SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Ajax StarterKit Plus

    Ajax StarterKit Plus

    VIVOTEK  Indoor Dome Camera

    VIVOTEK Indoor Dome Camera

    Dahua Technology 50m Security Radar

    Dahua Technology 50m Security Radar

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Johnson Controls unveils next-gen Tyco American Dynamics victor Workstations
    • Redvision appoints Will Hucker as General Manager of its manufacturing site in Hampshire
    • Hanwha secures Kirkland’s stores with its Wisenet X series HD dome cameras
    • Omnigo Software Security and Risk Management System installed by major casino operators in Macau, China
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • Year in Review 2018
    • Year in Review 2017
    Featured
    • Top ten security industry mergers and acquisitions of 2019
    • MOBOTIX M7 platform provides more flexibility and computing power
    • ATMs provide convenience for bank customers, but they have vulnerabilities
    • What if a customer expects more than a security system can deliver?
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Upcoming Events
    • IFSEC India 2019
    • 2019 China Smart Homes & Buildings Expo
    • Intersec Dubai 2020
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    2019 China Smart Homes & Buildings Expo

    2019 China Smart Homes & Buildings Expo

    Oman Facilities & Environment Exhibition & Conference 2020

    Oman Facilities & Environment Exhibition & Conference 2020

    Kuwait Health Safety & Environment Forum 2020

    Kuwait Health Safety & Environment Forum 2020

    Third Party & Supply Chain Cyber Security Summit 2020

    Third Party & Supply Chain Cyber Security Summit 2020

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY EMEA
    • Hanwha Techwin America
    • March Networks Corporation
    Other Resources
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Nine ways to make your retail security system work harder

    Nine ways to make your retail security system work harder

    Financial institutions require future-ready physical security technologies

    Financial institutions require future-ready physical security technologies

    H.265 High Efficiency Coding: Video compression for security applications

    H.265 High Efficiency Coding: Video compression for security applications

    How to overcome the storage challenges of adopting surveillance AI

    How to overcome the storage challenges of adopting surveillance AI

About us Advertise
  • Artificial intelligence (AI)
  • Cyber security
  • ISC West
  • Counter Terror
  • Robotics
  • Body worn video cameras
  • Intrusion detection
  • Video management software
  • Trade Show/Exhibition
  • Video analytics
  • View all
  1. Home
  2. Products
  3. Access Control
    CCTV Intruder Alarms
  4. Access control controllers
    Access control readers Access control cards/ tags/ fobs

Access Controllers

 (73)
Refine by:
Products selected for compare
Compare Clear All
Vanderbilt’s ACT PoE Ultra controllers support all power requirements
Vanderbilt’s ACT PoE Ultra controllers support all power requirements

The PoE Ultra hardware in Vanderbilt’s ACT controllers ensures support for all power requirements. This includes local door accessories and components such as card readers, door locks and request to exit buttons. PoE Ultra ensures that all of this is accomplished without the need for additional Power Supply Units (PSUs). Essentially, this saves the system user time and money. Moreover, as this is all powered over the Ethernet, it translates to less cabling and more convenience for installers too. This is an important feature for installers because when a system is fast to install and more straightforward to set-up and quote, it removes the complexity from access control and allows installers to get more done, more efficiently, and in less time. This ultimately benefits their business and their bottom line. The new PoE Ultra feature, alongside the ACT access control software’s existing integration with Vanderbilt’s award-winning SPC intrusion system, a rules mapping engine, and a smartphone app, simply adds to this concept. Vanderbilt’s core aim has always been to put customers first. We believe PoE Ultra controller has a firm grip on this mantra, as it plays to pain points of both system users and installers. As we continue to develop and evolve new generations of security products, our focus will remain on striving to be a partner that is flexible to customer requirements and adaptable to meet the ever-changing needs of the market.

Add to Compare
Hikvision DS-K2601 single-door network access controller
Hikvision DS-K2601 single-door network access controller

Networkable, 1 doors/controller, 100,000 cardholders, Offline Capabilities, Networkable, TCP/IP Network Interface and RS-485 Interface, Universal / Wiegand Reader Interface, 12 V DC, 370 x 345 x 90, -20 ~ +65 C (-4 ~ +149 F), 10 ~ 90

Add to Compare
Vanderbilt DC22 - Door controller with alarm control functions
Vanderbilt DC22 - Door controller with alarm control functions

Standalone, 1 doors/controller, RS485, Universal / Wiegand Reader Interface, 8 ~ 40 V DC, 0.65 W, 248 x 182 x 55, 700, -35 ~ +50

Add to Compare
HID's Edge Solo brings network intelligence to the door
HID's Edge Solo brings network intelligence to the door

Edge Solo is HID Global's new cost-effective, stand-alone, single-door IP-based access control solution.  Its innovative product design is unique in the market for a number of reasons.  Standing apart from other stand-alone readers on the market, the product allows users to retain their initial investment value over time, or as security requirements increase by upgrading to be part of a complete hosted system through the OPIN development partner program of Open Architecture solution providers.  Edge Solo has a user-friendly, instructional web browser based environment, designed and focus-group tested for use in the "real world", allowing cardholder information, schedules and card assignment management through its intuitive user interface.Run through standard CAT 5/6 wiring and able to use PoE or external power supply, Edge simplifies installation while providing a low fixed cost per door.  Bringing intelligence to the door, the flexible design includes an integrated iCLASS® reader or allows connection to any Wiegand or most clock and data readers.Edge Solo is part of HID Global's new Edge platform, a full line of flexible and configurable IP-enabled access control processor and host interface solutions, which also includes EdgeReader™ (with integrated iCLASS® reader) and EdgePlus™ (allowing connection to any Wiegand or most clock and data readers).  A range of EdgePlus Solo and iCLASS kits are now available under single part numbers to reduce time and save customers' administration costs. Part # Description 83110 EdgePlus Solo and iCLASS R10 Reader Kit 83100 EdgePlus Solo and iCLASS R30 Reader Kit 83120 EdgePlus Solo and iCLASS R40 Reader Kit * 83125 EdgePlus Solo and iCLASS RP40 Reader Kit 83130 EdgePlus Solo and iCLASS RK40 Reader Kit  *(Option for single fully integrated unit)Edge is a perfect solution for new building installations, as it is designed to provide complete and full-featured access control infrastructure and contactless smart card capability at "the edge" of the network for stand-alone or OEM software host systems.  Edge products require less wiring and are IP addressable, which means they are cost-effective and are ideally suited for today's IT-centric security environment.

Add to Compare
ACTpro 120 single door station with built-in PSU saves on installation time and space
ACTpro 120 single door station with built-in PSU saves on installation time and space

The ACTpro 120 2Amp is a single door station with a built-in 12 Volt power supply housed in a steel metal cabinet.  It facilitates the expansion of an additional door on the ACTpro 1500, ACTpro 2000, ACTpro 4000 and ACTpro 4200 controllers. Benefits at installation Faster Install: the combined controller / PSU is a quicker install than a separate controller and PSU Compact: much less space is needed than when installing a separate controller and PSU Benefits after Installation 5 Year Warranty Voltage Monitoring through ACT Software: fast diagnostics of potential voltage issues at the door without having to access the controller / PSU - an early indication of problematic locks Break Glass monitoring: monitor the breakglass status in real-time Current Limiting: protects against short circuits in the system What are our installers saying about the ACTpro 120? “Monitoring the voltage to the door stations and controllers through the ACT software helps us detect potential voltage problems before they arise without having to open the unit to measure the supply voltage with a multi meter” -Bobby Corrigan, Ultimate Security on the ACTpro 120.

Add to Compare
Hikvision DS-K2801 single-door access controller
Hikvision DS-K2801 single-door access controller

Networkable, 1 doors/controller, Offline Capabilities, TCP/IP, Universal / Wiegand Reader Interface, 12 V DC, < 3.5W, 285 x 237 x 69, -20 ~ +65 C (-4 ~ +149 F), 10 ~ 90

Add to Compare
HID EH400-K single door networked access controller
HID EH400-K single door networked access controller

HID Global®, trusted leader in solutions for the delivery of secure identity, recently announced the production release of its next generation EDGE EVO and VertX EVO™ controller platform that brings intelligence and decision-making to the door for advanced and highly customisable networked access control solutions.  EDGE EVO and VertX EVO offer an open and scalable development platform for the deployment of a wide range of access control functionality, including remote management options, real-time monitoring, report generation and a powerful custom rules engine that enables the use of the system hardware for complimentary applications.  Protecting the hardware investments of end user organizations, the new platform builds on the success of the company’s EDGE and VertX solutions and provides the most extensive access control architecture that delivers enhanced security features and superior performance with versatile installation and future upgrade options.  According to ARC Advisory Group, the physical security and access control market is experiencing a major shift toward IP-based solutions. “End users want ease of operation,” said Joseph Gillespie, principal author of ARC Advisory’s December 2011 study, “Physical Security and Access Control Systems for Industry Worldwide Outlook. They also want security solutions that are easier to expand, customize, and integrate with other solutions.  They want each part of the system to be optimized to work together, and to avoid integration and compatibility issues.  With its latest EDGE EVO and VertX EVO solutions, HID Global has shown its commitment to this approach and as the result can now offer more intelligent and valuable solutions to end users.” The scalability of the EDGE EVO and VertX EVO controller platform enables a comprehensive range of future access control functions that are interoperable with wireless locks and deliver enhanced security, such as implementations of highly advanced access rules, keypad door commands and large-scale anti-passback.  Additionally, VertX EVO controllers operate within the company’s Trusted Identity Platform® (TIP™).  These components will enable this version and future revisions of the controller platform to operate with fully trusted connections from host to controller to reader, substantially increasing security options for access control systems of the future. “HID Global’s EDGE EVO and VertX EVO controller platform, including a Developer Tool Kit with OPIN application programming interface (API), offers expanded capacity and higher performance, demonstrating our commitment to providing open solutions based on direct feedback from our partners,” said John Fenske, vice president of product marketing with HID Global. “The state-of-the-art features in our next generation IP-enabled platform emphasize HID Global’s dedication to driving market innovation to efficiently manage identities for access control while also ensuring our customers optimize their Genuine HID investment.” EDGE EVO and VertX EVO platform components include:  EDGE EVO Controllers, Reader/Controllers and IO Modules that enable higher security with an on-board encrypted Hi-O communication bus. EDGE EVO also broadens its worldwide usability of networked access control solutions with the addition of 12/24VDC lock support, mounting options and plug-and-play IO modules that extend IO at and behind the door. VertX EVO V1000 Controller and the V2000 Controller/Reader Interface solutions that expand cardholder capacity, decrease door transaction time and increase door uptime, while offering 100% plug-in compatibility with existing HID Global access control systems and associated V100, V200 and V300 downstream devices.  A comprehensive Developer Tool Kit (DTK) for developing to OPIN API when migrating from first generation EDGE and VertX or for new development using the latest platform.  The DTK is equipped pre-wired EDGE EVO Controller, VertX EVO V1000 and VertX interface boards and IO switchboard, as well as a full set of documentation.

Add to Compare
SALTO CU50ENSVN on-line IP door controller with two wall reader connections
SALTO CU50ENSVN on-line IP door controller with two wall reader connections

Standalone/Networkable, 1 doors/controller, 64,000 cardholders, Offline Capabilities, Networkable, 2 relay outputs, 12 V DC, -20 ~ +80

Add to Compare
Vanderbilt AP01 Aliro Access Point, 1 door
Vanderbilt AP01 Aliro Access Point, 1 door

Networkable, 1 doors/controller, Networkable, Universal / Wiegand Reader Interface, 12 V DC , 24 V AC, 201 x 156 x 53, 505, -40 ~ +55 C (-40 ~ +131 F)

Add to Compare
ACTpro 1500 by Vanderbilt
ACTpro 1500 by Vanderbilt

Vanderbilt’s ACTpro 1500 PoE Ultra controllers were launched in March 2019. What is it? The ACTpro 1500 is a single door IP Controller and includes a dual-port Ethernet switch. The controller supports 60,000 users and includes a rich set of advanced features, including voltage monitoring and break glass monitoring. These controllers are ideal for a single door system or systems that need to grow up to 4,000 doors. How does it work? The PoE Ultra hardware in the controllers ensures support for all power requirements. This includes local door accessories and components such as card readers, door locks and request to exit buttons. PoE Ultra ensures that all of this is accomplished without the need for additional Power Supply Units (PSUs). Essentially, this saves the system user time and money. Moreover, as this is all powered over the Ethernet, it translates to less cabling and more convenience for installers too. Why does it matter? This is an important feature for installers because when a system is fast to install and more straightforward to set-up and quote, it removes the complexity from access control and allows installers to get more done, more efficiently, and in less time. This ultimately benefits their business and their bottom line.

Add to Compare
Vanderbilt AP01M-1220 Aliro AP01P+12V PSU, metal cabinet
Vanderbilt AP01M-1220 Aliro AP01P+12V PSU, metal cabinet

1 doors/controller, 4 cardholders, Universal / Wiegand Reader Interface, 100 ~ 240 V AC, 355 x 330 x 85, 4,000, -10 ~ +40 C (14 ~ 104 F), 0 ~ 75

Add to Compare
Vanderbilt AP01M-2420 Door Modules - AP01P+24V PSU, metal cabinet
Vanderbilt AP01M-2420 Door Modules - AP01P+24V PSU, metal cabinet

1 doors/controller, 10 000 cardholders, 100 ~ 240 V AC, 355 x 330 x 85, 4,000, -10 ~ +40 C (14 ~ 104 F), 0 ~ 75

Add to Compare
SALTO CU5000 off-line door controller with two wall reader connections
SALTO CU5000 off-line door controller with two wall reader connections

Standalone/Networkable, 1 doors/controller, 64,000 cardholders, Offline Capabilities, Networkable, 2 relay outputs, 12 V DC, -20 ~ +80

Add to Compare
Honeywell Security MX04-NC single door control unit with normally closed relay
Honeywell Security MX04-NC single door control unit with normally closed relay

Standalone/Networkable, 1 doors/controller, Networkable, IP66

Add to Compare
AMAG Symmetry EN-1DBC single door edge-network intelligent controller
AMAG Symmetry EN-1DBC single door edge-network intelligent controller

Networkable, 1 doors/controller, 50,000 cardholders, Offline Capabilities, Wiegand reader, Universal / Wiegand Reader Interface, 1,000, 40 V DC, 15.4 W, 173 x 120 x 35, 0 ~ 50 C (32 ~ 122 F), 15 ~ 90

Add to Compare
HID ESH400-K single door access control system
HID ESH400-K single door access control system

Standalone, 1 doors/controller, Ethernet (10/100), Hi-O CANbus, Wiegand or Clock-and-Data, Universal / Wiegand Reader Interface, 155 x 123 x 371, 320, 0 ~ 50 C (32 ~ 122 F), 5 ~ 95

Add to Compare
Vicon VAX-1D-REX single door access control controller
Vicon VAX-1D-REX single door access control controller

Networkable, 1 doors/controller, Networkable, Universal / Wiegand Reader Interface, PoE, 20 W

Add to Compare
Kantech KT-100
Kantech KT-100

Standalone, 1 doors/controller, Offline Capabilities, TCP/IP, 4 inputs, 2 outputs, Universal / Wiegand Reader Interface, 14 V DC, 50 mA, 114 x 70 x 30, 2 ~ 40, 0 ~ 95, Mini Door Controller

Add to Compare
Rosslare Security Products AC-115
Rosslare Security Products AC-115

Networkable, 1 doors/controller, 2400 cardholders, Offline Capabilities, Networkable, RS-485, 1 in, 1 out, Universal / Wiegand Reader Interface, 16 V AC, 120 mA, 30 x 85 x 134, 220, -31 ~ +63, 0 ~ 95

Add to Compare
IDTECK’s  iCON100, increases security level at reduced cost
IDTECK’s iCON100, increases security level at reduced cost

Due to the global economic meltdown, all the businesses and companies around the globe have been recognized to set cutbacks on their security budgets. To override the current trend of security cutbacks, IDTECK, a 20-year veteran in the security industry, suggests a perfect solution for this matter. IDTECK is renowned for its high quality products and recognition as the one of leading security brands in the market, yet guarantees more adequate price compared to other named brand companies. iCON100, single door access control panel, has drawn a lot of attention in the European market for providing the highest security level at an appropriate price.Single door control panel, iCON100 stores up to 50,000 users and 50,000 events and supports RS232, RS422 and TCP/IP network communications. As the device supports 26/34 bit Wiegand, it can be used with RF reader, smart card reader, keypad (password & PIN) reader, biometric reader and other different types of readers. It is equipped with two reader ports, which allows it to manage maximum of two doors.In addition, when it is integrated with STARWATCH STANDARD, IDTECK's access control and time & attendance software, it allows management of multiple sites (companies) using the remote control to increase user's convenience. The integrated system also provides various time schedules and integrated monitoring using the map function to fulfil all the access control and time & attendance needs. With all the distinctive features mentioned above, iCON100 is the perfect solution for small to medium sized buildings or businesses.Recognized for its stability and performance, iCON100 is already being widely used in countless European countries such as Italy, Germany, Greece, Spain, Portugal, Romania and many more. Long experience in biometric access control and time & attendance field, IDTECK products assure the most reliable technology out in the security market. IDTECK offers a wide range of security products, to provide the best security solution to suit your needs. All of IDTECK products are certified by UL, CE, FCC, MIC, and RoHS to satisfy the standards for international exports.Key features: Up to 50,000 usersStandalone/network communication via RS232/RS422/RS485/TCP/IPIndependent 5 inputs and 4 outputs26bit/36bit Wiegand selectableEnhanced stability due to the Automatic System Reset FunctionSupervised input signal check

Add to Compare
Paxton’s Net2 Provides Advanced Security at the UK’s Leading Data Hosting Centre
Paxton’s Net2 Provides Advanced Security at the UK’s Leading Data Hosting Centre

32 door Net2 system from PaxtonIris scannerBullet proof security boothCCTV integration Gyron are a leading UK provider of data centre services. The dynamic company has expanded from their London Docklands facility to a new site in Hemel Hempstead, where they offer customers the highest standards for colocation and managed hosting.They have a diverse range of clients, from government departments and large IT consultancies to multi-billion dollar global enterprises. It is essential to offer them a high level of security at Gyron's facilities.Ben Miller, Gyron's Operations Director says: "Think of us as technical landlords, some customers are hosting up to a quarter of a million websites each. They really need to be sure of how advanced our technical facilities are."Robin Balen, Gyron's Managing Director says: "In addition to ensuring all the technical aspects of our new centre are first class, we needed to ensure that our security systems are top class as well."An important part of the security offered is the access control system.  Robin says: "Without access control we wouldn't have any customers."Net2 provides the flexibility needed and the audit trail that is essential for Gyron's business. Anyone visiting Gyron has to pass through stringent security. Barriers and rising bollards protect the car park, with the secure data centre guarded by a full height, bullet proof glass ‘man trap'. Users gain access using their token then, once inside, an iris recognition reader checks their credentials and performs an ultrasonic scan to ensure only one person is present, before granting access to the secure area. The iris reader is linked into the Net2 system, giving a full event log of people moving into and out of this area.

Add to Compare
HID ESHR40-K standalone single-door IP access control solution
HID ESHR40-K standalone single-door IP access control solution

Standalone, 1 doors/controller, PoE, 84 x 122 x 31, 180, 0 ~ 50 C (32 ~ +122 F), 5 ~ 95

Add to Compare
HID ESHRP40-K networked controller/reader & module
HID ESHRP40-K networked controller/reader & module

Standalone/Networkable, 1 doors/controller, Networkable, 84 x 122 x 31, 180, 0 ~ 50 C (32 ~ 122 F), 5 ~ 95

Add to Compare
HID ESHR40-L networked controller/reader & module
HID ESHR40-L networked controller/reader & module

Standalone/Networkable, 1 doors/controller, Networkable, PoE, 84 x 122 x 31, 180, 0 ~ 50 C (32 ~ 122 F), 5 ~ 95

Add to Compare
SALTO CU50EN IP door controller with two wall reader connections
SALTO CU50EN IP door controller with two wall reader connections

Standalone/Networkable, 1 doors/controller, 64,000 cardholders, Offline Capabilities, Networkable, 2 relay outputs, 12 V DC, -20 ~ +80

Add to Compare
HID EH400 single door networked access controller
HID EH400 single door networked access controller

Networkable, 1 doors/controller, 125,000 cardholders, Networkable, Ethernet (10/100), Hi-O CANbus, 12 V DC, 18 W, 82 x 120 x 22, 180, 0 ~ 50, 5 ~ 95

Add to Compare
Vicon VAX-1D-1 single door controller
Vicon VAX-1D-1 single door controller

1 doors/controller, Universal / Wiegand Reader Interface, 12 ~ 24 V DC, 254 x 51 x 83, 400, 0 ~ 50 C (32 ~ 122 F), 10 ~ 90

Add to Compare
Vicon VAX-1D-REX-1 single door controller
Vicon VAX-1D-REX-1 single door controller

1 doors/controller, Universal / Wiegand Reader Interface, 12 ~ 24 V DC, 254 x 51 x 83, 400, 0 ~ 50 C (32 ~ 122 F), 10 ~ 90

Add to Compare
Click here to view discontinued Access control controllers
  • «
  • 1
  • 2
  • 3
  • »

Browse Access Controllers

  • Controller Type
  • Networkable
  • Standalone
  • Standalone/Networkable
  • Max No. of Doors per Controller
  • 1
  • 1 ~ 2
  • 1 ~ 32
  • 1, 2
  • 10
  • View more
  • Make
  • Hikvision
  • Vanderbilt
  • ACT
  • Vicon
  • HID
  • Honeywell Security
  • Kantech
  • SALTO
  • View more

Access control controller products updated recently

Axis Communications A1601 Network Door Controller

Axis Communications A1601 Network Door Controller

HID MR16OUT-S3 interface panel

HID MR16OUT-S3 interface panel

HID MR16IN-S3 16 input interface panel

HID MR16IN-S3 16 input interface panel

HID MR52-S3 dual card reader interface panel

HID MR52-S3 dual card reader interface panel

HID MR50-S3 single card reader interface panel

HID MR50-S3 single card reader interface panel

Vicon VAX-1D-REX-1 single door controller

Vicon VAX-1D-REX-1 single door controller

Vicon VAX-1D-1 single door controller

Vicon VAX-1D-1 single door controller

Vicon VAX-2D-REX-1 two door controller

Vicon VAX-2D-REX-1 two door controller

Vicon VAX-2D-1 two door controller

Vicon VAX-2D-1 two door controller

Suprema CoreStation Intelligent Biometric Controller

Suprema CoreStation Intelligent Biometric Controller

Access control controllers - Expert commentary

The intersection of education and fire and security
The intersection of education and fire and security

Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From kindergarten to university Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognises outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education.  Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customised solution Chubb Sicli’s quality, capability, and security expertise provided a customised solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.

How to build an insider threat programme
How to build an insider threat programme

Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.

The benefits of an integrated security system
The benefits of an integrated security system

Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.

Featured white papers
Nine ways to make your retail security system work harder

Nine ways to make your retail security system work harder

Download
Financial institutions require future-ready physical security technologies

Financial institutions require future-ready physical security technologies

Download
Understanding the trade-off between image resolution and field of view

Understanding the trade-off between image resolution and field of view

Download
Access control controller news
FERMAX enhances security at Ciudad Ros Casares with its MEET IP System

FERMAX enhances security at Ciudad Ros Casares with its MEET IP System

Idesco secures Infobric’s construction site with its transparent reader

Idesco secures Infobric’s construction site with its transparent reader

ASSA ABLOY secures 5 universities with its wireless access control systems

ASSA ABLOY secures 5 universities with its wireless access control systems

Access control controller case studies
  • FERMAX enhances security at Ciudad Ros Casares with its MEET IP System
  • Idesco secures Infobric’s construction site with its transparent reader
  • ASSA ABLOY secures 5 universities with its wireless access control systems
  • Traka safeguards national distribution centre of a reputed supermarket with its access control systems
See companies providing Access Control products
  • Access control Manufacturers
  • Access control Distributors
  • Access control Resellers / Dealers / Reps
  • Access control Installers
  • Access control Consultants
  • Access control Systems integrators
  • Access control Events / Training / Services

Follow us

Sections Products Companies News Insights Case studies Markets Events White papers Videos
Topics Artificial intelligence (AI) Cyber security ISC West Counter Terror Robotics Body worn video cameras Intrusion detection Video management software Trade Show/Exhibition
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2019, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec
Updated Privacy and Cookie Policy
We have updated our Privacy Policy for GDPR.
We also use cookies to improve your online experience, Cookie Policy