Electronic Door Locks & Locking Devices (1,273)
Secu365 is built specifically for small and medium business owners, simplifying security interactions for property managers, tenants, employees and visitors. Regardless of what type of service you provide, if you have a brick-and-mortar business, a well-rounded and easy-to-use security system is not just important—it's essential. Just take a look at a few of the benefits that you might be concerned about and get from the business security system Monitor customers and employees with video surveillance in case of any accidents that happen Help prevent theft, vandalism, and other crimes With a mobile device, remotely control your business from anywhere Furthermore, as businesses continue to maintain a mostly remote workforce, the drive towards adopting cloud-based and hybrid solutions has grown as well.Thus, with 24/7 video monitoring, indoor and outdoor cameras, integrated with biometric or mobile access—Secu365 system is the perfect way to protect your small business. It enables visual multi-validation of alarm events and real-time remote control.
HID® Signo™ Readers bring today’s organizations into the future of access control. Beyond its sleek, modern design, this cutting-edge reader platform provides flexible, reliable performance with support for an unmatched range of credential technologies. HID Signo extends the leadership position of HID Global in the access control industry while providing unrivaled security and powerful performance with the addition of new features to better fortify facilities and beyond. Upgrading your access control readers to HID Signo ensures convenience and security today while preparing you for whatever comes tomorrow—this is the signature promise of Signo. Key Features Highly Versatile - Support for the widest range of credential technologies, including HID Mobile Access via native Bluetooth and Near Field Communication (NFC) capability. Also features Apple’s Enhanced Contactless Polling (ECP) to support credentials in the Apple Wallet. Unparalleled Performance - Ultra secure storage of cryptographic keys on certified secure element hardware, plus a new surface detection feature that allows the reader to automatically recalibrate and optimize read range performance. Connected to the Future - All readers include out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bidirectional communication. Each reader is also designed to be connected and managed remotely without “sneakernet” or the need to be physically touched.
CrossChex Mobile is the mobile version of CrossChex Software, which lets you add and manage everyone and grant access rights to them on a smartphone. Your staff can easily clock in and access to any places with just one click on the phone. Any of Anviz access control devices with Bluetooth function can be added to CrossChex Mobile, and the time attendance device with Bluetooth function can be also added to CrossChex mobile to have a clock in function and realize the access control function with linked to a Bluetooth micro access controller. CrossChex Mobile is suitable for the application in small offices, retail stores, gyms, clinics, etc.
Consisting of a fully functional hardware and firmware solution accompanied by an API integration package, HID Aero™ Controllers are ideal for access control providers who want to build solutions for small- to medium-size customers but do not want to incur the ongoing costs of designing, manufacturing, and maintaining panel hardware. The HID Aero controller product line is the successor to HID VertX® controllers. Key benefits of HID Aero include: Flexible—A future-proof platform that can protect end-user investment by its ability to adapt and grow to meet future needs. With its IP network base, HID Aero Controllers can connect to the internet or cloud-based systems for updates and offer interoperability with security systems. HID Aero also introduces powerful remote management capabilities for HID readers, enabling the simultaneous update of credential compatibilities for all HID Readers attached to an individual intelligent controller, at the touch of a button. Secure—Protect against costly exploits, vulnerabilities, and downtime with end-to-end security from credential to host, reducing attack vectors for system-level protection. HID Aero safeguards the entire security chain an identity travels along during the authentication process with TLS running in a FIPS 140-2 approved operating environment, OSDP secure channel and AES-256 encrypted communication. Trusted—Based on trusted HID Mercury™ technology to leverage the knowledge and expertise gained from 4+ million panels installed globally. HID Aero is also backwards compatible with VertX IO modules to protect current investments with HID Global. Future Proof and Highly Adaptable - HID Aero Controllers are built with openness and flexibility at their core. This open approach gives users unmatched freedom to choose from a wide range of HID-approved system manufacturers, as HID Aero is supported by a trusted network of software providers. This ecosystem reduces total cost of ownership by enabling users to migrate their existing systems over the entire deployment lifecycle. To enable our ecosystem of partners, HID Aero comes with a powerful API toolkit and full access to the developer environment. Beyond the freedom of choice, HID Aero is a future-proof controller platform that can adapt to the growing needs of small and medium-size organizations. Because HID Aero is IP-based, the controllers can connect to on-premise or cloud-based systems to perform access control configuration, command and control, and monitor system status. This also enables interoperability with parallel security systems. Furthermore, HID Aero Controllers run on Linux, an open source and standardized operating system that allows for quicker patch management as compared to proprietary systems. OSDP Verified - HID Aero controllers are SIA OSDP verified and provide interoperable solutions for open architecture access control applications. This further demonstrates that HID Physical Access Control Solutions comply to the Open Supervised Device Protocol (OSDP) standard, which reassures specifiers that they offer the intended interoperability and security.
Hikvision has announced the launch of its HikCentral Access Control software, which is designed for professional access control and time attendance management in an easier and more efficient way. This simplifies security and operations for small and medium businesses, who can integrate the system with their Hikvision access control and intercom products quickly and easily. With HikCentral Access Control, business customers can experience a wide range of benefits: Maximized security with advanced access control features and real-time alarmsThe HikCentral Access Control software supports a wide range of employee ID credentials, including fingerprints, cards, facial recognition, QR codes and PIN codes, to ensure flexibility and security for employee access authentication. What’s more, it also includes advanced access security features such as multi-door interlocking, anti-passback, and multi-factor authentication, providing high levels of protection for sensitive areas. Alarms are also triggered in real time when rules are breached, accelerating responses, and minimizing potential losses, damage, and other negative impacts. Minimized deployment complexity and costs for Access Control and Time Attendance ManagementThe new software requires limited hardware processing power. Customers with minimum hardware requirements of i3-CPU and 4 GB RAM can get the software up and running in minutes. Simplified setup process and management at ease With HikCentral software, customers can set rules for access permissions and work shifts quickly and easily. Instructions for doing this are available on the sidebar menu in the portal interface, reducing skills requirements and speeding up the process. When in use, operators can manage the software remotely with a mobile app at any time, from anywhere. Optimized HR reporting for data-driven decision making The HikCentral software provides detailed attendance reports to support better HR management. These can be exported easily into Excel, CSV or PDF formats, or integrated with third-party payroll systems to streamline HR administration. Intuitive user interfaceThe software offers a dynamic view of multiple sites of a building and access control device status based on an interactive E-Map. This allows effective responses to event alarms and device anomalies in a timely manner. The new HikCentral Access Control software is provided free of charge to Hikvision customers with up to 4 access doors, and up to 50 employees for clocking in and out. It can also be scaled quickly and flexibly for larger sites and workforces. Where necessary, it can also be upgraded to HikCentral Professional, which provides integrated management of video security, access control, and alarm systems, for end-to-end protection of people and assets.
The new HES ES100 Aperio® Wireless Integrated Electric Strike and Card Reader makes access control simple and affordable without having to run wire to every door. Why Wireless? Time: install is quicker than traditional strikes since you don't have to run any wire to the opening. Cost: labor and material costs can really add up. Get the job done faster and with fewer man hours. Ease: running wire to an opening can be difficult...and sometimes impossible, depending on the application. Having a consistent and repeatable solution saves time and money. Why the HES ES100? It’s the most versatile way to retrofit an opening with real-time online access control. Electric Strike Features Works with all brands of cylindrical and mortise locks Field Configurable Monitoring Options Integrated horizontal frame adjustment and shim Modular field replaceable locking mechanism Card Reader Features Emergency override micro-USB for backup power HID multiCLASS SE, HID Mobile Access, NFC & BLE Designed to meet IP65 for harsh environments Powered by 2x AA lithium batterhiesAdd to Compare
Vanderbilt recently launched the latest updates to VCredential, their cloud-based credential management platform that offers users the ability to create and manage Bluetooth credentials independent of the access control platform. What is VCredential? VCredential represents Bluetooth access control technology that is easy to use, simple to navigate, and offers the added benefit of mobility for users. Originally launched in September 2020, VCredential was developed in response to the growing trend of virtualization, a shift in the market to touchless door access, and the ever-evolving landscape of added security threats. Now, 10 months on from that first release, VCredential has been developed further. The key feature of this new release is the simplification of the authorization process that allows customers to use a Bluetooth credential. What’s New? VCredential was proving such an intriguing option for customers that this latest release now means that the process of creating and managing Bluetooth credentials is even faster. The process has been reduced to a simple two-step program now. Admin sends out an email invitation to the user. This email contains instructions for the user on downloading the VI Mobile ID app alongside a 6-digit alphanumeric activation code. The end-user downloads the VI Mobile ID Bluetooth app enters the activation code. The credential is now ready for use. It is as simple as that. Why Use VCredential? All the original benefits of VCredential still remain. Smartphone credentials are time and cost-effective alternatives to managing physical credentials that enable mobile phones to be used just like a traditional access control card or tag. The addition of mobile credential functionality is critical in today’s threat landscape as more users demand touch-free flexibility and a streamlined approach to visitor management and access control. VCredential is a one-off license purchase as opposed to a subscription-based model that would include annual charges per virtual credential. With this latest version, now credentials on lost, stolen, or old phones can be deactivated and transferred over to a customer’s new device meaning there are truly no hidden or extra costs, allowing for big savings in the long-term. Greater Control Moreover, thanks to additional integration functions, the creation, and management of Bluetooth credentials can now be carried out directly by the administrator within ACTpro and SiPass integrated systems for easier management and greater control. Meanwhile, the integration with the award-winning ACTpro reduces the workload on the operator by automating the issuing of Bluetooth credentials to cardholders from within the ACTpro software. It also enables the customer to manage credential allocation through this single interface.
Highly secure – Like all Seos credentials, Seos Essential is Secure Identity Object® (SIO)-enabled, which allows for multi-layered security beyond card technology and the protection of identity data from unauthorized access Simplified, cost-effective migration – Support for read/write identification is provided using 125 kHz contactless technology to enable migration from legacy 125 kHz credential technologies Convenient – Fully supported by HID Signo, iCLASS SE®, multiCLASS® SE, HID Prox and Indala reader platforms Heightened privacy protection – Seos Essential offers best-in-class data and privacy protection by incorporating mutual authentication and secure messaging mechanisms into stringent best practices for data protection
Remote access control from anywhere Built on a cybersecure web platform, the Software House C•CURE 9000 Web-Base client lets you manage personnel and monitor alarms from anywhere in the world on any PC with an internet browser. With an adaptive interface, you get the information that you need when you need it. The C•CURE 9000 Web-Base client allows you to easily perform tasks such as configuring, editing, and viewing personnel records and user credentials, and assigning clearances and roles. Alarm monitoring is also made easy with color-coded bubble images for a visually dynamic user experience. Along with the Event Viewer, manual actions and intrusion zones have been designed to handle core alarm management functions for critical infrastructure projects. Balancing security responsibilities Customize what employees can view based on their roles within an organization using Web Views. This allows you to streamline productivity and balance both responsibility and workload. Corporate security administrators can delegate control to individual department managers allowing them to grant access in the physical areas for which they are responsible. Customization for enhanced user experience With the C•CURE 9000 web-based client, you can dynamically change the appearance of personnel screens, customizing the user interface to show different tabs, columns, and fields based on a user’s role within the organization. Simply drag and drop from a list of more than 100 fields to show only the fields you need to see, streamlining and enhancing the user experience. A responsive layout automatically adjusts and adapts to device screen size and orientation.
Anviz CrossChex is a personnel identity verification, access control and time attendance management system. The system facilitates management of personnel information by biometric technology and helps meet customer's time attendance and access control requirements. CrossChex Cloud is a cloud-based time attendance software and can be used to access data anywhere, anytime, from any browser. You can schedule attendance requirements for a specific employee and create shifts for their work period within one click. During this global pandemic, CrossChex Cloud can work with Anviz biometric time clocks to enable users to check whether their employees are wearing a mask or not, and get timely reports on - employee attendance record, entrance record, and temperature record.
HID Global, the worldwide leader in trusted identity solutions, has announced the most feature-rich implementation of the latest MIFARE DESFire EV3 credential. This new access control credential based on NXP MIFARE DESFire EV3 delivers this technology’s full range of advanced security and privacy capabilities and reinforces them with HID’s powerful model for identity data protection. This HID credential provides AES128 encryption, a secure channel for protecting card data from man-in-the-middle attacks, and a random unique identifier (UID) for protecting user privacy. The credential works with readers based on MIFARE DESFire EV1 and EV2 products and is interoperable with HID® Signo™, iCLASS SE®, and multiCLASS SE® readers. In addition to choosing standard or custom security profiles to meet their specific needs, users can take advantage of HID’s Secure Identity Object™ (SIO®) model that protects a credential’s identity data through key diversification, authentication signatures, and encryption. Users can create multi-technology cards with HID’s credential based on NXP MIFARE DESFire EV3 to provide a smooth migration path from vulnerable legacy, low-frequency 125 kHz-based systems to modern and secure credential technology. What are the benefits of HID Global’s MIFARE DESFire EV3 credential solution? Feature-rich security that offers profile choices to fit your needs Advanced security features that aren’t available elsewhere, such as modern encryption, mutual authentication and secure messaging and SIOs Key management and card formatting that adhere to the highest standards of data protection and governance Click here for more information.
Symmetry Mobile is a web credential application designed to be used with AMAG Technology’s Symmetry Bluetooth readers. Symmetry Mobile is a convenient solution for organizations using mobile devices or in conjunction with physical credentials for users who are transitioning to a mobile system to gain access to secured doors. It works with AMAG’s Symmetry Access Control system, as well as other access control systems, providing a seamless, efficient and cost-effective solution for enterprise users deploying more than one system. The touchless solution supports multi-factor authentication when used with a PIN or biometric (fingerprint or facial recognition) on both Android and Apple iOS devices. Users can type their PIN or use a biometric on their phone, eliminating the need to touch the reader and in support of COVID-19 guidelines. The frictionless setup of a credential eliminates the need to physically interact with the security team. Organizations can centrally issue and manage mobile credentials, photos and devices to their entire user base from a remote location, eliminating the need to buy and carry a physical credential and come into the badge office. The virtual credential in Symmetry Mobile displays a person’s name and photo. An unlimited number of credentials can be stored within their digital wallet, allowing people who need to access multiple sites using different access control systems to use the same mobile device. In an effort to support businesses that required employees to be on-site and ensure the health and safety of the labor force, AMAG developed a customizable health screening questionnaire to help reduce the risk of potentially infected employees from entering a building. Upon successful completion of the questionnaire, an employee’s physical access card or mobile credential will be enabled for a specified period of time, for example, one day. If the form is not completed successfully, the access card will expire and the employee will be denied access to the building. The system will send email notifications to managers for visibility. The questionnaire’s functionality operates independently and can be used on virtually any existing Symmetry Access Control system installation — and without any local infrastructure changes. Symmetry Mobile data is highly secure, as all of the data is encrypted when sent to the reader or stored on the phone, ensuring the mobile solution is completely secure. Users can customize the signal strength and read range on a per device and/or per person basis, increasing security and accommodating those who may need a longer read range, such as a person in a wheelchair, to open a door. Door read and unlock time is less than 1.2 seconds. Symmetry Mobile is available as a hosted or on-premise solution. The app is available in English, Spanish, French and Arabic, and is available now in the Apple App Store and Google Play Store.
Incedo™ Business Cloud access management from ASSA ABLOY Opening Solutions is created for businesses on the move, who need a flexible security solution which grows with them. Now, security managers managing an Incedo Business solution can work remotely too – while maintaining complete control over their building’s access points. Incedo connects security software and hardware within a single, seamless platform. To accommodate the restless change and disruption of modern business life, Incedo enables scaling up or down on demand. And now, the new Incedo Business Cloud management keeps security and facility managers in control of their premises from wherever they happen to be right now. Incedo Business Cloud solves many pressing daily challenges of access management, Managers no longer need to be on-site to handle day-to-day security. It operates securely 24/7 from any PC with an internet connection. Installing the system is easy, with no complex integrations needed. Software updates are regular and automatic, with real-time reports and analytics available with a few clicks.
With the SMARTair® Openow™ app, security managers enjoy Update-on-Card functionality and a touchless credential handling process. Openow brings online benefits to existing offline devices in a SMARTair access control system, so management tasks are completed more efficiently. Powerful features usually only available in online mode are now enabled for SMARTair offline locks — without any need to fit dedicated wall updaters or communications HUBs. This means no cabling at all; and faster, less invasive installation. Now, every time a user opens a SMARTair door with Openow, the event and entire door history are reported in the SMARTair software, alerting security managers about low battery status, access denied, out of time zone and more. Openow is the convenient mobile solution for SMARTair wireless access control systems. Users store validated digital keys securely in their own Openow app. To open a SMARTair lock, they simply tap their phone against its inbuilt BLE reader. An encrypted Bluetooth connection connects the phone and locking device to quickly approve or deny a unlock request. With Openow, if you have your phone, you are already carrying your keys. Facility managers get through their access management workload faster when they replace traditional card and tag credentials with Openow. Because Openow and the intuitive SMARTair TS1000 software handle everything, virtual keys may be securely deployed over-the-air to anywhere in the world and security managers can easily and quickly update access plans. Delays in issuing or revoking keys for sensitive doors no longer jeopardize site security or business efficiency. There are no physical credentials to handle or track; no card encoders to buy; and no queues at reception for staff or visitors awaiting credentials being issued. The entire credential handling process — for both building users and security managers — is touchless.
With resistance to attack and extreme weather, wire-free installation and battery-powered operation, the new SMARTair i-gate Electronic Padlock is built for use almost anywhere. This new device in the SMARTair wireless access control range enables facility managers to add real-time control to non-electrified gates, cupboards, cabinets, closets, crates and more — wherever they are and whatever the climate. Security and access needs do not stop at the perimeter door. Yet finding reliable locking devices which are easy to operate with an electronic access system can be difficult. Gates and outbuildings are hard to reach with cabling. Access devices may not have the resilience required for operation outdoors. The i-gate meets all these challenges. The SMARTair i-gate padlock is robust enough for almost any climate. It has a watertight cover (IP68 rating) and an internal cylinder with Durability EN 15684 Class 6 Certification. It is battery powered and works with all standard proximity credential technologies, including MIFARE®, DESFire and iCLASS®, as well as Bluetooth Low Energy. Upgrading an existing padlocked closure involves simply swapping the devices and integrating the i-gate Padlock into an existing or new SMARTair wireless access control system. No drilling or wiring is required. Exterior and interior openings previously unsuited to electronic access control can now be controlled and monitored from the SMARTair TS1000 or Web Manager. An i-gate is compatible with any SMARTair system management option, including mobile management via the Openowä app.Add to Compare
The Aperio® Lock L100 features optimum physical protection and transmits comprehensive information on door status to the access control system via a wireless connection. Managing access authorisations online The lock allows you to easily integrate security doors into an access control system at a very reasonable price. It enables you to manage access authorisations online and in real time using a single system. Users can instantly obtain "open/closed" and "locked: yes/no" status information from the lock at a glance. The optimum burglary protection and resistance against extreme temperatures (down to -65 °C) ensure that the Aperio® lock is also suitable for outside doors with special security requirements. The lock features a protection rating of IP55. Unique wireless access solution Irrespective of the access control system type, Aperio® enables access control doors to be integrated using a wireless solution without any cabling and without any alterations to the door during installation, all at a considerably lower price than a wired high-end solution. The Aperio® Lock L100 offers a unique, easy way to integrate both outside and inside doors with high security requirements into access control systems. Users can continue to use existing cards or PIN codes to open and lock the new Aperio® doors while mechanical keys cease to be necessary.The Aperio® Lock L100 complies with EN 179 and EN 1125 requirements and bears a CE mark. It is available for fire doors and for different door profiles (Euro, Scandinavian, and Finnish). Visit www.assaabloy.co.uk/aperiowirelesslocks for more information.Add to Compare
In a live demo, available on YouTube (http://youtu.be/Ta8J6vW9Zy4), a technician completes the whole installation process in 1 minute, 58 seconds. Aperio® is a quick and simple way to bring any internal door into an access control system. The Aperio® cylinder is available for rubber and metal knobs, and for many door profiles: Euro, Scandinavian, Finnish, and Swiss. It supports all leading RFID technologies, including MIFARE™, DESFire™, iCLASS® by HID and 125 kHz. As well as being quick to install, the Aperio® cylinder is also cost-effective to run, using standard batteries rather than the expensive, always-on mains connection demanded by wired access doors. About Aperio®: Available on the global market place, ASSA ABLOY’s Aperio® Technology enables a wide range of access control providers to cost-effectively integrate non-wired doors with mechanical locks into access control systems.Add to Compare
Whether in business or multi-residential buildings, ASSA ABLOY´s architectural solution for glass is installed all over the world. Modern glass meeting rooms and office doors can now be equipped with wireless access control devices while maintaining aesthetics. ASSA ABLOY’s Aperio® Technology allows access control providers around the globe to integrate non-wired doors with mechanical locks into access control systems in a cost effective way. Architectural glass solutions with Aperio® escutcheons Highlights at a glance Stainless steel glass door plate is easy to install Suitable for every glass door profile Perfect match for stainless steel surfaces Available for Aperio Euro profile escutcheons (with cylinder cut-out or blind) ASSA ABLOY offers a variety of locksets you can combine with wireless Aperio® cylinders. Visit: www.glass-catalogue.com or www.assaabloy.co.uk/aperio.Add to Compare
Whether you want to invest in a new wireless access control system or upgrade your existing doors, Aperio® is the intelligent answer to 21st Century building control. Aperio® wireless locks can be developed efficiently in any size of business, helping you to take control with a system that is quick and easy to install and delivers significant cost and energy savings. So, what’s the 21st-century solution? Upgrade your doors to Aperio® to… Solve the lost key problem by using secure RFID cards instead of keys Save time and money with keyless access control Connect more doors to your EAC system Get more control with audit trails Add access controlled doors without cabling Save energy with battery powered locks Aperio® is manufacturer-independent – over 100 access control providers offer wireless door upgrades with Aperio®. It´s so easy to upgrade a mechanical door to Aperio® – wireless and without disruption Step 1 Contact your access control provider to plan the upgrade. Don’t forget, Aperio® can be installed door- by-door and is suitable for interior or exterior, medium to higher security doors. Step 2 Install battery-powered devices with minimal disruption at the doors - no wiring is needed. Step 3 Save running costs. In comparison to wired access control doors, which are constantly under power, Aperio® doors only consume electricity when presenting a card. The battery life-time is approx. 40,000 cycles (2 years), and they are easy to exchange.Add to Compare
“Using the new V3 platform, remote unlocking commands pass from system to door almost instantly,” says Gareth Ellams, Aperio® Business Development Director at ASSA ABLOY EMEA. “It represents a major upgrade in Aperio® processing power and memory space, and offers improved RFID performance when compared with the current V2 platform.” The boost in performance comes without sacrificing Aperio® class-leading energy efficiency. With wireless locks running the Aperio® V3 platform, for example highly-frequented entrance doors still run for two years on a standard battery, maintaining remote opening function with a heartbeat time of typically five seconds communication time between Aperio® lock and the access control system throughout the battery life. The new V3 platform supports multiclass high frequency RFID reading in one device. In addition it is also compatible with ASSA ABLOY’s Seos™ mobile access ecosystem for issuing, delivering and revoking digital keys on smart phones. With a comprehensive lock range covering almost every door style and opening, there's no reason to delay upgrading to faster wireless access control with Aperio V3®. About Aperio®: Available on the global market place, ASSA ABLOY’s Aperio® Technology enables a wide range of access control providers to cost-effectively integrate non-wired doors with mechanical locks into access control systems.Add to Compare
Access decision is made by the Aperio™ escutcheon based on access data on card – access data are written on card via EAC system updater. It can be used with all European (DIN) mortise locks - in wooden, steel and tubular-frame doors.Add to Compare
With the new Aperio® escutcheon with PIN code, ASSA ABLOY adds another innovation to its range of products allowing Access Control Systems to be extended without wiring: The Aperio® PINpad device provides multi-level door security – and does it without the need for wiring. The new device can be used wherever doors are to be secured by multi-level authentication – physically with a card and logically by means of a password. The wireless Aperio® PINpad escutcheon allows access to rooms simply by entering a PIN, via a card reader or with a combination of both. The user code to be entered can have four to eight characters. Depending on the integration in the Access Control System, the escutcheon supports the integrated Duress Code function to provide increased security. Depending on the integration level of the device, a silent hold-up alarm can be triggered in the security centre if, in a dangerous situation, the user enters the attack code instead of his own PIN. The Aperio® PINpad escutcheon is available for conventional RFID technologies: iCLASS, MIFARE classic/plus and MIFARE DESFire as well as for existing 125 kHz access control systems based on HID PROX or EM410x. About Aperio®: Aperio® from ASSA ABLOY is manufacturer-independent and closes the gap between wired access control doors and wireless doors with mechanical security technology.Add to Compare
ASSA ABLOY’s Aperio® Technology enables the cost-effective integration of doors with mechanical locks into both new and existing access control systems. Thanks to its innovative wireless technology, integrating doors into an access control system will no longer require extensive wiring or structural alterations in the future. Doors will merely need to be equipped with electronic Aperio® locks with RFID readers and linked to the online access control system via a communications hub. The manufacturer independent architecture of Aperio® provides a convenient way of connecting with most access control systems via RS485, Wiegand, or IP interface. The Aperio® cylinders, escutcheons or locks communicate via an encrypted wireless link to a communication hub that is wired directly to the system. Highlights at a glance Additional doors can be integrated into access control systems at a low cost Update of access authorisations online and in real time Battery powered cylinders, escutcheons and locks with RFID reader functionality Easy to install with no structural alterations or wiring to the door No need to replace the existing RFID cards or transponders as these can also be used for wireless Aperio® doors. Standard RFID technologies are supported (iCLASS®, MIFARE™ Classic and DESFire™, HID PROX/EM410) Open standard, meaning Aperio® can be combined with all access control systems More than 100 global leading access control OEM’s already support Aperio®Add to Compare
Trying to imagine what a particular design of handle set will look like on a door is not always an easy task. Different finishes and different door materials can make it hard to visualise exactly what the actual combination will look like in a building. To address this SALTO Systems have developed a useful app that uses augmented reality to accurately display how their new XS4 Mini electronic lock will look in a variety of combinations via a tablet or smart phone. The app contains information about XS4 Mini, a gallery of images, tech specs and a door configurator where you point the camera of your tablet or smart phone at the cover of the XS4 mini catalogue to see a 360° view of how XS4 Mini will look on that door with a choice of handle styles. SALTO is the first access control company to develop and use this technology to present their products, enabling potential XS4 Mini users to view exactly how it will look on their own doors. It is part of a comprehensive range of ‘go to market tools’ developed for our new generation of XS4 2.0 re-volution products including a dedicated XS4 Mini website, new vertical market catalogues, new SALTO access control portal for our partners, new experience centre, social initiatives and much more. To use the new tool, simply download the XS4 Mini App in your preferred format (iOS or Android) to access the augmented reality application which will give you a selectable virtual preview of the XS4 Mini product range to see how the XS4 Mini will look on your door.Add to Compare
More durable, more secure and more efficient than conventional locking systems A completely electronic locking system, eCLIQ is based on the mechanical precision and microelectronic modules of ASSA ABLOY’s CLIQ® technology. Secure, reliable and uncomplicated, the powerful microelectronics in the programmable waterproof key and compact electronic locking cylinder together provide the strongest possible security. eCLIQ solves the problem of lost keys. As each key is individually programmable, access rights can easily be deleted leading to higher security. New, future-proof CLIQ® chip generation with AES encryption and rapid processing speed with efficient energy management. Cylinders are easy and quick to install, no cabling is needed. The electronic contact between keys and cylinders transmits power and data securely. Keys and cylinders can be programmed with flexible access rights and schedules. Fast, easy standard battery replacement in the key – no need for tools.Add to Compare
The programmer permits changes to times and authorisations (depending on key type) as well the read-out of audit trails. Location independent and used directly at the key carrier Permits changes to times and authorisations for user keys (E3) as well as the read-out of audit trails Receives programming changes to the user key via mobile or PC Acoustic and optical signals for operating status and activity progress Data transfer to the mobile via Bluetooth and to the PC via USB, no software installation on the mobile programmer Battery alert service Power supply from standard batteries (4 x type AAA) Mini USB connection for data exchange over cable Waterproof (protection from drips)Add to Compare
The programmer permits changes to times and authorisations (depending on key type) as well the read-out of audit trails. Used locally and centrally Communication interface for secure data transmission between CLIQ® Manager and programming key Programming of user keys (E1, E2, E3) and reading station for the audit trail memory in the user key (E2+E3) Access rights in the software (e.g. time zone, summer/ winter time) are uploaded to the user keys and programming key USB portAdd to Compare
You can work smarter and more sustainably when electronic locks and keys power your security. An electronic locking solution minimizes security risks when keys go missing. With an eCLIQ system from ASSA ABLOY, you can manage everyone’s access from anywhere, at any time — electronically, securely and wirelessly. Based on award-winning CLIQ® access control technology, the eCLIQ system is built around precise locking mechanics and high-end microelectronics. A battery inside each programmable key powers the wide range of programmable cylinders and padlocks — and secures every data transfer. An eCLIQ system is also convenient. Thanks to multiple software options, you manage users’ access rights in a way that suits you best. Authorised key-holders carry a single, battery-powered key programmed with only their cleared access permissions. Low maintenance for technical components you can trust Robust and durable, eCLIQ cylinders are available for a wide range of doors, cabinets, lifts, alarm boxes, machines and entrance gates. Looking after your eCLIQ components is easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. eCLIQ keys are durable, compact, and waterproof (IP67). They are easy to reprogram, enabling temporary and time-limited access permissions for every employee or contractor. AES encryption, rapid processing, and efficient energy management is built into the chip. When a key’s battery runs out, it is easily replaced without tools. Mechanical and encrypted electronic elements work together to make an eCLIQ installation highly resistant to both physical and electronic attack. Easy installation — simple, secure management Managing eCLIQ is straightforward. You can program keys with easy-to-use eCLIQ Manager software: choose between a local software installation or our secure web-based software which manages access rights from anywhere, in the cloud. Security managers can host the Web Manager software on their own or use ASSA ABLOY’s Software as a Service solution. Users can also update their own keys with a range of programming devices, including wall-mounted units. With eCLIQ, missing keys are quickly de-authorised, cutting risks associated with key loss or theft. At any time, facility managers can generate a full audit trail to discover who has accessed which locks. Unlike other electronic access control systems, eCLIQ uses no mains electricity. The microelectronics inside an eCLIQ lock are powered by a standard battery inside every key. Energy-efficient and sustainable, battery power also minimizes disruption when you switch to eCLIQ. Because there is no cabling around the door, you don’t need to schedule invasive, expensive electrical wiring. eCLIQ in action “eCLIQ is more durable, more secure and more efficient than conventional locking systems,” says Stephan Schulz, CLIQ® Product Manager at ASSA ABLOY EMEA. “This evolution of our award-winning CLIQ® technology is already protecting businesses and public services across Europe. A range of sectors and building types — from banks and hospitals to shops and warehouses — have learned eCLIQ provides the control and flexibility their premises need.” For an access control overhaul at University Hospital Frankfurt, managers sought a secure locking system for a new building: 1,100 eCLIQ cylinders and keys provided the solution. Now, with eCLIQ installed, nurses update access rights every morning for the day ahead. This new workflow minimizes security vulnerabilities and keeps everyone safer. Retail banking combines high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs and clearances. Creval’s bank doors across Italy’s Lombardy region are now locked with more than 30 eCLIQ cylinders, putting managers in total control of entrance security. In the unlikely event a key is misplaced, Creval administrators simply delete it from the system. In Germany, eCLIQ locks AMPELMANN GmbH branches and their 2,200 m2 logistics centre, meeting the needs of their decentralized branch organization. Its 8 Berlin branches are staffed by several permanent employees. External service providers like cleaners need access. eCLIQ provides it — safely, securely and without major key-management workload. Learn more at: https://campaigns.assaabloyopeningsolutions.eu/ecliqAdd to Compare
The Corbin Russwin Access 700® PIP1 intelligent Power over Ethernet (PoE) lockset offers online access control, using magstripe, PIN code, and HID® iCLASS® technologies for customized access to campus facilities. Using the facility’s Ethernet network, the Access 700 PIP1 provides full online access control with standard network cabling. Combined with approved third party software, the Access 700 PIP1 locks integrate seamlessly into transactional and housing systems, providing comprehensive, reliable access control for the campus environment.Add to Compare
Browse Electronic Door Locks & Locking Devices
- Solenoid Bolts
Electronic locking device products updated recently
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head teachers are considering taking learning and large gatherings, such as assemblies outdoors, when possible. Managing ‘class bubbles’, hygiene and ventilation While Dr. Yvonne Doyle, the Medical Director of Public Health England (PHE) has publicly reassured parents that schools are not the ‘drivers’ or ‘hubs’ of COVID-19-19 infection in communities, there is a lot of pressure on school leaders to manage ‘class bubbles’, extra cleaning and hygiene, ventilation, and COVID-19 testing, to protect families and staff. It’s a logical step to switch, in certain circumstances, to outdoor activities where fresh air is on tap, and social distancing is far easier to manage. Specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms, which had been growing in popularity, even before the pandemic. These facilities offer numerous benefits as an extension of existing learning spaces and provide children the opportunity for hands-on learning, beyond a stuffy classroom. However, if outdoor spaces are routinely called upon as part of COVID-19 contingency planning, how can schools ensure that their outdoor classrooms and wider areas are secure, robust, and fit for purpose? When specifying outdoor classrooms and learning spaces, it’s essential to take into account the well-being of the students and staff, who will use them, noise pollution and acoustics. Most importantly, education managers need to ensure the surrounding area is secured and adequately protected from threats, including terrorism. Perimeter security measures for schools How can schools and nurseries secure their perimeters, so that outdoor learning is totally safe for all? A starting point is to seek out architects and suppliers, who have a good understanding of security standards. Worryingly, Jacksons Fencing’s research recently found that only one-third of architects are seeing both LPS 1175 and the UK police initiative, Secured by Design (SBD) physical security standards, specified for schools. This highlights a lost opportunity for architects to propose solutions that are appropriate to the level of risk and needs of the school, without turning the site into an unwelcoming fortress. Helping schools identify specific security needs Head teachers would be wise to work with architects, who not only know the latest security standards inside and out, but are also are willing to play a more advisory role, helping the school identify exactly what is needed. Head teachers should prioritise solutions appropriate to their site’s specific risks It’s also vital that architects don’t simply replace existing fencing and gates, with the same security systems that have been in place for years. Instead, they will need to meet changing needs and risks. Our research finds that teachers often report issues, with the school perimeter and gates, from being climbed over (28%) and causing injury, to gates not locking properly (10%). Head teachers should prioritise solutions appropriate to their site’s specific risks, which sometimes require altering of existing measures. School fencing is an important aspect of any education site. As well as defining its boundary and making a visual distinction between public and private property, the fencing and gates that surround and secure a school, will typically meet a wide variety of other important criteria, including preventing unauthorised entry to the grounds, protecting pupils, staff, and visitors from accidents and injury, deterring theft and anti-social behaviour, and reducing the risk of malicious damage, and acts of terrorism. Welded mesh panels for perimeter fencing Popular options for schools include welded mesh panels for perimeter fencing or sports areas, and railing systems to act as demarcation, in order to control foot and car traffic. Within the outlying boundary, barriers, bollards and parking posts will keep pedestrians, and vehicles safe from each other, while timber fencing and gates can be designed to control the flow of people, around the grounds and reduce the areas, where students can be hidden from view. Automated gates and access control Perimeter fencing must be complemented with safe entrances and exits for vehicles and pedestrians. Every school has unique entry-control requirements, determined by factors, such as size, location and the local environment. These needs influence the decisions you make, when preparing technical specifications for school security gates. Do you require gates to be steel or timber, manual or automated, single or double leaf? Specialist suppliers will be in the best position to offer inputs on school gates, which typically need to offer solid security and durability, with a welcoming aesthetic. Specifying access control system When specifying a school access system, it’s important to consider the areas of the school When specifying a school access system, it’s important to consider the areas of the school, such as sports fields, car parks, and children’s play and learning areas, and whether it requires playground segregation. Selected gates should meet the design of the fencing, to create a secure perimeter with no weak points, with automated gates conforming to all current safety regulations. . Noise pollution can be a problem as well, including noise coming in or leaving the school in residential areas. If more teaching is to be carried out outside, it’s worth considering acoustic barriers to reduce noise in and around the school. Timber acoustic barriers for security and privacy Timber acoustic barriers offer security and privacy, and can reduce noise levels, by as much as 32 decibels (in laboratory conditions), so are ideal for city centre schools or those located close to busy highways. There are many ways to build an outdoor classroom. Timber products can help to create a welcoming environment, such as wooden shelters, pergolas, fencing, and decking. Always check that high quality timber, ideally guaranteed for 25 years against rot and insect attack, is being used to provide an attractive, cost-effective, safe and sustainable solution, for all weather conditions. DBS approved installers And of course, installers must be DBS approved, so that they can install outdoor classrooms, during school holidays, or within term time, with minimal disruption. The COVID-19 pandemic had a huge impact on schools and learning. While nobody wants to think of fresh outbreaks of the infection, or any other virus, installing an outdoor classroom made from high-quality, long-lasting materials is a great way to future-proof school learning and ensure safety, and preparedness. Putting extra thought and care into the security angle will provide schools with decades of protection against a host of unforeseen events.
Most consumers are enjoying the convenience brought by electronic locks. With the existence of electronic locks, people no longer need to be restricted by keys. There are a variety of unlocking methods and more convenient remote control unlocking options. Suppose, you are going on vacation, and with the presence of an electronic lock, you can easily enter your house with your babysitter, without a spare key. Of course, not only smart homes, but also some infrastructure and commercial buildings are enjoying the convenience, brought by electronic locks. Passive electronic lock access control system This article will introduce a smart electronic lock used in the infrastructure industry, named passive electronic lock access control system. In traditional manufacturing, mechanical locks are commonly used in all walks of life, to protect the safety of property and facilities. However, the mechanical lock has caused many practical problems in the long-term application. For example, the keys are duplicated randomly, the unlocking authority cannot be controlled, the user's operation records cannot be known, and the remote control is not possible. Imagine that if you are in a remote telecom base station, it happens that you have the wrong key in your hand and cannot open the front door. In such a situation, this lock, maybe the worst scenario. In some industries, with a wide scope and large working area, more attention must be paid to access control systems Therefore, in some industries, with a wide scope and large working area, more attention must be paid to access control systems. In some outdoor scenarios, such as base stations and electric power cabinets, the requirements for access control systems are quite strict. Due to the particularity of its environment, ordinary power-based access control systems will no longer be applicable. Therefore, the emergence of passive access control systems has solved these problems. Electronic locks offer intelligent management function Based on years of in-depth field research, Vanma has developed the Vanma passive electronic lock access control system, based on the current situation of the industry. This system is different from other electronic lock systems, as it integrates the advantages of both mechanical locks and electronic locks. It not only has the simplicity of mechanical locks, but also has the intelligent management function of electronic locks. The term ‘passive’ of passive electronic locks means that no power is needed. Passive electronic locks have the same appearance as ordinary mechanical locks, so they can be installed anywhere, just like common mechanical locks. They also have a variety of practical functions of electronic locks. Authorised remote access control The Vanma management software allows security managers to assign access rights to specific areas, for different technical personnel. In order to facilitate real-time access control, the electronic key can be used in conjunction with the mobile phone app, in order to send information about its access rights to the technicians, in real time. Vanma management software can provide access to all operations performed by technicians Vanma management software can provide access to all operations performed by technicians, including complete audit reports. Access attempts outside the specified time range or outside the specified area can be obtained through the report, so as to analyse any abnormal situations. Access control in extreme weather conditions In the access control system, the lock (lock cylinder) maintains an extremely high standard and its protection level is IP67, to ensure the greatest degree of protection. Infrared induction technology is used in the electronic key, even if the surface of the lock is wet, the electronic key can also transfer the access authority to the lock cylinder. Ensure stable exchange of information between the key and the lock cylinder. In other words, a poor connection cannot prevent the transmission of information between the key and the lock. At present, this kind of passive electronic lock is widely used in many fields, such as telecom, electric power, water utilities, public utilities, medical emergency and so on in Europe.
Related white papers
Protecting dormitory residents and assets
Top 5 ways to ensure visitor safety and security
Moving to mobile: A guide for businesses switching to mobile access control
Empowering cameras with AIDownload
The rise of ethical facial recognitionDownload
Connected video technology for safe citiesDownload
Webcast: Access control integration increases security while reducing costsDownload
- Aperio wireless locks help to enhance real-time, online access control at The Camp
- Abloy UK gets a 5-year contract to upgrade locking solution for UK Power Networks
- Delta provides crash rated gates to enhance security at the Los Angeles International Airport
- ASSA ABLOY explains important wireless access solutions for healthcare facilities