HID's Edge Solo brings network intelligence to the door
HID's Edge Solo brings network intelligence to the door

Edge Solo is HID Global's new cost-effective, stand-alone, single-door IP-based access control solution.  Its innovative product design is unique in the market for a number of reasons.  Standing apart from other stand-alone readers on the market, the product allows users to retain their initial investment value over time, or as security requirements increase by upgrading to be part of a complete hosted system through the OPIN development partner program of Open Architecture solution providers.  Edge Solo has a user-friendly, instructional web browser based environment, designed and focus-group tested for use in the "real world", allowing cardholder information, schedules and card assignment management through its intuitive user interface.Run through standard CAT 5/6 wiring and able to use PoE or external power supply, Edge simplifies installation while providing a low fixed cost per door.  Bringing intelligence to the door, the flexible design includes an integrated iCLASS® reader or allows connection to any Wiegand or most clock and data readers.Edge Solo is part of HID Global's new Edge platform, a full line of flexible and configurable IP-enabled access control processor and host interface solutions, which also includes EdgeReader™ (with integrated iCLASS® reader) and EdgePlus™ (allowing connection to any Wiegand or most clock and data readers).  A range of EdgePlus Solo and iCLASS kits are now available under single part numbers to reduce time and save customers' administration costs. Part # Description 83110 EdgePlus Solo and iCLASS R10 Reader Kit 83100 EdgePlus Solo and iCLASS R30 Reader Kit 83120 EdgePlus Solo and iCLASS R40 Reader Kit * 83125 EdgePlus Solo and iCLASS RP40 Reader Kit 83130 EdgePlus Solo and iCLASS RK40 Reader Kit  *(Option for single fully integrated unit)Edge is a perfect solution for new building installations, as it is designed to provide complete and full-featured access control infrastructure and contactless smart card capability at "the edge" of the network for stand-alone or OEM software host systems.  Edge products require less wiring and are IP addressable, which means they are cost-effective and are ideally suited for today's IT-centric security environment.

Add to Compare
HID EH400-K single door networked access controller
HID EH400-K single door networked access controller

HID Global®, trusted leader in solutions for the delivery of secure identity, recently announced the production release of its next generation EDGE EVO and VertX EVO™ controller platform that brings intelligence and decision-making to the door for advanced and highly customisable networked access control solutions.  EDGE EVO and VertX EVO offer an open and scalable development platform for the deployment of a wide range of access control functionality, including remote management options, real-time monitoring, report generation and a powerful custom rules engine that enables the use of the system hardware for complimentary applications.  Protecting the hardware investments of end user organizations, the new platform builds on the success of the company’s EDGE and VertX solutions and provides the most extensive access control architecture that delivers enhanced security features and superior performance with versatile installation and future upgrade options.  According to ARC Advisory Group, the physical security and access control market is experiencing a major shift toward IP-based solutions. “End users want ease of operation,” said Joseph Gillespie, principal author of ARC Advisory’s December 2011 study, “Physical Security and Access Control Systems for Industry Worldwide Outlook. They also want security solutions that are easier to expand, customize, and integrate with other solutions.  They want each part of the system to be optimized to work together, and to avoid integration and compatibility issues.  With its latest EDGE EVO and VertX EVO solutions, HID Global has shown its commitment to this approach and as the result can now offer more intelligent and valuable solutions to end users.” The scalability of the EDGE EVO and VertX EVO controller platform enables a comprehensive range of future access control functions that are interoperable with wireless locks and deliver enhanced security, such as implementations of highly advanced access rules, keypad door commands and large-scale anti-passback.  Additionally, VertX EVO controllers operate within the company’s Trusted Identity Platform® (TIP™).  These components will enable this version and future revisions of the controller platform to operate with fully trusted connections from host to controller to reader, substantially increasing security options for access control systems of the future. “HID Global’s EDGE EVO and VertX EVO controller platform, including a Developer Tool Kit with OPIN application programming interface (API), offers expanded capacity and higher performance, demonstrating our commitment to providing open solutions based on direct feedback from our partners,” said John Fenske, vice president of product marketing with HID Global. “The state-of-the-art features in our next generation IP-enabled platform emphasize HID Global’s dedication to driving market innovation to efficiently manage identities for access control while also ensuring our customers optimize their Genuine HID investment.” EDGE EVO and VertX EVO platform components include:  EDGE EVO Controllers, Reader/Controllers and IO Modules that enable higher security with an on-board encrypted Hi-O communication bus. EDGE EVO also broadens its worldwide usability of networked access control solutions with the addition of 12/24VDC lock support, mounting options and plug-and-play IO modules that extend IO at and behind the door. VertX EVO V1000 Controller and the V2000 Controller/Reader Interface solutions that expand cardholder capacity, decrease door transaction time and increase door uptime, while offering 100% plug-in compatibility with existing HID Global access control systems and associated V100, V200 and V300 downstream devices.  A comprehensive Developer Tool Kit (DTK) for developing to OPIN API when migrating from first generation EDGE and VertX or for new development using the latest platform.  The DTK is equipped pre-wired EDGE EVO Controller, VertX EVO V1000 and VertX interface boards and IO switchboard, as well as a full set of documentation.

Add to Compare

Access control controllers - Expert commentary

Automatic gates: Making the right investment for access control
Automatic gates: Making the right investment for access control

The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for post and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing whilst obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc whilst sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for manoeuvre. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.

4 ways to keep your workplace protected from COVID-19
4 ways to keep your workplace protected from COVID-19

The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupants in any emergency requires preparation and clear communication. This is especially critical in a health crisis involving an infectious disease. These are some of the essential best practices that could help organisations reduce the impact on their employees and operations during this pandemic. 1. Use a visitor management system With a visitor management system, organisations have a single source of real-time and historical insights into who is, or was recently, in the workplace. This is especially important because of the need to perform contact tracing should anyone in the organisation show symptoms of COVID-19, meaning everyone they have been in contact with needs to be contacted and asked to isolate. Yet still, first impressions are made at the front desk or lobby, where the visitor experience needs to be a positive one. At the same time, though, any emergency event requires that there be strict control over who is entering the workplace. This policy also needs to be clearly communicated to visitors. Doing this minimises risk to visitors as well as the workforce. In addition to delivering a high-quality visitor experience, the ideal visitor management system must: Enable organisations to meet regulatory compliance mandates and facilitate check-in at a self-service kiosk to minimise wait times. Customise the visitor experience to support specific security needs, such as accelerating and simplifying check-in or requiring additional security pre-checks. Automate compliance as it relates to visitor access rules with historical visit reports. 2. Pre-check questions at visitor registration kiosks Organisations can strengthen security at the registration kiosk using a flexible, enterprise-grade visitor management system to add visitor sign-in steps. This has proven successful in the past when used to control the spread of infectious disease during an outbreak. An example of this is a U.S. children's hospital which managed to reduce facility infection rates by 25 percent over a two-year period using a commercial, off-the-shelf physical identity and access management (PIAM) solution from HID Global. The solution provides two particularly important capabilities that can be used by organisations to protect their workplace from the uncontrolled spread of an infectious disease: Enhance visitor registration policy with additional mandatory questions to help identify any visitors who may need other screenings. Extend the visitor registration kiosk with a mandatory pop-up asking further questions during visitor check-in. 3. Understand who has visited your workplace Successful controlling the spread of infection throughout a facility requires the ability to automatically maintain an auditable trail of activity. This can be done using an enterprise-grade visitor management system that makes it easy to retrieve historical visit reports. This provides a timeline of who was in the workplace, and when they were there. Key features include: A single dashboard providing useful visitor insights at your fingertips. Historical reports that provide visitor details including location and contact information, all in compliance with General Data Protection Regulation (GDPR) and other privacy regulations. 4. Clearly communicate how infection risks can be reduced Global organisations must actively communicate with visitors and employees on the outbreak of infectious diseases and follow best practices outlined by the World Health Organization (WHO). Here are several things organisations can do in this area to help maintain a safe and healthy workplace: Re-enforce and communicate WHO best practices with guideline posters in the front lobby and throughout the workplace. Add posters that also encourage regular and thorough washing of hands. Encourage everyone to cough or sneese into their shirt sleeve in their flexed elbow or cover their mouth and nose with a tissue. Encourage everyone to keep a relatively safe distance from each other and use alternatives to handshakes when saying hello. Organisations must contend with a variety of workplace challenges during the outbreak of an infectious disease. These challenges can be solved with best practices that include a comprehensive visitor management system that automates critical check-in policies and maintains an auditable trail of visitor activity.  

The intersection of education and fire and security
The intersection of education and fire and security

Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From kindergarten to university Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognises outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education.  Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customised solution Chubb Sicli’s quality, capability, and security expertise provided a customised solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.

Latest HID Global news

HID Global announces Aero Controller Platform with encrypted communication and threat detection
HID Global announces Aero Controller Platform with encrypted communication and threat detection

Building on the success of HID’s Mercury, HID Global, a worldwide provider in trusted identity solutions, has announced the HID Aero platform featuring its next generation of open-architecture intelligent controllers that increase choices for a wide range of businesses while future-proofing access control investments as requirements change. “HID Aero is providing a broader market with features that were generally available only in solutions for larger organisations, while eliminating the ongoing cost and complexity of designing, manufacturing and maintaining panel hardware at the same time,” said Jaroslav Barton, Director of Product Marketing at HID Global. “It also brings end-to-end security to everyday applications with encrypted communication and threat detection, and robust features to meet corporate compliance.” Access control software with low maintenance Based on HID’s Mercury hardware used in more than four million panels shipped globally, the HID Aero platform speeds development time for access control solution providers by including all required hardware, firmware, software and development tools. Benefits for users include: Easily adaptable to evolving requirements: Users can choose from a large variety of access control software providers when deploying solutions. Systems are also easy to migrate to new software and highly configurable to dynamically enhance situational awareness. Lower installation and maintenance costs: HID Aero enables remote management capabilities with HID readers supporting Open Supervised Device Protocol (OSDP), including its recently announced Signo readers with built-in support. This minimises the need for field inspection and reconfiguration. Key encryption and backward compatibilty End-to-end security from credential to host: HID Aero brings to smaller businesses many features generally available only in enterprise-class solutions, including host and controller authentication, encryption to protect keys and sophisticated threat detection. Trusted reliability, proven technology: Based on HID Mercury panel hardware and system technology, the durable controllers fit in the same footprint as earlier HID VertX® controllers and are backward compatible with HID VertX modules to simplify upgrades.

HID Global helps banks to protect data and transactions and provide seamless customer experience
HID Global helps banks to protect data and transactions and provide seamless customer experience

As consumers embrace the convenience of online and mobile banking at traditional and the latest all-digital financial institutions, it has become an increasingly difficult challenge to combat cybersecurity threats while complying with regulatory data-protection mandates. HID Global, a provider of trusted identity solutions, has solved those challenges for numerous banks as part of their digital transformations. “Our solutions protect data and transactions while delivering a seamless experience for the consumer and maximum flexibility for banks,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. Cloud-based authentication services “This includes the option of cloud-based authentication services that remove the complexity of providing multifactor authentication to a growing and diverse user population while also offering the convenience and efficiency of centralised regulatory compliance audits.” Here are a few examples of how HID is helping address some of the most challenging mobile banking issues: A retail bank in Egypt has improved compliance and reduced fraud and operational costs with an HID® Trusted Transactions® solution that is pre-integrated with Temenos digital front office and core banking products. A Swiss wealth management group is using the solution, along with HID ActivID® Authentication Server, to optimise flexibility while protecting mobile banking transactions and securing corporate data, applications and systems. In addition to many others, two banks in Eastern Europe and the UK are using the solution for quick and easy compliance with Second Payment Services Directive (PSD2) regulations. Ensuring business continuity The use of digital channels has grown in Europe by up to 20 percent during the COVID-19 pandemic Even with financial institutions returning to normal operating hours, many believe digital banking will grow in importance as part of ensuring business continuity and supporting customers who prefer not to visit their local branch during the health crisis. According to a McKinsey & Company, the use of digital channels has grown in Europe by up to 20 percent during the COVID-19 pandemic. “In just a couple of months, customers’ adoption of digital banking has leapt forward by a couple of years,” the article’s authors wrote. Threat and fraud detection “Our most recent customer survey showed a 10 to 20 percent rise in digital banking use across Europe in April. Many Italian banks are striving to enable every single one of their customers to use digital banking. Such a jump in adoption opens the door for banks to turn digital channels into real sales channels, not just convenient self-service tools.” HID Global’s complete HID Trusted Transactions offering includes the HID Authentication platform delivered either as a server or service, plus a choice of hardware tokens or the HID Approve multi-factor authentication solution with mobile push notification capabilities, and HID Risk Management Solution (RMS) – Threat and Fraud Detection. The comprehensive offering delivers risk-based adaptive authentication, threat detection and transaction signing.

HID Global expands biometric identity verification to police forces and military installations around the globe
HID Global expands biometric identity verification to police forces and military installations around the globe

HID Global, a worldwide provider of trusted identity solutions, announced the expansion of its biometrics identification management solutions to police departments and military installations around the globe. A large police force that covers a major capital city in Europe is using its HID NOMAD 30 Pocket Reader for rapid suspect identification in the field. Initially launched for Android platforms, the solution’s SDK is now available for iOS devices. This extends Bring-Your-Own-Device (BYOD) benefits to a wider scope of clients who seek a truly flexible and mobile single-fingerprint verification solution. Mobile biometric solutions “The expansion of our offering to include iOS platforms broadens the adaptability and application of our mobile biometric solutions and equips our customers - from law enforcement to military officials - with the confidence to achieve rapid identification anywhere,” said Jessica Westerouen van Meeteren, VP and Managing Director, Citizen Identity with HID Global. “Ensuring that our portfolio of proven solutions is optimised with the latest, best-in-class capabilities to create safer societies is key to our mission as a global leader in trusted identities.” Biometric reader hardware The HID NOMAD 30 Pocket Reader’s rapid identification capabilities offer improved operational efficiency The HID NOMAD 30 Pocket Reader’s PIV-certified sensor enables end-users, such as law enforcement officers, to quickly capture and verify single fingerprints against databases and eliminates the need to transport suspects to a central booking station. With Android and iOS availability driving wider adoption, officers can simply pair their own mobile devices with the biometric reader hardware and perform watchlist matching within minutes while in the field, leaving custody space open for confirmed offenders. The HID NOMAD 30 Pocket Reader’s rapid identification capabilities offer improved operational efficiency and reduce time and booking costs associated with processing a suspect in a police station. During the first year of deployment, one city saw a six-fold increase in the number of suspects identified and more than $600,000 in savings. Extending biometrics to military bases As a provider of mobile biometrics, HID Global also provides a broad range of biometric identity management solutions to customers beyond law enforcement. One of the company’s many offerings include the HID SEEK Avenger rugged handheld biometric reader that is used by military bases around the world to accurately identify individuals and provide access to their premises. The solution captures high-quality fingerprints and IAP-40 compliant iris images for verification against as many as 250,000 records and offers offline functionality in harsh environments where connectivity is compromised. HID recently extended the HID SEEK Avenger biometric reader with several features, such as support for Windows 10, an upgraded camera, double the memory and hard drive capacity for enhanced speed and performance, which expands upon its powerful watchlist matching capabilities.

Related white papers

OSDP is the strongest access control for your business

Is your access control as effective as you think?

The role of IT in physical access control