ASSA ABLOY Code Handle
ASSA ABLOY Code Handle

The cost-effective, hassle-free way to protect private rooms from public access. You don't have eyes in the back of your head. It is impossible to keep watch over every private door in a public-facing space: the storeroom in a shop or pharmacy, or the toilet for staff use only. That's when you need Code Handle®. This simple, secure, easy-to-fit handle with a built-in PIN-pad locks the door for you — with no wiring, no expensive access control system, no cumbersome keys and no major changes to your current door.  Code Handle works with an electronic PIN code to make sure only authorised people, like staff, can unlock the door. Press a 4-digit code on the handle’s keypad and the door opens. Code Handle adds security and convenience to any private room adjoining a public area.  Sure, you could continue using a key-operated lock on every door. But then you have to keep track of the key and remember where it is every time. For busy doors, chasing up keys becomes a full-time job. The solution is the simple, affordable Code Handle. You’ll receive a Master Code and up to 9 different user PINs. Code Handle has another trick up its sleeve. It locks itself when you close the door. Did you remember to lock up? Don’t worry, because Code Handle never forgets.  Simple installation Upgrading doors is a snip, because Code Handle is easy to install and retrofit. It works together with your existing locking unit: keep the cylinder or lock and only change the handle to a battery-powered Code Handle. All it takes is two screws to fit a Code Handle to almost any interior door. No need to cable the door or connect it to the mains. No need to install a complex system.  When do you need Code Handle? What is in your archives? Irreplaceable documents deserve an extra layer of security. Are your drug and medicine stores safely locked? An all-in-one secure PIN and door handle keeps casual intruders at bay — and keeps you on the right side of compliance.  If your shop is busy, who keeps watch over the store room? Public areas with high traffic are hard to police when you can’t afford a security team. So, if your toilet is for customer use only, Code Handle keeps it locked without the hassle of a key.  And what about the office? Surely not everyone on your floor should be reading the documents you left on your desk?  Code Handle keeps sensitive files, private rooms, personal belongings or valuable stock separated and secure from the public.  You can’t see what’s behind you. Thankfully, with Code Handle, you never need to.  Learn more about Code Handle, visit: https://campaigns.assaabloyopeningsolutions.eu/codehandle 

Add to Compare
The new SMARTair® Knob Cylinder
The new SMARTair® Knob Cylinder

Style, intelligence and robustness come together in the new SMARTair® Knob Cylinder from ASSA ABLOY. Part of the SMARTair® access control system, this intelligent device with integrated RFID reader is now more resistant to attack. It comes in elegant, contemporary finishes and colours, upgrading aesthetics and functionality in equal measure. It quickly upgrades almost any existing regular door to an access-controlled door — without any drilling. The new Knob Cylinder fits seamlessly and flexibly into a SMARTair® system, providing advanced, user-friendly access management designed to make any workplace work better. If you need to monitor and control who goes where, and when, you need the new SMARTair® Knob Cylinder. The Knob Cylinder is battery-powered and works with every SMARTair® access management option, so you can choose between online (“real-time”), offline, update-on-card and standalone management — or combine more than one system at the same site with the same software interface. Upgrading to the new Knob Cylinder is simple: just replace an existing mechanical cylinder with the new device. No complex installation or drilling stands between you and safe, reliable, flexible SMARTair® access control. Glass, wooden or aluminium doors — Scandinavian, Euro and many other profiles — present no problem. A modern, mobile solution The Knob Cylinder works with all standard proximity technologies, including MIFARE®, DESFire and iCLASS®, and also offers another new way to open your doors — with the SMARTair® Openow™ mobile app. With Openow™, users no longer carry separate credentials; just their smartphone with secure virtual keys stored inside. There’s no longer any need to collect or validate an access card to open authorized doors locked with the new SMARTair® Knob Cylinder. With Openow™, if you have your phone, you are already carrying your keys. Modern and mobile-ready, the SMARTair® Knob Cylinder is built to make your building smarter. Its robust design, redefined aesthetics and easy installation are perfect for securing offices, business headquarters, conference and meeting rooms.

Add to Compare

Electronic locking devices - Expert commentary

Why is key management so important?
Why is key management so important?

More and more business security practices are going digital. Mechanical keys are still the backbone of most corporate security plans, and it can be very expensive for companies to switch to electronic access control on a large scale. Therefore, enterprises need to choose the most suitable access control system. What is key management? Key management is the process of protecting, tracking, and scheduling mechanical keys. Why is this important? Because the key carries access to sensitive locations and assets within the organisation, when you increase the security of the key, you can enhance the security of these valuable resources. The key management system also controls the cost of using physical keys. The system reduces the overhead caused by key loss or security breaches. Some smaller companies may be able to adopt a paper-and-pencil key management protocol. Larger companies, or those who want to better understand and control keys, usually choose to use an electronic key management system. Key management systems can store and assign keys securely and increase the efficiency of organisation Why use a key management system? The key management system can become the cornerstone of your key control process. At the most basic level, key management systems can accomplish two things that paper and pen systems cannot: they store and assign keys securely, and they increase the efficiency of your organisation's use of keys through automation and analysis. What can key management systems do? 1) Improve access control By better protecting the keys, you can improve the access control to the spaces and devices unlocked by these keys. You can use your key management to simplify the process of providing temporary employees with one-time-key access. In addition, the system can record all their key access records, so that everyone's behavior can be traced. 2) Enhanced accountability traceability The software is a good key management system that can generate reports on key usage, user access requests, access exceptions, and loss. In addition, you can track and audit key usage in real-time. Combined with a comprehensive key control strategy, you will implement better accountability for key use to meet any industry or risk management compliance standards. 3) Reduce costs and prevent losses When an employee loses a key, you will incur direct costs for a replacement key or relocking it when it is lost When an employee loses a key, you will incur direct costs, including purchasing a replacement key or relocking it when it is lost. However, the indirect cost of key loss is usually more significant. This is because employees first spend time looking for the lost key and then process the replacement request, all of which time is not spent on production work. 4) Improve workflow As we discussed, keys are often used in important workflows. The key management system allows you to better control these workflows. A passive electronic lock system, also known as a key-centric access control system, has outstanding advantages in key management. Compared with the electronic access control system, the passive electronic lock system's "passive" characteristics have reduced the update cost for many enterprises.

Why face recognition as a credential is the ideal choice for access control?
Why face recognition as a credential is the ideal choice for access control?

In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

How schools can make outdoor learning safe and secure
How schools can make outdoor learning safe and secure

Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head teachers are considering taking learning and large gatherings, such as assemblies outdoors, when possible. Managing ‘class bubbles’, hygiene and ventilation While Dr. Yvonne Doyle, the Medical Director of Public Health England (PHE) has publicly reassured parents that schools are not the ‘drivers’ or ‘hubs’ of COVID-19-19 infection in communities, there is a lot of pressure on school leaders to manage ‘class bubbles’, extra cleaning and hygiene, ventilation, and COVID-19 testing, to protect families and staff. It’s a logical step to switch, in certain circumstances, to outdoor activities where fresh air is on tap, and social distancing is far easier to manage. Specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms, which had been growing in popularity, even before the pandemic. These facilities offer numerous benefits as an extension of existing learning spaces and provide children the opportunity for hands-on learning, beyond a stuffy classroom. However, if outdoor spaces are routinely called upon as part of COVID-19 contingency planning, how can schools ensure that their outdoor classrooms and wider areas are secure, robust, and fit for purpose? When specifying outdoor classrooms and learning spaces, it’s essential to take into account the well-being of the students and staff, who will use them, noise pollution and acoustics. Most importantly, education managers need to ensure the surrounding area is secured and adequately protected from threats, including terrorism. Perimeter security measures for schools How can schools and nurseries secure their perimeters, so that outdoor learning is totally safe for all? A starting point is to seek out architects and suppliers, who have a good understanding of security standards. Worryingly, Jacksons Fencing’s research recently found that only one-third of architects are seeing both LPS 1175 and the UK police initiative, Secured by Design (SBD) physical security standards, specified for schools. This highlights a lost opportunity for architects to propose solutions that are appropriate to the level of risk and needs of the school, without turning the site into an unwelcoming fortress. Helping schools identify specific security needs Head teachers would be wise to work with architects, who not only know the latest security standards inside and out, but are also are willing to play a more advisory role, helping the school identify exactly what is needed. Head teachers should prioritise solutions appropriate to their site’s specific risks It’s also vital that architects don’t simply replace existing fencing and gates, with the same security systems that have been in place for years. Instead, they will need to meet changing needs and risks. Our research finds that teachers often report issues, with the school perimeter and gates, from being climbed over (28%) and causing injury, to gates not locking properly (10%). Head teachers should prioritise solutions appropriate to their site’s specific risks, which sometimes require altering of existing measures. School fencing is an important aspect of any education site. As well as defining its boundary and making a visual distinction between public and private property, the fencing and gates that surround and secure a school, will typically meet a wide variety of other important criteria, including preventing unauthorised entry to the grounds, protecting pupils, staff, and visitors from accidents and injury, deterring theft and anti-social behaviour, and reducing the risk of malicious damage, and acts of terrorism. Welded mesh panels for perimeter fencing Popular options for schools include welded mesh panels for perimeter fencing or sports areas, and railing systems to act as demarcation, in order to control foot and car traffic. Within the outlying boundary, barriers, bollards and parking posts will keep pedestrians, and vehicles safe from each other, while timber fencing and gates can be designed to control the flow of people, around the grounds and reduce the areas, where students can be hidden from view. Automated gates and access control Perimeter fencing must be complemented with safe entrances and exits for vehicles and pedestrians. Every school has unique entry-control requirements, determined by factors, such as size, location and the local environment. These needs influence the decisions you make, when preparing technical specifications for school security gates. Do you require gates to be steel or timber, manual or automated, single or double leaf? Specialist suppliers will be in the best position to offer inputs on school gates, which typically need to offer solid security and durability, with a welcoming aesthetic. Specifying access control system When specifying a school access system, it’s important to consider the areas of the school When specifying a school access system, it’s important to consider the areas of the school, such as sports fields, car parks, and children’s play and learning areas, and whether it requires playground segregation. Selected gates should meet the design of the fencing, to create a secure perimeter with no weak points, with automated gates conforming to all current safety regulations. . Noise pollution can be a problem as well, including noise coming in or leaving the school in residential areas. If more teaching is to be carried out outside, it’s worth considering acoustic barriers to reduce noise in and around the school. Timber acoustic barriers for security and privacy Timber acoustic barriers offer security and privacy, and can reduce noise levels, by as much as 32 decibels (in laboratory conditions), so are ideal for city centre schools or those located close to busy highways. There are many ways to build an outdoor classroom. Timber products can help to create a welcoming environment, such as wooden shelters, pergolas, fencing, and decking. Always check that high quality timber, ideally guaranteed for 25 years against rot and insect attack, is being used to provide an attractive, cost-effective, safe and sustainable solution, for all weather conditions. DBS approved installers And of course, installers must be DBS approved, so that they can install outdoor classrooms, during school holidays, or within term time, with minimal disruption. The COVID-19 pandemic had a huge impact on schools and learning. While nobody wants to think of fresh outbreaks of the infection, or any other virus, installing an outdoor classroom made from high-quality, long-lasting materials is a great way to future-proof school learning and ensure safety, and preparedness. Putting extra thought and care into the security angle will provide schools with decades of protection against a host of unforeseen events.

Latest ASSA ABLOY news

ASSA ABLOY Opening Solutions’ Incedo Business access control solution offers greater versatility for Clockwise’s flexible workspaces
ASSA ABLOY Opening Solutions’ Incedo Business access control solution offers greater versatility for Clockwise’s flexible workspaces

Following a change in employment practices, created by the COVID-19 pandemic, many office-based employees now follow a hybrid schedule, working where they are needed or find convenient. The fast-growing use of flexible offices and co-working spaces is a testament to this emerging trend. With employees coming and going as they please, a change in how security and access control are managed is an urgent, but overlooked aspect that many firms are just waking up to now. Clockwise, renowned office space provider Clockwise is the UK and European provider of flexible office space for entrepreneurs and established businesses. The company’s expanding offering includes contemporary offices, meeting rooms and shared workspaces, across multiple cities. Any business, which relies on flexibility, places high demands on door security and access control. Clockwise needs a broad choice of electronic devices to secure meeting rooms, private offices, communal spaces and main entrances, which may not all require the same lock type. Access management should adapt to changing needs Access management must be able to adapt and change, as fast as Clockwise clients’ needs The office space demands of a start-up, freelance co-worker or growing SMB can change at any time, so Clockwise offer a range of membership levels and packages. Access management must be able to adapt and change, as fast as Clockwise clients’ needs. Because tenants come and go frequently, Clockwise facility managers need tailoring of user access rights, to be as easy as possible. Clockwise’s own spaces and a portfolio may also evolve, so any access system must be able to scale instantly up or down. How flexibly Clockwise can deliver for their clients is essential to growing in such a competitive market. Incedo Business offers versatile access control The range of Incedo-enabled devices and door hardware, managed by simple cloud-based software, convinced Clockwise to choose ASSA ABLOY Opening Solutions’ Incedo Business, for all their premises. This platform-based access solution connects security software and hardware within a single, future-proofed ecosystem. The diversity of Incedo-enabled devices enables Clockwise to select the ideal electronic lock for every opening in their properties. Internal private office doors, ‘Zoom rooms’ and meeting rooms, as well as communal area doors, and entrance/exits, are now secured with wireless access control devices from the Incedo Business range. Flexible system management options Incedo’s flexible system management options help Clockwise to operate access control with maximum efficiency. Administrators quickly create groups with tailored access for specific doors. Access permissions may also be time-limited, which is perfect for meeting room bookings or for facilitating access hours for different membership options. Private desk members get 24/7 admission, whereas hot-desk membership is only allowed entry during office hours. According to Clockwise, the flexibility to create groups and the ability to remotely update cards, both work really well for their business.

PSIA approves the Secure Credential Interoperability (SCI) 1.0 specification
PSIA approves the Secure Credential Interoperability (SCI) 1.0 specification

The Physical Security Interoperability Alliance (PSIA) announces it has approved the Secure Credential Interoperability (SCI) 1.0 specification. The PSIA has been working with a broad group of industry pioneers in the access control industry to come up with this specification, which is likely to have a significant influence on the future of secure mobile credentials. Mohammad Soleimani, the Chief Technology Officer of Kastle Systems and the Chairman of the SCI Work Group, introduced this concept to the organisation in 2020 and has had a strong influence in engaging other companies in its development. Compatible secure credential “A standard for secure mobile credentials has been long overdue in the industry. SCI relies on established standards and the Public Key Infrastructure, to provide a simple, but elegant solution,” said Soleimani. SCI addresses the need for a universally compatible secure credential for the physical access control industry in the form of cards, fobs, mobile devices, and wearables. Progress has been dramatic, with the technology being demonstrated at a PSIA technical meeting in August featuring apps from IDEMIA and Johnson Controls and a Kastle reader developed by WaveLynx. “It has been our mission from day one, to drive secure credentials and interoperability into the market” said Laurie Aaron, Executive Vice President at WaveLynx Technologies Corp. “Joining PSIA to collaborate and execute on a standard that is made available to all, has been a fast track to mission success.” Different mobile platforms The SCI specification helps the industry to take steps towards the last mile of credential evolution" One of the important characteristics of SCI is its interoperability across different mobile platforms including iOS and Android or devices with the ability to generate ephemeral key pair, which can be communicated over various protocols such as BLE (Bluetooth Low Energy), NFC (Near Field Communication), and UWB (Ultra-wide band). “The SCI specification helps the industry to take steps towards the last mile of credential evolution where interoperability of credentials can exist. The simplicity of the use of a public key leveraging standards and best practices ensure a secure and open way to manage credentials that takes proprietary out of the picture.” says Jason Ouellette, the Head of Technology and Business Innovation for Johnson Controls Access Control and Video Solutions business. Security industries’ efforts Participants in the spec development include, ASSA ABLOY, Deister Electronics, Farpointe Data (a dormakaba company), HID, IDEMIA, Kastle Systems, LenelS2, rf IDEAS, SentryCard, Siemens, and Johnson Controls. “This is an important milestone in the security industries’ efforts to enable flexible, interoperable and scalable solutions,” states Peter Boriskin, Chief Technology Officer for ASSA ABLOY Opening Solutions Americas. “It will be essential to consider how this and other standards apply across various industries, and how current and emerging standards impact each other.”

TDSi launches new additions to its powerful GARDiS integrated access management software, with the new Version 2.2
TDSi launches new additions to its powerful GARDiS integrated access management software, with the new Version 2.2

Integrated security systems manufacturer, TDSi is proud to announce the launch of exciting new additions to its powerful GARDiS integrated access management software, in the new Version 2.2. New features added to the GARDiS platform Version 2.2 include integration with the STid BLE (Bluetooth Low Energy) mobile device authentication portal, integration with the RS485 wireless locks from ASSA Abloy and SimonsVoss, integration with the new TDSi GARDiS VU VMS software, and a new Cause and Effect Engine. GARDiS platform Version 2.2 The latest additions add valuable features to the ever-evolving GARDiS platform The latest additions add valuable features to the ever-evolving GARDiS platform, as Tina Baker, Software Project Manager at TDSi comments, “GARDiS is designed to evolve, anticipate and cater for a rapidly changing security/safety landscape. Both integration with the STid BLE portal and support for RS485 wireless locks provide greater flexibility in deploying highly secure touch-free access control.” Tina Baker adds, “Integration with our new GARDiS VU VMS solution, which is powered by our fellow VITAPROTECH Group partner and specialist in intelligent cloud video surveillance RECAS, enables customers to benefit from this next-generation solution.” STid BLE Portal integration Integration with the STid Portal provides easy, but highly secure use of a mobile device as access control authentication. By utilising the ubiquitous mobile phone, organisations can easily share or rescind access approval. GARDiS v2.2’s integration ensures easy administration of this function (using a STid login). GARDiS v2.2 now features RS485 integration with ASSA Abloy and SimonsVoss wireless locks. This adds further resilience, by enabling them to communicate directly with the controller, even if the IP network is interrupted, in order to ensure continuous secure access control. TDSi GARDiS VU VMS software integration The latest version of the GARDiS software now features integration with TDSi’s new GARDiS VU VMS solution, which has been developed in partnership with RECAS. This ensures full and seamless integration of access control and the video surveillance network, all from a single central portal. The all-new Cause and Effect module fully automates a response to one or multiple inputs (such as an intruder panel for example), so the security operator is assured that the system will enact the required action, without the need for human intervention. Cause and Effect engine The Cause and Effect engine operates on both the main security server and the local controller To meet any eventuality or situation, the Cause and Effect engine operates on both the main security server and the local controller. This ensures that even if there is a communications loss between the two, the access control function remains fully operational. It also provides easy to create and update Cause and Effect records that are bespoke to the security needs of the organisation/facility, with detailed report generation on-hand, whenever required. GARDiS Pro v2.2 also now includes a widget that enables a visual check of an access event (be it via a card, mobile or biometric credential), delivering an image of the authorised person for verification. Unlimited additional fields and new interface To add even greater flexibility to the GARDiS system, v2.2 also provides unlimited additional fields per user record. This enables the creation of bespoke fields and additional space to log notes, as required. Additionally, v2.2 also provides a revised user interface, which centralises operations and makes rapid navigation easier. Tina Baker concludes, “All these new functions are the result of close consultation with our installation partners and customers, adding true value-add features that help to improve and refine secure access control operations, and the user experience, benefitting any organisation or business that needs them.” The new features are available to download and install now through v2.2 of the GARDiS integrated access management software.

Related white papers

Protecting dormitory residents and assets

Top 5 ways to ensure visitor safety and security

Moving to mobile: A guide for businesses switching to mobile access control