Keyscan Electronic Door Locks & Locking Devices(3)
Browse Electronic Door Locks & Locking Devices
- Solenoid Bolts
Electronic locking device products updated recently
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase in revenue for dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, connected smart locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio of home automation products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages of professional installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realise they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realise that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling additional home automation products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labour warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces connection instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realise over time. On the other hand, one issue DIYers may recognise right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognisable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not everyone is a DIY customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing complete and custom solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
Altronix, a manufacturer of power and data transmission products for the professional security industry, is showcasing a host of new Trove Access and Power Integration Solutions here at ISC West 2018 (booth #11073). Trove easily combines Altronix power with access controllers from the industry’s leading manufacturers. DMP, ProdataKey (PDK), Sielox, and ZKTeco USA now join Altronix’s extensive list of access control manufacturers to capitalise on the benefits that Trove solutions deliver. “Trove is engineered to help system designers easily layout power supplies, access controllers and accessories in an organised streamlined manner, which saves time, reduces costs and conserves valuable space,” said Alan Forman, President, Altronix Corporation. “We are pleased to collaborate with the industry’s leading access manufacturers, increasing ROI and providing value-added features for our mutual customers.”Removable backplanes designed for specific access control brands allow installers to easily configure and test system configurations Simplifying security deployments Trove Access and Power Integration Solutions simplify board layout and wire management, while providing extreme flexibility and scalability when designing and deploying access systems. Removable backplanes designed for specific access control brands allow installers to easily configure and test system configurations prior to on-site installation, reducing time and labour and increasing profitability. In addition to the Trove1 and Trove2 Series, Altronix introduced Trove3 for the largest access control deployments. Altronix Trove now supports over 40 brands, including: AMAG, Bosch, CDVI, DMP, Genetec, HID, Honeywell, Kantech, Keyscan, Lenel, Mercury, ProdataKey (PDK), Sielox, Software House and ZKTeco USA with more to come. Trove enclosures include a cam lock, tamper switch, mounting hardware, and provide ample room to accommodate back-up batteries. Altronix also offers a free Trove System Design Tool to further simplify the product selection and design process.
Altronix, a recognised provider of power and transmission solutions for the professional security industry, is featuring its expanded offering of Trove Access and Power Integration Solutions at ASIS 2017 (booth # 2823). New additions to the Trove series include Altronix integrations with Bosch, DMP, Honeywell, Kantech and Sielox access. These new models join the versatile line of Trove solutions which accommodate AMAG, CDVI, HID/Vertx, KABA/KeyScan, Mercury and Software House access controllers. “Trove enclosures and backplanes simplify board layout and wire management, greatly reducing installation and labor costs, while providing the versatility and scalability that system designers and installers require to easily configure their systems.” said Alan Forman, President, Altronix Corporation. Enhanced performance efficiency Trove2 Access and Power Integration Solutions are designed for larger applications, allowing Altronix power/accessories combined with access controllers from the industry’s leading manfacturers to be wired and pre-tested prior to on-site installation. This reduces total cost and enhances performance efficiency. Altronix also offers the Trove1 Access and Power Integration Solution, a more compact version of the Trove2 for smaller applications which accommodate CDVI, HID/VertX and Mercury access controllers. All Trove enclosures include a cam lock, tamper switch and mounting hardware. Altronix has further simplified the product selection and configuration process by offering a free online Trove System Design Tool for configuring a access system.
The new FaceStation 2 is a contactless facial recognition device with an adjustable wall bracket BioConnect and Suprema will be at ISC West 2017 demonstrating the newest innovations in biometrics, security and identity in booth no. 22075. New facial recognition, dual-factor cabinet lock, cybersecurity and mobile solutions will be demonstrated in the joint booth. With cybersecurity issues seemingly ever-more prevalent and the development of more user-friendly security solutions such as mobile and contactless biometric, security professionals are consistently seeking ways to protect both physical and logical applications. BioConnect and Suprema are pleased to address these issues with a focus on biometrics, security and identity at ISC West 2017 and invite security professionals to learn more. Suprema FaceStation 2 Suprema will debut the new FaceStation 2, a facial recognition device with multi-card support. The FaceStation 2 is the next generation of the FaceStation and as a contactless facial recognition device with an adjustable wall bracket to accommodate different heights, it is very user friendly. It boasts an incredibly fast and accurate matching speed (1:3,000 matches in one second) and captures both static and dynamic templates, giving it the ability to constantly evolve and sustain a more exact understanding of the daily changing expressions of the face. The device also offers multi-factor authentication options with a RF card (HID Seos, iClass, Prox) and PIN. It also can operate in much harsher lighting conditions than other competing facial recognition devices with an operating illuminance of up to 25,000 lux. BioConnect ID CabinetShield BioConnect ID is at the core of every biometric service offered by BioConnect and simplifiesthe deployment of biometrics BioConnect colocation customers expressed the need to provide dual-factor authentication from the front door all the way to the cabinet to address both compliance and their customer security requirements. In the past, solutions to meet these requirements at the server cabinet were limited. To address this problem, BioConnect created BioConnect ID CabinetShield a dual-factor fingerprint plus card lock to secure server cabinets. With biometric (fingerprint) and card support, the lock is manufactured to fit most of the common cabinets and can be easily integrated with over 25 various access control solutions, making installation and enrolment much more simple and sustainable. The BioConnect team has completed multiple successful pilots of the solution in flagship data centers across North America. BioConnect ID Mobile With companies going global in footprint and supporting a workforce that is more mobile than ever, BioConnect’s partners are fast-developing solutions where mobile credentials are replacing plastic cards. BioConnect ID is at the core of every biometric service offered by BioConnect and simplifies the deployment of biometrics. BioConnect will debut BioConnect ID in the form of an API/SDK and mobile app to enable enterprises to take advantage of biometrics (face, voice, fingerprint, eyeprint) within their mobile app. BioConnect will be demonstrating partner mobile apps that are secured by BioConnect ID. BioConnect ID Cybershield Suprema and BioConnect are consistently updating theirbiometric offerings to support evolving industry standards BioConnect and Suprema are very excited to debut BioConnect ID Cybershield, a complete end-to-end physical security solution that meets IT requirements. BioConnect ID Cybershield incorporates Suprema BioStation 2 fingerprint plus card access device integrated with leading access control solutions. It boasts software customisations that meet the requirements of network security, from how the device communicates to the panel, to the network, how the data is stored and can even support an enterprise transitioning to newer network protocols such as 802.1x and IPv6. The solution will be demonstrated with Software House CCURE 9000 access control. BioConnect ID Enterprise BioConnect is consistently integrating the leading biometric solutions on the market to offer flexibility to grow in the future. BioConnect and Suprema will demonstrate how Suprema devices and BioConnect ID CabinetShield seamlessly integrate with Lenel OnGuard, Brivo OnAir, AMAG Symmetry, Genetec Security Center and Keyscan Aurora access control solutions with BioConnect ID Enterprise. Suprema and BioConnect are also consistently updating their biometric offerings to support evolving industry standards such as communication protocols (such as OSDP) and card types such as HID iClass and SEOS. BioConnect and Suprema are looking forward to meeting with security professionals at ISC West. Attendees can request a meeting on BioConnect’s website or visit booth no. 22075 to see the latest biometric solutions on the market.
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
Physical security supports a future-proof cyber security strategyDownload
- Mul-T-Lock’s eCLIQ locks ensure authorised access control at Glenveagh National Park
- 3xLOGIC infinias access control system secures Las Vegas marijuana facility
- ASSA ABLOY’s SMARTair swaps manual keys for centralised electronic access control at Westbridge
- ASSA ABLOY secures Centre Hospitalier Métropole Savoie with its Aperio locking technology