Rosslare Security Products Electronic Keypads for Access Control Systems(1)
Unique ultra-slim profile, smooth metallic surface and highly sensitive piezoelectric keys make this unit extremely attractive for all-weather PIN access applications. Fully sealed and epoxy potted in a metal housing, the AYC-E55 offers an exceptionally durable solution for any need. As part of Rosslare's convertible line of readers/controllers, this unit can be operated as a keypad reader that connects to any standard controller, and converts into a secure 500-users stand-alone controller when connected to Rosslare's PS-x5 family of intelligent power supply/relay unit.For greater peace of mind, this sturdy access control unit provides a rugged keypad with advanced access control features, in a unique aesthetic and strong housing.The AYC-E55 offers programmable PIN transmission formats, LED Control and tamper detection, providing extra security and flexibility.Come rain or shine, this unit can handle the challenge, with its rugged slim design, metallic housing and waterproof enclosure for maximum durability.The piezoelectric keypad with highly sensitivity keys allows easy and smooth operation, making these units ideal for residential and commercial applications.Add to Compare
Browse Electronic Keypads for Access Control Systems
- Other Rosslare Security Products products
- Rosslare Security Products Access control readers
- Rosslare Security Products Intruder alarm system control panels & accessories
- Rosslare Security Products Access control software
- Rosslare Security Products Access control controllers
- Rosslare Security Products Access control systems & kits
Electronic keypad products updated recently
There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running. According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system Educating the smart home consumer Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app. Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities. Smart technology is increasingly becoming the new norm in terms of home security Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace. Secure homes through smart technology Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door. It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course. In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi. "Smart" security on the move The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change. Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock. Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore Holiday rentals and smart home tech ASSA ABLOY research published in 2017 forecasts continued growth in the European holiday rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travellers. A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built holiday rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. Travellers use their phones and an app to unlock their apartment. For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types of access control authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organisations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasise, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organisations want to use smart phones in their upcoming access control implementations. Smart phone access control is secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices.All that should be needed to activate newer systems is simply the phone number of the smart phone Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone. Bluetooth and NFC the safer options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defence of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging systems could cause problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organisations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organisations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
The physical security market continues to experience growth as users look to capitalise on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase in cybersecurity threats and breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organisations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand for safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalise on opportunities for growth in the coming year.
Rosslare Enterprises Ltd., global provider of professional security solutions, announces that it has been awarded CE (RED) 2017 Edition, and FCC (CFR 47 – Part 15.B) certification on its new AY-U920BT and AY-H915BT UHF SMART BLE-ID and long-range UHF Readers.“We are very pleased to be able to present these products to North America and European Union channel partners that are certified to operate within the radio equipment limits of those countries,” said Ezra Ozer, Director of Marketing. UHF-RFID passive tag technology For parking management, a UHF solution is very convenient for drivers, as they do not need to open any windows to present a RFID tag to a wall reader The main benefits of this UHF-RFID passive tag technology featuring EPC-Gen 2 tag include the ability to read multiple tags within the read range (up to 70 tags) and the ability to achieve a read range of up to 12 meters (U920) and 6 meters (U915), where standard RFID and NFC are between 6 to 70 cm. This tenfold increase in range of an UHF-RFID tag allows for much more freedom of motion for the user. For parking management, a UHF solution is very convenient for drivers, as they do not need to open any windows to present a RFID tag to a wall reader (safe from open window hazards). The UHF reader also reads from a range that allows quick and efficient access to the car park, as the gate begins to open as you approach from a distance. This in many cases lets the car arrive at an already open gate, which saves time. UHF-ID tagging solution The UHF-ID solution is passive, meaning that the tag on the car has no local power source and enables the daily operation to be maintenance free, which reduces the total cost of ownership (TCO). With no batteries to change, the solution is maintenance free once installed. Because none of the components have any moving parts, there is very little wear and tear. The BLE-ID Bluetooth credential feature allows for driver and vehicle authentication by systems that have a vehicle with several driversIn addition, the readers support Rosslare BLE-ID credentials that are based on smartphone apps (available for Android and iOS), which allow the user to submit the credential to the readers from the smartphone. This allows remote enrollment via an in-app email – to register to the access control system – making it very easy to add users and visitors access credentials on route to any site. Efficient driver and vehicle authentication The BLE-ID Bluetooth credential feature allows for driver and vehicle authentication by systems that have a vehicle with several drivers. The system can log which driver is with which vehicle and request dual authentication. This feature is especially useful for businesses that want to monitor vehicle and driver use and be able to manage the driver authorisation to use the vehicle. “We developed this product with the customer in mind to cover as many new use cases as possible, and to provide a system solution approach. We strive to offer something innovative and unique to the global access control market, and with this product we are establishing a new baseline for user convenience and security for our channel partners. With this reader and smartphone app offering, we are providing our channel partners with new ways to win and generate project revenues with a huge value-added to the end user,” said Omer Davidov, Product Manager.
Rosslare Enterprises Ltd., a worldwide provider of professional security solutions including access control, detectors and guard patrol, announced the launch of the Rosslare BLE-ID app. By installing the app in their smartphones, users can use the smartphone as a credential for access control and automation applications. The ID code generated by the app is unique to the device, and may be transferred easily by email to the system administrator. The main benefit of this technology is that the user is no longer obligated to carry a physical RFID card Cost-effective credential solution Rosslare’s new CSN SMART readers will appear in the app, and the user just needs to tap on the reader name to submit the credential to that particular reader. The main benefit of this technology is that the user is no longer obligated to carry a physical RFID card. In addition, the 10-meter operating range of the app introduces a new set of convenience factors. The CSN SMART readers feature a multi-credential UID read technology for contactless smart cards (13.56 MHz) that can read the Card Serial Number (CSN) of many smart card RFID standards. The readers have the ability to read Rosslare’s BLE credential technology and PIN codes (AY-H6355BT), providing the most cost-effective credential solution for any application. The readers are rated IP65 and feature a modern design that can fit comfortably in any installation environment, indoors or outdoors. The app is available for download from Google Play Store and App Store. The creation of the BLE app evolves from our customers, who needed an alternative credential that can be used together or as a physical credential card" Secure entrances with personal devices With the new release, clients utilising Rosslare technology are able to secure their facility entrances and exits using personal devices as identification. This new app makes access control more cost-effective and easier for Rosslare clients everywhere. "The creation of the BLE app evolves from our customers, who needed an alternative credential that is affordable, reliable, and their users will embrace, and can be used together or as a physical credential card. Step into the future with Rosslare smart solutions," said Ezra Ozer, Director of Marketing of Rosslare’s Security Products division.
Rosslare Security, a leading global provider of professional solutions, is pleased to announce that it has received the UL294 Certification for its AC-825IP Networked Access Control platform. The AC-825IP incorporates a bi-directional push communication for enhanced data transmission speed and reliability to manage events in real time. The controller comes with one onboard expansion slot and can be further expanded by connecting up to 12 expansion boards via OSDP: R-805 – 12 outputs, S-805 – 12 inputs, D-805 – 4-door expansion, and P-805 – 16 inputs and 8 outputs. The AC-825IP features a new spacious and lockable metal enclosure that includes a control board, switch mode power supply, a built-in power management board/charger, sounder, and a revolutionary enclosure illumination bar that lights up when the enclosure is opened. Includes Pull-Safe lockable mechanism The metal enclosure also includes a Pull-Safe™ lockable mechanism for the C13/14 power connection to prevent accidental disconnection and tampering, another unique feature created by Rosslare Security. “Receiving UL Component Recognition for our network controllers’ platform shows customers that our products meet the industry’s highest security and safety standards.” said North America National Sales Manager, Rosslare Security Products, Inc.
Why outdated access control systems are a big problemDownload
Five things to consider for AI with video technologyDownload
OSDP is the strongest access control for your businessDownload
- SALTO integrates with KeezApp technology platform for enhanced hospitality experience
- Primark equips its distribution centres with intelligent Traka DockSafe solutions
- Renvico chooses the LOCKEN access control solution to secure wind farms
- MOBOTIX cameras ensure safe operations at waste management company in Germany