Electronic Door Locks & Locking Devices(952)
The H4 Video Intercom integrates a 3 MP camera with a high-performance intercom and features exceptional wide dynamic range, low-light, noise reduction and echo-cancelling technologies for clear viewing and two-way communication with visitors. Combined with Avigilon Control Center (ACC) video management software, this secured entry system enables operators to quickly and easily identify and communicate with a visitor before remotely granting access.
The new Aperio® H100 packs the power and flexibility of wireless access control into one slim, cleverly designed door handle. With easy retrofitting to almost any interior door and comprehensive RFID compatibility, the new Aperio® H100 handle makes extending access control to more doors cost-effective by integrating with a vast range of third-party systems. The Aperio® H100’s stylish design is perfect for indoor office and facility doors. The Aperio® H100 can work within an online access control system or offline as a standalone device. A battery fits inside the handle, ensuring a minimal footprint and a discreet look to gel with any contemporary door style. The Aperio® H100 is easy to retrofit on existing doors, with no drilling and no wiring required. Any existing mechanical cylinder can still be used. The Aperio® H100 is specified with maximum flexibility and designed to fit almost any format of interior door. The Aperio® H100 is compatible with most common European (DIN) and Scandinavian mortise locks, in wooden, steel, tubular frame or glass doors with standard lock cases. It comes in left- and right-hand versions for a door between 35mm and 80mm thickness, with optional U-handle and USB adaptor. The Aperio® H100 is compatible with multiple RFID technologies, including iCLASS®/ISO14443B, iCLASS® SE, Seos®, MIFARE® Classic, Plus and EV1, and DESFire® SE. “Like all Aperio® devices, our new handle can upgrade site security for a very affordable price,” says Matthias Weiß, Product Manager Aperio® at ASSA ABLOY EMEA. “The Aperio® H100 further extends a range which adds access control wirelessly to exterior and interior doors, from fire and safety doors with regulatory requirements to meeting rooms, labs and offices.” The new Aperio® H100 handle completes a comprehensive range of Aperio® wireless access control devices that already includes online and offline Aperio® cylinders (C100/C900) and escutcheons (E100/E900); an online and offline lock (L100/L900); and a wireless lock for bringing server racks and cabinets (KS100) into the same access control system as doors.
The modern workplace never rests. People are always on the move and the environment is subject to constant change. As a result, the need for effective, flexible control and security is increasingly important. Every site has its own challenges and requirements; from the protection of files and documents to restricting access to sensitive areas in a medical centre or having real-time information about employee movements around a complex company. Intelligent online access control For every one of these needs and more, SMARTair™ Pro Wireless Online offers the ideal access control solution. This secure wireless system is quick and easy to install and provides cost-effectiveness by keeping energy use and maintenance costs to a minimum. The new SMARTair™ solution is an intelligent online access control system that uses bi-directional encrypted radio frequency communication to upgrade security and convenience for all building users. SMARTair™ wireless, battery-powered door devices communicate with the central control system via TCP/IP hubs. With SMARTair™, system administrators can now open secure doors from anywhere, configure a user’s access rights remotely, or obtain real-time audit trails for any access point within the organisation. Lost or stolen cards can be instantly cancelled. Simple and intuitive system software makes it easy for facility managers to receive active e-mail warnings and real-time reports, access real-time door updates, or modify the time and scheduling of access rights. Key components The system has a simple but effective architecture consisting of four key elements. Door and wall devices include wireless electronic escutcheons, cylinders and wall readers that can be installed at any type of exterior or interior door or access point. The SMARTair™ admin software is an intuitive management tool that offers flexibility and real-time control, accessible also from a secure portal that works inside almost any standard web browser. Communication hubs are the nexus between the management software server and the wireless online devices. Each can connect up to 30 access points at a distance of up to 30 metres. Finally, SMARTair™ supports all major RFID technologies, including iCLASS® by HID, MIFARE CLASSIC, DESFire and SKIDATA. It’s also compatible with multiple credentials for user convenience, including the SMARTair™ mobile phone app (Android, iOS, WinPho), cards, tags, bracelets and stickers. For more information visit www.tesa.es/discoverwireless
Complete access control and video management A browser and an internet connection are all that's required to access Vanderbilt’s latest addition to its cloud-based arsenal. ACT365 is a complete access control and video management solution. Ease of use and convenience are key ingredients to the product’s strength and depth in the field. ACT365 eases the installer's job for simple and quick installations and performing maintenance tasks remotely. The result is delivering ultimate control while saving time and money. With access to all sites from one online interface, installers can get more done, more easily, and in less time. Managing systems remotely Moreover, as ACT365 hardware is connected directly to the IP network, and no software needs to be installed as hosting is effectively outsourced, it ensures that the IT headaches of creating backups, VPNs, and port forwarding are things of the past. ACT365 also allows end-users the ability to manage their systems remotely including viewing live cameras. This remote monitoring capability makes it well-suited to multiple sectors. For example, dealing with early morning deliveries at a retail store is an ideal example of ACT365 in its prime. From the ACT365 app on their smartphone, the store manager can identify the courier through a live video feed and then remotely open the doors of the loading bay to allow the delivery to be made. The manager can monitor all of this remotely and once the delivery is finished, they can close the loading bay door and it will automatically rearm. Spotting misuse of gym membership Another instance of ACT365’s firepower can be seen at gyms or other types of membership clubs. If gym members are passing their access fobs to friends who are not members, ACT365 enables the gym manager to quickly match up access control events with relevant camera footage and email the clips to those members who are allowing their fobs to be misused. This is an effective way of ensuring the practice does not continue. As seen through numerous product demonstrations during IFSEC, ACT365’s features put the customer first. They eradicate once burdensome responsibilities that can now be promptly completed through the click of a button on mobile or desktop devices. Vanderbilt’s investment and innovation in cloud-based solutions harness the best efforts of the company’s core qualities – agility, adaptability, and dependability. Through the power of remote monitoring available from ACT365, Vanderbilt offers both installers and end-users convenience thorough simplicity.
Imagine that you can send registrations online to any smartphone. Authorised people receive a text message (SMS) and then a digital key. This functionality is enabled by the new AirKey ‘Send a key’ function, available as part of the new update. EVVA has also added ‘Geotagging’ functionality. In this process, smartphones know where master key system components are located and guide the way using the navigation app. This is particularly handy if people are granted temporary access and need to become familiar with the environment. Now also for iPhones Thanks to the extension to available NFC components (near field communication) featuring Bluetooth Low Energy (BLE), EVVA has significantly multiplied the number of users. Now users have the choice. They can now choose which technology matches their usage characteristics most and which software they would like to apply to gain access. Both systems meet today's maximum security standards.Add to Compare
The new CLIQ® Connect solution is a simple and cost-effective way for facility managers to administer mobile workers’ access control rights. Facility managers can update, amend, revoke or renew access rights remotely using the CLIQ® Web Manager software and the latest Bluetooth technology paired with a mobile phone. This enables a mobile worker in any location to access locks. They simply open the CLIQ® Connect app on their mobile phone to transfer updated access permissions instantly to their programmable CLIQ® key via Bluetooth. Flexible access control and key management CLIQ® is a locking system with high-end microelectronics powering programmable keys, cylinders and padlocks. It provides flexible access control and key management solutions for all kinds of locking applications, including those at critical infrastructure sites. With CLIQ®, each employee or contractor has tailored, individual access rights based on the specific time and date needed, all stored in their own programmable CLIQ® key. A lost key no longer threatens site security: system administrators simply remove its access permissions via the user-friendly CLIQ® Web Manager software — anytime and from anywhere. CLIQ® Connect app The new CLIQ® Connect app, part of the trusted CLIQ® ecosystem, makes mobile workflows even smoother. A keyholder no longer needs to update access rights physically in person, carry additional updating devices, or even return to base. CLIQ® Connect supplements — rather than replaces — wall or desktop programming devices (PDs). No additional hardware is needed, so off-site workers can amend their access rights without any need to carry mobile PDs. All they need is a smartphone and the CLIQ® Connect app. Data transfer between system and app is encrypted. The app pairs any programmable CLIQ® Connect key, via a secure cloud connection, with the CLIQ® Web Manager system. To change a keyholder’s access rights, the system administrator simply accesses the CLIQ® Web Manager software — from anywhere — and updates it. The keyholder makes a secure Bluetooth connection between the programmable CLIQ® Connect key and the app to instantly update their access permissions. Audit trails for any CLIQ® Connect key can be generated on demand, or automatically uploaded when a key’s access rights update takes place. The CLIQ® Connect key and companion app bring real-time security into the mobile era. Streamlining complex workflows “We designed CLIQ® to help our customers make their complex workflows more efficient,” says Kevin Hoare, Director Business Development CLIQ® at ASSA ABLOY EMEA. “With CLIQ® Connect, it’s now even easier to amend any time- or location-limited access rights that have been issued to remote workers. CLIQ® Connect significantly boosts site security, because access rights with very short validity are much easier to administer — making it even less likely that any lost key would pose a security threat. It slashes the time wasted on administering access rights, and saves money that would be spent on programming devices and key management systems.”
With the new CLIQ® Go app, businesses can unlock the power of access control, saving time and unnecessary workload in the process. CLIQ® Go locking technology allows users to manage security and access rights on the move, on the road and from anywhere in the world.Manage your system with the CLIQ® GO appThese days, all you need is an app to help you find a route, choose a restaurant, read a spreadsheet or check your bank balance. Now there’s an app that can help you manage your company locking system, too. Designed for busy managers, CLIQ® Go saves time and puts a digital solution in the palm of their hand. “CLIQ® Go is the ideal security system for small- to medium-sized businesses,” says Kevin Hoare, CLIQ® Business Development Director at ASSA ABLOY. “Managers don’t want to be wasting time changing all their locks because someone lost a key—and with CLIQ® Go they don’t need to. The ability to configure access control is at their fingertips.” Managers can administer their CLIQ® Go system in the cloud and from a mobile phone, tablet or PC, via a brand new, intuitive app. A few taps and swipes of the screen is all it takes to revoke, supervise or amend individual access rights. Keep your business on the move The mechatronic CLIQ® Go system combines the best of mechanical and electronic security to meet the needs of a busy workplace. The electronic lock’s power is provided by a battery inside every programmable key, meaning it works independently of mains power. The system is designed to fit existing doors and lock cases, making it cost-effective and hassle-free to install. Site security can get the CLIQ® Go upgrade with minimal disruption to day-to-day operations. The cylinders and keys are built to withstand the elements, so can be used on interior and exterior openings, and work across multiple types of enclosure – not just doors but cabinets, cupboards and padlocks, too.
Exhibiting at IFSEC, stand F420 Nedap’s new end-to-end security solution is the first to offer digital protection for access control by unifying best practices from both IT and physical security. Protecting access control systems Until now, the latest best practices protecting IT systems from digital threat haven’t been used for physical access control systems. This is an oversight that is leaving many companies vulnerable to cyber attacks. Nedap and AET Europe have worked together to overcome this by developing AEOS end-to-end security. Taking a forward-thinking new approach, they have combined the best practices of both IT and physical security in an all-in-one access control system. Albert Dercksen, Head of R&D at Nedap, explains why AEOS end-to-end security is needed: “IT and physical security have been following different rules to protect systems. But modern access control systems are, in fact, IT systems connected to corporate networks and should be treated as such. That’s why we’ve applied the digital security principles used in IT to AEOS, our physical access control system.” Communication secured from end-to-end In AEOS end-to-end security, Nedap and AET Europe have combined the IT principles of encryption and strong authentication. This ensures storage in every element of AEOS is secure, as is communication between all elements. Both DESFire keys and digital certificates are stored in a Secure Access Module (SAM) inside door controllers. This leaves card readers with no role in decrypting data, so secure communication between card and controller is guaranteed and, by storing digital certificates in the same SAM, strong authentication is achieved to ensure secure communication between controller and server. Protect critical infrastructure In this way, AEOS end-to-end security offers far higher protection against both physical and digital threats. It also enables keys to be updated securely and centrally, without having to physically attend each card reader. AEOS end-to-end security meets a stringent level of security requirements across Europe, and is already being used to protect critical infrastructures in several countries. In France, for example, it has gained CSPN certification from the French information security agency, ANSSI.
The world is experiencing a smart revolution. However, the intercom sector is not on the same page as this momentum in that traditional IP or even analogue systems still dominate. Akuvox aspires to open a new intercom epoch with its ground-breaking R29S, a smart Android video door phone with a large touch screen. An elegant yet robust body elaborately converges the latest technologies in intercom, telecommunication, video surveillance, alarm systems and access control based on a fully-exploited Android OS. Combining advanced features with easy operation, it represents the highest level of its kind in the industry. Smart phone similarities R29S is comparable to a smart phone for use in buildings; it is natural and convenient for users to either swipe on the 7-inch touch screen to find names or to search contacts manually which are listed alphabetically in a pre-built phone book. R29S also imports the latest facial ID authentication as an option, which is becoming popular in smart phones. With it, residents no longer have to worry about forgotten cards, passwords or mobile phones - Just smile to gain access! Enterprise-grade quality Akuvox started its business with SIP phone for business settings, which places high demand on the communication quality, and has been able to fuse its SIP expertise with Android for intercom. As such, the communication between R29S and other intercom devices features swift message transmission and high clarity, even in busy areas. Building an intelligent environment Android gives new power to R29S. Running on Android, R29S can easily connect with other security devices through its built-in interfaces or ports for enhanced security and smarter control of building surroundings. Some of these include intruder alarm, fire alarm and extra access control system. Its integration with external IP cameras in accordance with ONVIF standards enables wider surveillance coverage and generates a greater sense of security, while its compatibility with IP phone systems via SIP means easy access to services, for example seeking help from security guards when spotting suspicious people loitering around. Catering to unique lifestyles SDK/Android API is offered to tech-savvy customers for personalising the function of R29S for communities from varied cultures or for diverse application scenarios, such as a customised UI that better suits the aesthetic perception and habit of usage of the local people. These merits of R29S are what Akuvox believes to be the criteria of a fully-fledged Android intercom for the smart age. To put it simply, they offer a smooth and straightforward user experience, lifelike communication between users at intercom endpoints, smart and easy integration with other digital systems and maximum freedom in customisation and innovation. So, are your Android intercoms the real deal?
ISONAS has taken its Software Development Kit to the next level and now offers a simple integration with the ISONAS Pure IP™ hardware solutions, giving customers real choice in their access control hardware. Access control evolution Partners can now create a powerful solution and add the next evolution in access control hardware to their product selection; while benefiting from future proofing their selections, reducing costs and giving them choice in their access control hardware. This comprehensive software development kit from ISONAS, makes it easy to integrate 3rd party access control software with the ISONAS Pure IP hardware families. ISONAS SDK platform While other SDK’s use low-level, error-prone TCP/IP communication to integrate, the ISONAS SDK platform supports high-level management mechanisms for event management, local discovery, communication and configuration. Using the .NET framework, the ISONAS SDK allows users to customise which features and functions of the ISONAS hardware to implement. With the ISONAS SDK, partners can add choice to their access control hardware solutions and go to market in no time. An open platform philosophy is nothing new to ISONAS. The company has a long history of integrations and with this significant investment into a modern SDK, ISONAS is furthering its mission to become a global player in open architecture hardware and software.
Facilitates the delivery of citizen centric services, building trust and convenience Allows the quick, efficient and secure issuance, modification or revocation of mobile IDs Improves law enforcement interaction with citizens Prevents counterfeiting through electronic authentication Works across multiple platforms and operating systems Opens the door to new revenue opportunities Can be easily and securely verified, both online and offline
A unique device, the 3D Terminal works by obtaining a high resolution, nail to nail image. The level of detail is impressive, making it the most accurate fingerprint in the world. The accuracy ensures maximum security, and due to the level of details obtained, even the most challenging fingerprint conditions are met: intrusions such as dirt, dust, oil, water, etc. pose no challenge. Shallow fingerprints and even deliberately erased ridges are still accurately read. An unmatchable level of security.
Nedap’s new end-to-end security solution is the first to offer digital protection for access control by unifying best practices from both IT and physical security. Protecting access control systems Until now, the latest best practices protecting IT systems from digital threat haven’t been used for physical access control systems. This is an oversight that is leaving many companies vulnerable to cyber attacks. Nedap and AET Europe have worked together to overcome this by developing AEOS end-to-end security. Taking a forward-thinking new approach, they have combined the best practices of both IT and physical security in an all-in-one access control system. Albert Dercksen, Head of R&D at Nedap, explains why AEOS end-to-end security is needed: “IT and physical security have been following different rules to protect systems. But modern access control systems are, in fact, IT systems connected to corporate networks and should be treated as such. That’s why we’ve applied the digital security principles used in IT to AEOS, our physical access control system.” Communication secured from end-to-end In AEOS end-to-end security, Nedap and AET Europe have combined the IT principles of encryption and strong authentication. This ensures storage in every element of AEOS is secure, as is communication between all elements. Both DESFire keys and digital certificates are stored in a Secure Access Module (SAM) inside door controllers. This leaves card readers with no role in decrypting data, so secure communication between card and controller is guaranteed and, by storing digital certificates in the same SAM, strong authentication is achieved to ensure secure communication between controller and server. Protect critical infrastructure In this way, AEOS end-to-end security offers far higher protection against both physical and digital threats. It also enables keys to be updated securely and centrally, without having to physically attend each card reader. AEOS end-to-end security meets a stringent level of security requirements across Europe, and is already being used to protect critical infrastructures in several countries. In France, for example, it has gained CSPN certification from the French information security agency, ANSSI.
With Openow™, facility managers and security administrators have more control and no longer need to administer physical credentials. And it’s fast and easy to upgrade an existing SMARTair® system to work with Openow™ or to install mobile-ready, wireless SMARTair® access control from scratch. The new Openow™ app has been designed around convenience, security and user experience with virtual keys. Information transfer between administration software, smartphone app and the SMARTair® device is protected by end-to-end encryption. “Right from set-up — involving simple, secure email subscription — users find the Openow™ app a joy to operate. Tap a SMARTair® lock with your phone carrying a valid virtual key, and the door unlocks. The device you carry everywhere — the smartphone — now replaces a separate RFID card with MIFARE®, DESFire, iCLASS® and other proximity technologies.” explains Félix Morán SMARTair® Product Manager at ASSA ABLOY. Openow™ also adds further layers of security to every premises Facility managers find life a lot simpler when managing access rights with the Openow™ mobile solution. Change the validation time in the administration software to automatically update a user’s virtual key (when the phone has a signal). Cancel a virtual key and it vanishes immediately from a user’s app. Facility managers can check and amend the validity of each virtual key whenever they want, and wherever they are. The complete mobile solution includes the SMARTair® device range, with wireless escutcheons and cylinders plus wall readers; the intuitive SMARTair® TS1000 software; user credentials, e.g. cards and the new Openow™ app. Business owners and directors project the right image for their premises when they offer mobile credentials via Openow™. Phones replace plastic key-cards, so there’s no need for a card activation terminal on reception or elsewhere. Users also save time, because there’s no longer any need to collect or validate an access card: your key is already on your smartphone. Openow™ makes it easy to organise virtual keys inside the app, check how long they are valid, and protect them further with an individual PIN. If you have virtual keys from multiple sites or premises, Openow™ easily handles those, too. No more key-card, or wondering where you left it; no more appointments to pick one up or have it revalidated. With Openow™, if you have your phone, you are already carrying your keys. The SMARTair® Openow™ app is free to download now from Apple’s App Store and the Google Play Store. For more information, see www.tesa.es/discoverwireless Across the EMEA region ASSA ABLOY offers SMARTair® under several trusted security brands, including TESA, Mul-T-Lock, ASSA, JPM, KESO, RUKO and TRIOVING.
HID Location Services platform addresses workplace optimisation, on a growing market need for accurate, real-time location awareness and analysis of your workplace. The system combines the power of Bluetooth Low-Energy (BLE), Wi-Fi, and cloud-based technologies to provide a unique seamless user experience inside and outside of the workspace. Organisations receive increased visibility into the precise location of their workplace in a defined space (indoor positioning/outdoor positioning) and can use predictive analytics to quickly understand space usage and building operational efficiency.
The Aperio® Lock L100 features optimum physical protection and transmits comprehensive information on door status to the access control system via a wireless connection. Managing access authorisations online The lock allows you to easily integrate security doors into an access control system at a very reasonable price. It enables you to manage access authorisations online and in real time using a single system. Users can instantly obtain "open/closed" and "locked: yes/no" status information from the lock at a glance. The optimum burglary protection and resistance against extreme temperatures (down to -65 °C) ensure that the Aperio® lock is also suitable for outside doors with special security requirements. The lock features a protection rating of IP55. Unique wireless access solution Irrespective of the access control system type, Aperio® enables access control doors to be integrated using a wireless solution without any cabling and without any alterations to the door during installation, all at a considerably lower price than a wired high-end solution. The Aperio® Lock L100 offers a unique, easy way to integrate both outside and inside doors with high security requirements into access control systems. Users can continue to use existing cards or PIN codes to open and lock the new Aperio® doors while mechanical keys cease to be necessary.The Aperio® Lock L100 complies with EN 179 and EN 1125 requirements and bears a CE mark. It is available for fire doors and for different door profiles (Euro, Scandinavian, and Finnish). Visit www.assaabloy.co.uk/aperiowirelesslocks for more information.Add to Compare
ACT has used it's market experience and extensive research and development to bring you the best in wireless networked access control technology. With a long range wireless hub able to accommodate up to 32 locks per hub, the ACT pro eLock is a powerful, cost-effective solution. Working with the latest ACTenterprise software, the ACTpro eLock can be easily added to an existing ACTpro system. The eLock comes with key override or no key override options, and can also be fitted with a door forced/ajar sensor. The long battery life and easy installation, paired with ACT's 5 year warranty make the ACTpro eLock will give you true peace of mind, whilst delivering the most cutting-edge performance in its class. For more information, contact firstname.lastname@example.org, or call +353 1 466 2570.Add to Compare
Whether in business or multi-residential buildings, ASSA ABLOY´s architectural solution for glass is installed all over the world. Modern glass meeting rooms and office doors can now be equipped with wireless access control devices while maintaining aesthetics. ASSA ABLOY’s Aperio® Technology allows access control providers around the globe to integrate non-wired doors with mechanical locks into access control systems in a cost effective way. Architectural glass solutions with Aperio® escutcheons Highlights at a glance Stainless steel glass door plate is easy to install Suitable for every glass door profile Perfect match for stainless steel surfaces Available for Aperio Euro profile escutcheons (with cylinder cut-out or blind) ASSA ABLOY offers a variety of locksets you can combine with wireless Aperio® cylinders. Visit: www.glass-catalogue.com or www.assaabloy.co.uk/aperio.Add to Compare
“Using the new V3 platform, remote unlocking commands pass from system to door almost instantly,” says Gareth Ellams, Aperio® Business Development Director at ASSA ABLOY EMEA. “It represents a major upgrade in Aperio® processing power and memory space, and offers improved RFID performance when compared with the current V2 platform.” The boost in performance comes without sacrificing Aperio® class-leading energy efficiency. With wireless locks running the Aperio® V3 platform, for example highly-frequented entrance doors still run for two years on a standard battery, maintaining remote opening function with a heartbeat time of typically five seconds communication time between Aperio® lock and the access control system throughout the battery life. The new V3 platform supports multiclass high frequency RFID reading in one device. In addition it is also compatible with ASSA ABLOY’s Seos™ mobile access ecosystem for issuing, delivering and revoking digital keys on smart phones. With a comprehensive lock range covering almost every door style and opening, there's no reason to delay upgrading to faster wireless access control with Aperio V3®. About Aperio®: Available on the global market place, ASSA ABLOY’s Aperio® Technology enables a wide range of access control providers to cost-effectively integrate non-wired doors with mechanical locks into access control systems.Add to Compare
In a live demo, available on YouTube (http://youtu.be/Ta8J6vW9Zy4), a technician completes the whole installation process in 1 minute, 58 seconds. Aperio® is a quick and simple way to bring any internal door into an access control system. The Aperio® cylinder is available for rubber and metal knobs, and for many door profiles: Euro, Scandinavian, Finnish, and Swiss. It supports all leading RFID technologies, including MIFARE™, DESFire™, iCLASS® by HID and 125 kHz. As well as being quick to install, the Aperio® cylinder is also cost-effective to run, using standard batteries rather than the expensive, always-on mains connection demanded by wired access doors. About Aperio®: Available on the global market place, ASSA ABLOY’s Aperio® Technology enables a wide range of access control providers to cost-effectively integrate non-wired doors with mechanical locks into access control systems.Add to Compare
Whether you want to invest in a new wireless access control system or upgrade your existing doors, Aperio® is the intelligent answer to 21st Century building control. Aperio® wireless locks can be developed efficiently in any size of business, helping you to take control with a system that is quick and easy to install and delivers significant cost and energy savings. So, what’s the 21st-century solution? Upgrade your doors to Aperio® to… Solve the lost key problem by using secure RFID cards instead of keys Save time and money with keyless access control Connect more doors to your EAC system Get more control with audit trails Add access controlled doors without cabling Save energy with battery powered locks Aperio® is manufacturer-independent – over 100 access control providers offer wireless door upgrades with Aperio®. It´s so easy to upgrade a mechanical door to Aperio® – wireless and without disruption Step 1 Contact your access control provider to plan the upgrade. Don’t forget, Aperio® can be installed door- by-door and is suitable for interior or exterior, medium to higher security doors. Step 2 Install battery-powered devices with minimal disruption at the doors - no wiring is needed. Step 3 Save running costs. In comparison to wired access control doors, which are constantly under power, Aperio® doors only consume electricity when presenting a card. The battery life-time is approx. 40,000 cycles (2 years), and they are easy to exchange.Add to Compare
Xesar is the versatile security solution Xesar is the innovation from EVVA. The electronic locking system was developed and manufactured in Austria. It offers companies a host of products and application options as well as timeless design. Xesar scores high with a simple installation, free Xesar software and EVVA KeyCredits. Xesar at a glance Xesar provides a matching solution for any door requirements. Products, such as handles, cylinders, escutcheons or wall readers adapt perfectly to their environment in terms of functionality as well as design. Xesar offers a host of different identification media to enable users to identify themselves at the door and open it. Access authorisations are granted in the Xesar software. A coding station transfers the information from the Xesar software to any Xesar identification media. As a result, creating keys is child's play. The admin card required for programming offers additional security. No access authorisations can be granted without this card. The Xesar tablet is the practical companion that synchronises the Xesar software with individual doors. Xesar is the solution Xesar is the perfect solution for small and large facilities. Xesar controls complex tasks in companies, such as offices, trade, retail, healthcare and educational facilities, but also cultural institutions and leisure facilities. You can flexibly grant and revoke access authorisations. As a result, exclusively authorised users are granted access.Add to Compare
Dahua Technology, a world-leading manufacturer and supplier of video surveillance products headquartered in Hangzhou, China introduces Smart Lock series to the market with new appearance and excellent performance. Dahua Smart Lock is the electronic lock and key system designed to deliver superior security protection for the residential. The Smart Lock family incorporates three models which are ASL6101, ASL8101 and ASL8112, and three colors can be chosen for each of them. All models of the family support both password and card to unlock. Among the family, ASL8112 supports finger print unlocking, providing more secured solution to the users. The Smart Lock touchpad can be easily operated by touch and inputting password to wake up the system. All settings can be done by following the voice prompt, even without using the manual. The registration button is on the panel, pressing the button to begin all settings. The sleep mode of the smart lock will start automatically in 15 seconds if without using. The locks support 50-group user’s passwords and 50 pieces of IC cards. In addition to those benefits above, with the user-friendly design, the touchpad of ASL8 series works well for all types of heights. Besides, ASL8112 supports 50 groups of fingerprints. For the scenarios, ASL8 series is the perfect match of iron gates while ASL6 series goes perfectly with wooden doors. Therefore, Dahua Smart Lock series can be installed from big villas, modern office buildings to cozy apartments and alike. Features: Smart touchpad- easy operation and quick response, button will never strain. User-friendly design- the best angle for users Privacy password- XXX+123456+XXX,123456 is the password, XXX is random numbers Biological recognition- artificial fingerprint is invalid Auto-lock-the system will disable for 3 minutes if come across invalid password (3times) or invalid card (5times) Durable-delicate craftwork and long-life(30 years, 10 units/D)Add to Compare
Browse Electronic Door Locks & Locking Devices
- Solenoid Bolts
Electronic locking device products updated recently
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make improvements in the area of video security, and beyond. However, as the list of possibilities grows, so too does the risk of unauthorised access by cybercriminals. We should all be aware that a single weak link in a communications infrastructure can give hackers access to sensitive data. That’s the bad news. Safeguarding data and utilising deep learning The good news is cybercrime can be avoided by employing a data security system that’s completely effective from end-to-end. One technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’ Once this level of safeguarding is in place you can begin to confidently explore the technologies and trends happening now, and those on the horizon. So, what will be having an influence on surveillance in 2018? Well, according to IHS Markit, one technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’, which uses algorithms to produce multiple layers of information from the same piece of data, therefore emulating the way the human brain absorbs innumerable details every second. In Europe, GDPR compliance will also be a big talking point as new principles for video surveillance data collection, use limitation, security safeguards, individual participation and accountability are introduced. And, as the popularity – and misuse – of drones continues to rise, the recent developments in drone detection technology will be particularly welcomed by those whose primary concern relates to large areas, such as airport perimeter security. The future of 'smart' video analytics An important feature of today’s intelligent cameras is the ability to provide smart video analytics. The Bosch ‘i’ series, for example, offers a choice of formats – Essential Video Analytics and Intelligent Video Analytics. Essential Video Analytics is geared toward regular applications such as small and medium businesses looking to support business intelligence (e.g. inter-network data transfer), large retail stores and commercial buildings for advanced intrusion detection, enforcing health and safety regulations (no-parking zones or detecting blocked emergency exits) and analysing consumer behaviour. The camera-based, real-time processing can also be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Intelligent Video Analytics provides additional capabilities. It is designed for demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). An important feature of today’s intelligent cameras is the ability to provide smart video analytics Intelligent Video Analytics can also differentiate between genuine security events and known false triggers, such as challenging environments created by snow, wind (moving trees), rain, hail, and water reflections. For more expansive areas, like an airport perimeter fence, the system has the range and capability to provide analysis over large distances. And, if a moving camera is employed, it is also possible to capture data on objects in transit when used in conjunction with the Intelligent Tracking feature. For roadside use, Intelligent Video Analytics systems, such as the Bosch MIC IP range, are resistant to vibrations and can still operate in extreme weather conditions, continuing to detect objects in heavy rain or snow. Evolving cameras past surveillance It’s becoming ever clearer that the IoT is transforming the security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. The capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed) With intelligent video security cameras at the core of an urban infrastructure smart data can be collected to optimise energy consumption via smart city lighting that responds to crowd detection and movement. Cameras can also be used to improve public transport by monitoring punctuality and traffic flow based on queue lengths, with the ability to control traffic lights an option should a situation require it. As the urban sprawl continues and this infrastructure grows, the need for more knowledge of its use becomes more essential, necessitating the monitoring technology developed for use by human operators to evolve into smart sensing technology, that no longer just provides video feeds, but also uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant sensor data and present only meaningful events, complete with all relevant contextual data to operators to aid their decision-making. Expanding the video security camera network Today, video analytics technology has tangible benefits for human operator surveillance, and delivers KPIs that are highly relevant to transport operators, planners and city authorities. As an existing infrastructure, a video security camera network can be improved and expanded by installing additional applications rather than replaced. From a business perspective, that means greater value from a limited investment. Thereafter, the capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed), image and data interpretation, and the ability to perform a variety of tasks independently to optimise both your safety and business requirements. The fact is, cameras see more than sensors. Sounds obvious, but a conventional sensor will only trigger an alarm when movement is detected, whereas a camera can also provide the associated image and information like object direction, size, colour, speed or type, and use time stamps to provide historical information regarding a specific location or event. Based on this evidence, the video security camera of today is more than ready for the challenges of tomorrow.
Until recently, the convenience and security of “smart” electronic locks have been exclusively enjoyed by owners of homes, with renters largely being left out in the cold. Locked out by the temporary nature of their living arrangement, and not allowed to make structural changes to their temporary abodes, these renters have been unable to enjoy the many benefits of these connected devices. But today, smart lock capabilities are becoming available to renters and rental property owners, thanks in large part to new smart lock conversion products that let renters add smart capabilities without having to remove or alter their original lock hardware.Altering the functionality and aesthetics of your home exterior and interior is entirely your call as a homeowner, but it's more difficult for renters Rising influence of smart locks According to a Nov. 2017 Research and Markets report, “The smart lock market is expected to reach USD 2.67 Billion by 2023 from USD 1.28 Billion in 2017, at a CAGR of 13.11% between 2017 and 2023. Rising adoption of smartphones and other connected devices acts as a driver for the growth of the smart lock market. Moreover, growing security and safety concerns and enhanced features compared with traditional lock systems also drive the growth of this market.” Until recently, the growth in this market has been created by homeowner purchases, and for obvious reasons. When you’re a homeowner you can update your home however you want. Want to swap out your locks, lighting, thermostats, or add an entire home automation suite of devices? Go for it. Altering the functionality and aesthetics of your home exterior and interior is entirely your call. But when you’re renting a property that someone else owns, an entirely different set of rules applies. When apartment dwellers make any physical alterations to their unit, they may be in danger of violating their lease agreement, upsetting their landlord, and ultimately losing their security deposit. Utilising smart lock conversion kits There are flexible and affordable DIY products that let you add smart technology to your rented home while still playing within the rental rules Fortunately, today there are flexible and affordable DIY products that let you add smart technology to your rented home while still playing within the rental rules. Smart lock conversion kits can replace the interior half of an existing lock without changing the exterior. In so doing, they quickly transform these mechanical locks into smart locks. And, just as with all smart locks, they can do it without requiring any screwing into walls or wiring. Other products can maintain the style of the existing front door hardware and allow the renter to preserve the exterior and match to an existing handle set. This is certain to please landlords and renters who want to maintain a consistent look. According to a “Smart Lock Audience Segmentation Study” produced by Kwikset, “The ability to work with an existing deadbolt ranks with renters as the number one attribute desired for the smart lock” (tied with auto-locking at 61%). These conversion kits address this desire while providing apartment dwellers and other renters with all the benefits of smart locks previously enjoyed solely by homeowners. Renters can control their electronic locks by using a web-enabled device, meaning they can use their smartphone to lock and unlock their home Remote access for lock administrators Renters can now access the greater access control of smart locks. With a partner home automation hub, renters can control their electronic locks by using a web-enabled device, meaning they can use their smartphone to lock and unlock their home from any location, inside the home or from miles away. According to that same study, locking and unlocking the smart lock while away from home was important to 43% of renter respondents. The smart lock can become the most convenient place for users to control their entire home automation system In combination with any one of dozens of home automation hubs, converted smart locks can also become a connected part of a complete home automation system, including lighting, heating, A/V, and more. They can even bring control of an apartment’s home automation system directly to the front door. And when a home control or security device is located at the front door, it can very easily become part of a renter’s routine. The smart lock can become the most convenient place for users to control their entire home automation system. Modernising physical key security Another huge plus that renters can enjoy with smart locks is that they can put away their apartment key. Not only can they now use their smart phone to enter their home, but they can also remotely unlock the door for any vendor or anyone else that they want to allow access to their home. Information is power, and apartment dwellers can become much more powerful with smart locks. Renters can now have access to an information audit trail of whether a door has been locked and unlocked, and when this took place.Information is power, and apartment dwellers can become much more powerful with smart locks They can receive notification via text message of when their teen arrived home safely, or when the plumbers came and when they left.With these new smart lock conversion kits, bringing smart lock technology along to a new dwelling. Of course, renters don’t necessarily stay in their apartment forever. But that doesn’t mean they have to give up the benefits of their smart security system. Who said you can’t take it with you? With these new smart lock conversion kits, bringing smart lock technology along to a new dwelling may be the easiest, most stress-free thing about the move. Smart lock benefits for landlords The benefits of smart locks and smart lock conversion kits are not limited to renters. People who own rental properties can also reap the benefits of the newest connected lock products. First, rental property owners can discover the joy of maintaining complete access control without managing dozens of keys. Fear of losing keys and having to constantly swap out hardware can become a thing of the past. Not only can renters now use their smart phone to enter their home, but they can also remotely unlock the door for anyone else that they want to allow access to their home With remote locking and unlocking controlled through a smartphone, tablet or internet-connected device, property owners no longer have to take the time to come to the property to physically hand off a key. Nor do they have to put a key in a storage locker, hide a key in a shrub (or use one of those fake key-hiding rocks). Frequent resident turnover?Rental property owners can still enter their property by using their own smart phone, or via the old fashioned way with a master key even with smart locks Owners don’t have to constantly be making new keys. Need to facilitate a repair? Neither the owner nor the resident need to be at home to let the repair person inside. Tradition meets modernisation with smart locks Of course, having complete access control does not mean foregoing access to their property. Rental property owners can still enter their property by using their own smart phone, or via the old fashioned way with a master key. Perhaps even more important than the convenience is the peace of mind enjoyed by rental property owners, which comes from always knowing who is coming and going to and from their property, and when. Airbnb co-founder, Nathan Blecharczyk, agrees. He told Lifehacker.com, “Whether it’s my Airbnb guest, house cleaner, or someone else, electronic locks make it easy to manage access to my house while I’m away at the office or traveling.” The information provided by the smart lock to their phones and tablets lets them monitor lock usage and lock status. No matter how far from their property they may be, owners will have an information trail of all the activity that revolves around their door lock. Protecting holiday homes These home automation devices can even allow rental property owners to charge a bit more for rent The vacation rental market can be highly competitive, especially in the most desirable vacation destinations. Smart locks, and other connected devices, can also give rental property owners a competitive advantage over other properties in the area. Offering potential guests the security and convenience of smart locks, smart thermostats, doorbell cameras, and connected lighting can be the difference maker in closing that rental deal. These home automation devices can even allow rental property owners to charge a bit more for rent. Whether you’re managing a vacation rental from afar, or actually using or living in a rental, the benefits of smart locks have never been easier to access. And with new smart lock conversion kits, this technology has never been easier and faster to install. What this means to smart lock dealers and integrators is that there’s a whole new market for home automation and connected security products, and a market of renters and rental property owners ready to make their rental units and their lives significantly “smarter.”
Throughout the UK there are many examples of smart city transformation, with key industries including transport, energy, water and waste becoming increasingly ‘smart’. A smart city is a one that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and resident welfare. Smart access is an important step forward in providing technologically advanced security management and access solutions to support the ambitions of smart cities and their respectively smart industries. Explaining smart access If we used the standard definition of smart, it would be to use technology to monitor, control and manage access, but the technology must be adapted to both the physical and management characteristics of smart cities. Smart access is an important step forward in providing advanced security management and access solutions to support the ambitions of smart cities For example, it would not make sense to install an iris biometric sensor at an isolated water storage tank, which is out in the open and may not even have electrical power. Nor would a permissions management system work, one that does not let you update permissions simply and easily and cannot be customised. With high volumes of people entering and exiting different areas of the city, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by business owners or managers for audits, improvements or compliance. When initiating a new access control system it is important that the supplier and customer work together to understand: Who can enter a secure area Where in the building each individual has access to When an individual can enter a secure area How an individual will gain access to a secure area This information can be crucial in the event of a security breach, enabling investigators to find out who was the last known key holder in the building and what their movements were whilst there. Installing an electronic lock does not require electrical power or batteries, much less a connection to send information Modernising locks and keys Installing an electronic lock does not require electrical power or batteries, much less a connection to send information, which means that it can be installed on any door as you would a mechanical lock without maintenance requirements. Permissions are stored within an intelligent key. If you have authorisation for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by the key will be recorded. You can update permissions from a computer or using an app on a mobile phone at the time of access, which will update the key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with company access policy and removes travel and fixed authoriser costs. This then delivers increased flexibility and higher levels of security. Remote access control utilities Access rights can be set at any time and on any day, and if required can allow access on just one specific occasion Using an app improves access control by updating access rights in real time with the Bluetooth key. It also provides notification of lost keys, joint management of access schedules, protection of isolated workers and much more. Combined with new technological solutions, an app allows contextual information to be sent, such as on-site presence, duration of an operation, authorisations and reporting of anomalies. Access rights can be set at any time and on any day, and if required can allow access on just one specific occasion, for example to repair a failure. Access can be restricted to enable entry only during working hours, for example. Permissions can be granted for the amount of time required, which means that if permission is requested to access a site using a mobile app, the company should be able to access it, for example, in the next five minutes. Once this time has passed, the permission expires and, if a key is lost or it is stolen, they will not be able to access the site. The rules for granting permissions are infinite and easily customisable, and the system is very efficient when they are applied; as a result, the system is flexible and adapted to suit company processes and infrastructures. Using an app improves access control by updating access rights in real time with the Bluetooth key Finding applications to create solutions In many cases, companies themselves find new applications for the solution, such as the need to obtain access using two different keys simultaneously to prevent a lone worker from accessing a dangerous area. The software that manages access makes it smart. It can be used from a web-based access manager or through personalised software that is integrated within a company's existing software solution, to automatically include information, such as the employee's contractual status, occupational risk prevention and the existence of work orders. In some companies, the access management system will help to further improve service levels by integrating it with the customer information system, allowing to link it for instance with alarms managers, intrusion managers or HR processes. With over one million access points currently secured worldwide, this simple and flexible solution will play a strategic role in the future of security.
The role of IT in physical access controlDownload
Powerful video surveillance protects Red Bull RacingDownload
Making your surveillance cyber secureDownload
- Louisa County Public Schools uses Vicon security solutions to prepare for emergency situations
- Genetec and Appriss Retail integration enables instant video correlation with suspicious transactions to detect theft and fraud
- 360 Vision upgrades London Borough’s camera system with Invictus to ensure public safety at a major event
- Matrix develops centralised time-attendance solution for Varsity Management across India