibility, and challenge, for local authorities and housing associations UK wide. For councils, they’re accountable for the security and safety of many public facilities such as leisure centres, libraries as well as residential housing developments which are often large scale and home to hundreds of people. Housing associations manage affordable rental housing which also means they’re responsible for the appropriate access control management for each individual house or flat. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage. For example, with modern intercom and access control systems, remote management and communication is something that offers local authorities and housing associations features that enable them to reduce costs and cut their carbon footprints by managing multiple sites from one place. On the other hand, such technological innovation has meant that local authority and housing association specifiers and consultants now have a wide range of systems and products to choose from which can cause issues in ensuring the right system for a specific building or development is chosen. Choosing an appropritate access control system In choosing an appropriate system, local authorities and housing associations need to opt for a cost effective solution that can be easily maintained with excellent support from the manufacturer and guarantees that the system and system parts will remain supported for the duration of its expected life cycle. It is also important that the chosen system is flexible to cater for the varying needs of the tenants and visitors. Of increasing importance is the reduction of anti-social behaviour which new technology can help by providing the use of data loggers which track the use and events of a door entry system, allowing specific evidence to be located by integrating with CCTV. Using technology to our advantage Through advancements in management systems and services, we can gain a much better visual representation of the events and general usage of an intercom entry system and not just its proximity access control. Systems, for example, can now send email alarms or notifications to the administrator or management. We are now able to modify user rights and access levels on the go from a mobile app which enables a much greater control over service and maintenance engineers, such as making sure they have full access when required via an app, rather than arriving to site with the incorrect keys or access fob. Systems, for example, can now send email alarms or notifications to the administrator or management Dealing with tenant’s lost and stolen keys has never been so easy either. The blocking or deletion of lost fobs and adding a new fob can be carried out in minutes while at the same time removing the cost of sending an engineer to the development to programme new fobs. This greatly reduces the carbon footprint of the whole task as fobs can now be sent out via post to a secure location for collection. Technology has also helped local authorities and housing associations to overcome the issue of not being able to have a concierge or building manager available 24/7 at some developments. Now with internet communication, it’s possible for tenants and visitors to get in touch with someone should they need assistance, whether that’s from within the apartment or from an entrance point. For example, lets take the Videx VX2200 with IP concierge integration. This system is exceptionally flexible, enabling calls to be answered on Videx intercoms and also mobile phones if required. With the integration of the IP concierge each block can be either standalone or networked via the internet back to a central control room. Reduced maintenance costs and carbon footprint We work with a wide range of local authorities and housing associations to help them overcome access control and door entry challenges. One organisation we have recently partnered with is The Living Group to help them greatly reduce their maintenance costs and carbon footprint by installing the MiAccess offline proximity system on many of their developments across the North East. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage By installing an appropriate system, The Living Group has managed to overcome issues caused by the existing system’s limitations and also enabled much more flexibility when it comes to effectively managing the access control system of all their included developments. For those responsible for effective and appropriate access control, the management of the systems are easier, quicker and there’s no delay or on-going costs for needing a specialist programme to modify fobs and access rights as this can now all carried out in-house. Improved security legislation Further advancements in programmes such as Secured by Design (SBD), a police initiative that improves the security of buildings and their immediate surroundings to provide safe places to live, work and visit, means that there’s more security legislation being implemented that’s making intercoms and access control more secure, without affecting ease and convenience. Videx holds an SBD accreditation and we know, from first-hand experience, how it’s making a difference in keeping tenants safe. When you combine the safety features promoted by an SBD member company like ourselves with the likes of the Videx event logging, image capture and ability to modify access users on the go, for example, we can help to create a very safe and secure environment. Personally, I think there needs to be a greater emphasis on the role of security legislation Technology has completely transformed the way local authorities and housing association are able to choose, install and manage door entry and access control systems for tenants and visitors alike. Personally, I think there needs to be a greater emphasis on the role of security legislation such as Secured by Design to ensure all councils and housing association consultants are up to date with what constitutes a robust and secure system that’s also cost effective too. In my role, I see weaknesses in systems and constant ongoing costs that could easily be avoided. For instance, features such as timed remote entry means local authority and housing association management no longer need to worry about keys being lost, the wrong keys being supplied or locks needing to be changed. With new systems such as the Videx MiAccess and Videx WS4 range, we can help to massively reduce a housing association’s or council’s carbon footprint and engineer costs by allowing them the access to management and control from an offsite location. Crime prevention We can also use live and logged events to help prevent crime in different ways, from antisocial behaviour growing around a tenant being called or visited much more regularly than others, to knowing a tenant is currently still living at a property but isn’t paying rent or answering to any correspondence. Technology enables local authorities and housing associations to receive detailed data and therefore behavioural insights on the people under their management and care. If consultants and specifiers are advised on the most appropriate systems that meet their specific entry needs, they can ensure greater, safer and more convenient access control that meets the requirements of both the end user and the those responsible for its effective management.

Automatic gates: Making the right investment for access control
Automatic gates: Making the right investment for access control

The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for post and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing whilst obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc whilst sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for manoeuvre. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.

Latest Mercury Security, part of HID Global news

Genetec broadens its access control offering for US Federal Government customers
Genetec broadens its access control offering for US Federal Government customers

Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential and Access Management) certified options for its Security Center Synergis™ access control system with the support of Veridt Stealth access control readers. Traditionally, the options for Federal Government organisations to replace a non-FICAM compliant system or to secure a new site were restricted to a limited choice of proprietary solutions. Because Security Centre Synergis is a FICAM-approved open platform access control system, customers can choose from a range of non-proprietary choices to efficiently validate Personal Identity Verification (PIV, PIV-I, CAC, and TWIC) for federal employees and contractors. Cost-effective solutions “By bringing these new non-proprietary options to market with partners such as Veridt, HID and Mercury, we are offering government customers a choice of simple-to-deploy and cost-effective solutions so that they can easily comply with FICAM requirements while leveraging the most robust and extensible software solution on the market,” said Justin Himelberger, Enterprise Systems Business Development Manager, Federal & DOD at Genetec. Access management solution Veridt Stealth Series™ readers provide a full complement of capability enabling identity and access management solutions for traditional and trusted PACS using PIV, TWIC and CAC based credentials. This family of readers encompasses both biometric and non-biometric configurations while offering fixed, wireless, and mobile platforms. Veridt readers are well known for their compact design and operating capability in the harshest environments. Identifying federal standards “We are pleased to work with Genetec to offer our joint US-Federal market customers FICAM-compliant solutions that will enable them to comply with the most stringent access and identity federal standards as well as the flexibility to maintain and protect their investment for years to come,” said Bryce Lamers, Director of Sales and Marketing at Veridt.

HID Global introduces the HID Aero platform to extend their portfolio of open platform controllers
HID Global introduces the HID Aero platform to extend their portfolio of open platform controllers

HID Global, a worldwide provider of trusted identity solutions, announced that it has extended its open-architecture controller line with the introduction of HID Aero. Building on the proven success of its Mercury intelligent controller platform delivering total security beyond the door, HID Aero extends flexibility and access control choices to a wide range of businesses, while future-proofing an organisation’s investment as requirements change. “HID Aero is providing features to a broader market that were generally available only in solutions for larger organisations, while eliminating the ongoing cost and complexity of designing, manufacturing and maintaining panel hardware at the same time,” said Stephen Carney, Vice President of Product Marketing, Physical Access Control Solutions with HID Global. Physical access control systems “It also brings end-to-end security to everyday applications with encrypted communication and threat detection, and its robust features to meet corporate compliance.” HID Aero platform controllers are backward compatible with HID VertX modules to simplify upgrades Built with openness in mind, HID’s controller portfolio delivers a nimble platform that provides original equipment manufacturers (OEMs), channel partners and end customers an array of solutions for deploying a broad range of physical access control systems. HID Aero platform controllers that fit in the same footprint as earlier HID VertX controllers and are backward compatible with HID VertX modules to simplify upgrades. Remote management capabilities The controllers include hardware, firmware, software and tools that speed development time, as well as host and controller authentication, and encryption to protect keys. HID Aero enables remote management capabilities with HID Signo and other HID readers supporting Open Supervised Device Protocol (OSDP), minimising the need for field inspection and reconfiguration. Mercury LP Linux intelligent controllers and MR Series 3 SIO modules bring game-changing level of extensibility, flexibility and value to security and IT departments seeking to stay ahead of the vast changes in technology. The controller’s multi-device and third-party application integration capabilities enable easy integration of wireless locks and other devices, as well as destination control and dispatch, intelligent power supply analytics, FICAM authentication and numerous other advanced applications. Access control software Systems are highly configurable to dynamically enhance situational awareness Mercury MR Series 3 SIO modules are a diverse subset of controllers that are specifically dedicated to point control and monitoring as well as individual door oversight for system expansion of Mercury LP Linux controllers. The modules provide the flexibility to choose the controller configuration that best meets customer needs. With all controllers based on HID’s Mercury hardware platform, users can choose from a large variety of access control software providers over time without any re-investment in hardware. Systems are also easy to migrate to new software and highly configurable to dynamically enhance situational awareness. Access control requirements “With over 25 years in the market and used in more than four million panels shipped globally, HID’s Mercury open platform hardware addresses the full spectrum of access control requirements,” said Matt Barnette, Vice President of Global Accounts and Mercury, Physical Access Control Solutions with HID Global. “This ensures OEM partners, installers and end customers spanning virtually all vertical markets can select from a variety of controller solutions to meet their needs.”

Keep by Feenics achieves FICAM Compliance and GSA Listing as approved access control credentialing product
Keep by Feenics achieves FICAM Compliance and GSA Listing as approved access control credentialing product

Feenics has announced that its Keep by Feenics cloud-hosted access control platform is now certified and approved for government and federal agency use in Personal Identity Verification (PIV) credentialing and Physical Access Control Systems (PACS). FIPS 201-2 Evaluation Testing Feenics attained its listing on the GSA Approved Products List (APL) for all versions of Keep after completing the Federal Information Processing Standard (FIPS) 201-2 Evaluation (sometimes called FICAM) Testing Program. FIPS 201 was developed to satisfy the technical requirements of HSPD-12, the Department of Homeland Security’s mandated common identification standard and database for credentialing federal employees and contractors. After months-long testing, review and validation of the platform by third-party accredited testing lab CertiPath, both on-premise and cloud-hosted server applications of Keep satisfied requirements to become available for procurement by federal entities and listed on the GSA Schedule. Cloud Smart strategy “As the government targets the acceleration of cloud-hosted deployments through its Cloud Smart strategy, Feenics has effectively opened new channels of business for its value-added resellers and integrators”, said Chris Smith, who leads Federal Government efforts at Feenics. This certification affirms the Keep proof of concept as a secure platform for federal government applications “Keep was validated against a rigorous, comprehensive set of functional requirements derived from government-wide specifications”, said Smith, adding that more than 300 tests were conducted in an installed simulation at CertiPath facilities. ‘Keep Access Control as a Service’ software “This certification affirms the Keep proof of concept as a secure platform for federal government applications”, Smith further stated, adding “To maintain this status, Keep Access Control as a Service (ACaaS) software will undergo ongoing evaluation of new and updated versions”. “There’s a cloud-first mentality across U.S. government agencies that will help reduce the carbon footprint of hardware, while improving efficiencies with real-time updates, redundancies and lower maintenance costs”, said Paul Di Peso, Feenics Executive Vice President, adding “Receiving our FIPS 201 approval and attaining our APL validates the direction of access control in this vertical market.” Integration with Mercury Security controller DiPeso said the government is heading rapidly in the direction of increased cloud implementation, especially as new IT modernisation initiatives emerge. He said “We believe we can be a major asset to the government’s push to cloud adoption”. Keep software integrates directly with the authentic Mercury Security controller Keep software integrates directly with the authentic Mercury Security controller that authenticates the PIV credential, rather than a separate communication module, further reducing the installed hardware footprint. Enterprise-enabled access control solutions “As the cloud and serverless environment proliferates in the government space, there’s a move to lessen reliance of onsite hardware”, said Matt Barnette, President of Mercury Security. “Having enterprise-enabled access control solutions like Feenics using HID’s pivCLASS solution via Mercury’s LP4502 controller brings additional applications to installers and customers alike”. (Feenics is a Platinum Partner to Mercury Security, an HID company.) Feenics continues to fortify its position as an ACaaS pioneer, certified as an International Organisation for Standardisation ISO 9001:2015 Company. In addition, the company recently received a 2020 Platinum Govies Award from Security Today in the Access Control Software/Controllers category.

Related white papers

Physical access control in higher education

Boosting on-site safety and security

OSDP is the strongest access control for your business