SALTO Electronic Door Locks & Locking Devices(47)
Trying to imagine what a particular design of handle set will look like on a door is not always an easy task. Different finishes and different door materials can make it hard to visualise exactly what the actual combination will look like in a building. To address this SALTO Systems have developed a useful app that uses augmented reality to accurately display how their new XS4 Mini electronic lock will look in a variety of combinations via a tablet or smart phone. The app contains information about XS4 Mini, a gallery of images, tech specs and a door configurator where you point the camera of your tablet or smart phone at the cover of the XS4 mini catalogue to see a 360° view of how XS4 Mini will look on that door with a choice of handle styles. SALTO is the first access control company to develop and use this technology to present their products, enabling potential XS4 Mini users to view exactly how it will look on their own doors. It is part of a comprehensive range of ‘go to market tools’ developed for our new generation of XS4 2.0 re-volution products including a dedicated XS4 Mini website, new vertical market catalogues, new SALTO access control portal for our partners, new experience centre, social initiatives and much more. To use the new tool, simply download the XS4 Mini App in your preferred format (iOS or Android) to access the augmented reality application which will give you a selectable virtual preview of the XS4 Mini product range to see how the XS4 Mini will look on your door.Add to Compare
SALTO Systems has launched additional new models to its best selling GEO (Global Electronic Opening) cylinder range. Already one of the most versatile electronic cylinders available on the market, the new models include Swiss profile cylinders, Scandinavian cylinders and cog wheel cam cylinders. These are joined by a new panic function cylinder specially designed to fit panic locks that need a fixed cam position, grips for use in DDA (Disability Discrimination Act) environments enabling anyone with a disability to be able to easily open doors fitted with GEO cylinders and finally a detachable, removable knob version. Modular, flexible and easy to fit, the IP66 rated SALTO GEO can be used in any type of door. Part of SALTO’s innovative 360° wire free locking solution, it is fully compatible with most RFID technologies meaning no more problems with master key management. So whether you want to control a standard door, glass door, aluminium door, steel door, a lift or elevator, a car park, entry to a data centre, access to a server rack, the security of a container or anything else SALTO GEO is the answer. And thanks’ to SALTO’s Data-On-Card and wireless real-time on-line technology, users can manage access credentials and add, restrict or delete access privileges on the fly. And GEO’s open architecture means it can also be used to connect to an existing security system to create a fully integrated platform, delivering increased efficiency, cost savings and complete access control flexibility.Add to Compare
The XS4 electronic lock with keypad is a brand new product that provides increased levels of security and control. For doors where extra security may be required, it offers users a choice of multiple security authentication methods to control access including proximity card, combined use of a PIN code + proximity card or a separate keypad code. Designed for use in schools, colleges, universities, student dorms, airports, government buildings, military installations and for use on any doors where an extra layer of security is required, the electronic lock with keypad is the latest addition to the innovative XS4 range. Smart, secure and innovative, it needs no hard wiring and provides a totally wire free networked electronic locking solution with a great range of features. It is also available in a wireless version for online real-time control. The lock can be operated in 3 modes, proximity card only, Pin (Personal Identification Number) code + proximity card or keypad code only. With standard proximity card mode the lock is locked at all times until opened with the users proximity card that has access rights to the room. When using PIN code + card mode each user has their own personal code. Typically this might be used in student dorms, where extra security and dual authentication (presenting both a card and typing in the PIN code) are needed. Users can have up to an 8-digit PIN Code. In keypad code only mode, the lock itself has an access code that is used for user authentication.Every user that goes through that door knows the keypad code. When two users share the same office or room, they are the only ones that know the keypad code of their room. Several calendars can be programmed every day, giving the ability to use passage mode type opening during the day, and dual authentication only at night. The KEYPAD code can be composed of up to 8 digits. Available in European, Scandinavian and ANSI wide body versions in both Mifare/DESfire and HID iClass technologies, the new XS4 electronic lock with keypad can handle up to 64,000 doors and 4,000,000 users per system and store the last 1,000 events in its audit trail memory. And in addition, it can also be fitted with a wide range of handle styles, making it the perfect choice for those doors where additional security verification is needed.Add to Compare
Developed specifically for the hotel market, Aelement allows you to integrate all your physical security needs into one stylish, energy efficient, reliable wire-free system. It enables hoteliers to control the security of their entire building, grant access privileges to individual rooms and gather audit trail data from every door - all without leaving the front desk.And thanks to SALTO's new WiDNA technology, you no longer have to choose between the on-line and off-line world. All Aelement locks are designed to be wireless ready right out of the box, users simply choose whether the functionality is activated or not.All you need to do is choose the mode of operation you want "Wireless on-line" or "Wireless ready". If you choose "Wireless on-line" your locks are on-line and communicate in real time with the server. This gives you real time control over the entire property. If you chose "Wireless ready", your locks communicate with the server daily on differed-time communication mode. Wireless ready locks can be "switched" to real time "Wireless on-line mode" at any time. Just plug in the USB-sized RF communication antenna and you are ready to go.The backbone of the system is a series of gateways and repeaters that act as antennas, collecting and sending information from the computer server directly to the wireless locks. One gateway can manage several electronic locks as well as repeaters, minimizing infrastructure costs and maximizing flexibility.It operates on a 2.4GHz wireless network over an 802.15.4 protocol and works with every popular mainstream RFID technology such as Mifare and Desfire, the latest versions of Mifare Plus and Desfire EV1, as well as with standard low cost hotel guest cards. And thanks to its automated "self healing" capabilities plus SALTO patented SVN™ network redundancy, if Aelement should lose RF connection at any time it will automatically scan for a new connection to an alternative gateway or repeater, restoring communication and maintaining security.All Aelement locks are designed to be wireless ready right out of the box, users simply choose whether the functionality is activated or notAdvanced security and convenient access management are its core values enabling simple management of guest cards and doors as well as staff cards and back of house doors in a single system. Aelement features a wide range of advanced and innovative hotel management benefits including instant room move and instant extended stay abilities as well as lost card cancellation, intrusion alarm, door ajar alarm, remote opening, real time audit trail, passage mode activation for meeting rooms and automated low battery reporting.For staff management it can provide on-line staff tracking, real time monitoring, dynamic master key functionality and instant master card cancellation. All master cards are uniquely assigned to the specific individual, and have no limitations to how a locking plan is conceived. The card does not need to belong to a group and you can also centrally authorize any card at random and list doors or zones with no need for grouping.There is also no need to issue and collect staff cards every day. Staff cards can be programmed not to work at night (outside their individual time shift) and can be centrally cancelled at will at a moments notice, and changes to the locking schedule can be made on the fly, with no need to manually re-program locks or re-issue cards.But Aelement also has more to offer. Not only is it a secure, easy to use access control system that's packed with technology, it's also a stunning piece of design too.The minimalistic design of its RFID reader looks stylish and discreet on any door. It is available in two contemporary colours, Pearl Black and Ice White, and can be combined with a wide range of designer handles, including a selection from Italian manufacturer Olivari exclusive to SALTO, to make a bold statement that will complement and enhance the interior design of any hotel.Add to Compare
Extensive range of compact sized electronic cylinders designed for doors where fitting an electronic escutcheon is not possible or required. Totally wire-free and networked through SALTO Virtual Network and SALTO Wireless network. Available for mortise and RIM standards, as well as heavy duty deadbolt, padlock, cam lock and server rack (swing handle) solutions.Add to Compare
The new SALTO GEO UK oval cylinder is IP66 certified against dust ingress and corrosion and offers a choice of RFID carrier including: iButton, Legic Prime, Legic Advant, Mifare, DESfire, Mifare Ultralight C. The contactless version is also NFC compatible. Six colour finishes are available: satin chrome, polished chrome, polished brass, satin brass, black satin chromiun and a BioCote® antimicrobial coating finish. Installing SALTO GEO is simple, easy and quick. It enables you to convert almost any door into a fully featured access controlled door giving you total control at all times over who is able to access what, where and when. SALTO GEO also means no more problems with master key management. With SALTO’s Data-on-Card technology, users can manage access credentials and add, restrict or delete access privileges on the fly. If you would like to find out more about SALTO GEO, part of our wire-free solutions platform, contact SALTO for further information.Add to Compare
SALTO Systems European profile GEO cylinders have received BZ+ physical security equipment certification from VdS, one of Germany’s leading independent testing institutions for fire protection and security. As approved by VdS, these electronic cylinders deliver high levels of protection against picking attacks and medium protection against aggravated burglary. They are approved for use as ancillary control equipment alongside burglar alarm systems (according to VdS 2119). They come with integrated pulling protection and thus may be used together with a burglar resistant security plate of class B (or higher) without pulling protection. This certification is valid for SALTO European profile half cylinders, European profile cylinders with thumb turn, European profile double cylinders, and European profile cylinders cog-wheel cam with product numbers G8Exx and G9xx. All GEO cylinders are completely integrated within SALTO System’s XS4 access control platform. They support SALTO Virtual Network (SVN) as well as several contactless RFID systems, such as Mifare, DESfire, DESfire EV1, Legic prime and Legic advant.Add to Compare
SALTO Systems' latest electronic access control innovations include its class leading NFC (Near Field Communications) solutions, its RFID wireless products for Residential, Healthcare and Education applications, Sallis wireless technology for integrations and Clay™ SALTO’s new secure cloud based access control system that is revolutionary in design, usability and features. Other new innovations include the versatile GEO (Global Electronic Opening) electronic cylinder lock now available with a stylish white reader, as well as GEO Wireless. Modular, flexible and easy to fit, the IP66 rated SALTO GEO can be used in any type of door. Part of SALTO’s innovative 360° wire free locking solution, it is fully compatible with most RFID technologies meaning no more problems with master key management. SALTO also provides the XS4 electronic locker lock, now available with HiD iClass technology, and designed to provide a high level of security protection and control access to a wide range of lockers, cupboards, display cabinets, boxes, cases and more.Add to Compare
SALTO Systems, world leaders in advanced wire free and wireless access control solutions, announces the launch of a new range of products all powered by the latest generation of LEGIC advant contactless smart card technology. Already partnered with LEGIC Identsystems Ltd, the leading manufacturer of contactless smart card technology for personal identification, the strong relationship between the two companies will allow SALTO to further expand its product platform by offering an increased range of online and offline access control products based on the secure LEGIC advant technology and respond to the globally increasing demand for LEGIC based security solutions. LEGIC advant is a range of powerful and flexible reader chips for 13.56 MHz contactless smart card technology, used for access control, time & attendance, cashless payment, public transportation and more. Compatible with ISO 14443 A, ISO 15693 and LEGIC prime, its ultra small size and extremely low power consumption makes it a perfect choice for battery-operated applications such as the SALTO access control solution. “The application of LEGIC advant technology into our range of XS4 electronic escutcheons, wall readers, SALTO GEO cylinder locks and more is extremely important to further strengthen our international business offering” explains Marc Handels, Vice President Global Marketing of SALTO Systems. “It gives us access to one of the most significant identification technologies on the market and means we can fulfill the growing demand from our worldwide customer base for a LEGIC advant based security solution integrated into SALTO’s class leading access control system.”Add to Compare
Browse Electronic Door Locks & Locking Devices
- Solenoid Bolts
Electronic locking device products updated recently
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
SALTO Systems UK, global provider of wire-free, wireless and cloud-based access control solutions, has opened a new training facility at its Southam office to support end users, installers and partners. Wireless access control solutions The modern open plan working space is divided into a number of product-themed areas and modelled on that found at SALTO HQ. It provides state-of-the-art resources and demonstrations of SALTO’s latest wireless and wire-free products, solutions and technologies, and the benefits they offer to UK end-users and installers. SALTO continues to enjoy rapid growth and deliver industry-leading, next-generation electronic locking solutions, redefining the access control world by continually being first to anticipate market needs in a rapidly evolving market place. Electronic locking solutions SALTO UK MD, Ramesh Gurdev, said “We’re excited to provide end users and UK-based partners with this new demonstration and training resource as we continue to deliver the most advanced and flexible electronic locking solutions in the market.” “The new facility offers a fully connected space for demonstrations of our extensive product range as well as a place for trainees to work and learn, as well as a work cafe hospitality area offering a relaxed breakout space to relax and enjoy complimentary refreshments. I know that this new facility will provide a welcome resource not just today but into the future as well, and we look forward to welcoming security professionals who have already booked demonstration and training visits with us.”
As increasing digital engagement powers forward in the hospitality industry, SALTO Systems has joined forces with the KeezApp technology platform to offer hotels an unrivalled guest experience. Property management systems The KeezApp platform provides a range of solutions for any property that hosts guests and is able to integrate with most PMS (Property Management Systems) on the market. Guests can check in from anywhere, receiving a virtual key straight to their smart phone and getting an alert when their room is ready for occupation. The front desk is then alerted when the guest has used the mobile key to enter their room even for doors equipped with offline electronic locks. The virtual app provides for access to all permitted areas of the hotel during their stay and when the time comes to check out, guests can again use KeezApp removing the need to queue at reception. KeezApp – SALTO software integration KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE Additional tools include live chat with the front desk. This provides a better, more efficient way for guests to talk and interact with the front desk whether they are in the hotel or out and about. Guests can also choose different departments to contact such as reception, concierge, housekeeping or room service depending on their needs. KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE. SALTO Hospitality add-ons include functionalities such as mobile keys (BLE), group check-in; real-time re-rooming and real-time extended stay. These plus other key hotel features make it easy to control all the offline and online rooms and back-of-house doors from different front desk guest workstations. SALTO electronic locks Both companies are driven by the opportunity for hotels to provide a superior guest experience to their clients, whether by offering mobile functionalities or superior management standards like quick check-in and check-out, online billing, live chat with reception, housekeeping and concierge or auto Wi-Fi connection for guests. SALTO welcomes new partnerships with industry leaders like KeezApp that will result in improved hospitality management and the guest experience. SALTO also continuously adds integrations with other technology providers so that those in the hospitality industry have a choice when it comes to which platform, they use to control SALTO’s robust line of electronic locks and supporting products.
SALTO Systems, a manufacturer of electronic access control solutions, has appointed Steve Burk as the Director of Marketing for the United States. Based at the U.S. headquarters in Atlanta, Steve will report to Bill Wood, President of SALTO North America. In this new role, Steve will oversee marketing efforts that guide the continued growth and expansion of SALTO’s electronic access control hardware and software security products. With more than 25 years of experience as a sales and marketing professional and a demonstrated track record of success, Steve is the perfect choice for the position, said Wood. Vast amount of marketing experience Steve's specialties include leading direct and channel marketing, strategic planning, operational effectiveness, channel sales, and key vendor relations“Steve is a self-starter that is results driven with a strong skill set that combines creative, strategic, and tactical capabilities focussed on excellent customer service,” Wood said. “We all look forward to working alongside Steve as SALTO continues to grow and expand.” Before joining SALTO, Steve’s career included marketing and sales leadership with Delta Material Services, Avaya, Inc., and IBM Corporation. His specialties include leading direct and channel marketing, strategic planning, operational effectiveness, channel sales, and key vendor relations. He has had great success in revenue growth through new customer acquisition and customer lifecycle management. Steve has earned a bachelor’s degree in business administration from the University of Arizona. "I am delighted to join SALTO and work with such a strong and dedicated team,” said Burk. “SALTO's strong and unique value proposition truly sets us apart in the industry and I am looking forward to helping customers solve their security needs."
Five things to consider for AI with video technologyDownload
OSDP is the strongest access control for your businessDownload
Preparing your organisation with quality situational awarenessDownload
- SALTO integrates with KeezApp technology platform for enhanced hospitality experience
- ProdataKey and ASSA ABLOY wireless access control solution upgrades security at Glenaire Retirement Community
- PROTEC2 CLIQ key-based access control system secures 30 opening points at O des Aravis water utility in France
- ASSA ABLOY's Door Group upgrades security of Network Rail’s remote signal rooms with high security doorsets