Safety & Security Gates(22)
Hikvision announced its new access control and time attendance offerings, the MinMoe Face Recognition Terminals, promising a new era of face recognition access control is coming. To meet a multitude of real-world scenarios and customer needs, the MinMoe Face Recognition Terminals lineup features four total series: Value Series, Pro Series, Ultra Series, and Face Recognition Modules for Turnstile. With powerful functions and competitive prices, the Value Series (DS-K1T341A/DS-K1T331) products have been uniquely designed for SMB scenarios, such as offices and retail shops. “We see great advantages in the ‘touch-free’ experience that face recognition provides. With advanced deep learning technology and diverse practical functions, we expect that MinMoe Face Recognition Terminals can bring more security and efficiency to our small and medium sized customers, making access control and time attendance much easier,” says Frank Zhang, President of the International Product and Solution Center at Hikvision. Fast, accurate recognition, even in darkness Hikvision MinMoe Face Recognition Terminals are powered by a deep learning algorithm, which increases accuracy of face recognition to over 99% and enhances verification speeds to under 0.2 seconds. The enhanced verification rates and accuracy ensure a pleasant, “touch-free” experience for users – a vast improvement over swiping ID cards or fingerprint scans. Furthermore, MinMoe Face Recognition Terminals perform well in low- and even zero-light environments. Better security with face anti-spoofing Equipped with dual lenses – a visible light lens and an infrared lens – MinMoe Face Recognition Terminals will only grant access when both lenses detect the same person, as well as determine whether the face is actual, not an image. This anti-spoofing technology makes access control management much safer and prevents most attendance fraud. Multiple linkages and third-party integration options Along with door linkage, MinMoe Face Recognition Terminals can be linked with NVRs for data recording and storage. They can also be linked with network cameras to allow clear video recording of the scene when any pre-set events are triggered. Meanwhile, MinMoe products provide an abundance of third-party integration options for extensive compatibility, allowing quick and cost-effective connections between MinMoe Face Recognition Terminals and customers’ existing door control and attendance systems.
HID Signo™ is the signature line of physical access control readers from HID Global. The versatility, performance and connected capabilities of HID Signo readers set a new industry benchmark for the most highly adaptable, interoperable and secure approach to electronic access control. Offering an unparalleled breadth of functionality, HID Signo affords security system installers and administrators a simple and effective approach to secure access control for almost any scenario. With support for the widest array of credential technologies — past, present and future — HID Signo is the perfect choice for those looking to make the transition to a secure authentication technology. HID Signo readers transcend the traditional approach to security by being designed to be connected and managed remotely without needing to physically touch each device. This functionality empowers access control systems to dynamically respond as new needs, configurations or threats arise. The HID Signo Reader 20 is a founding member of the Signo platform. Offering a truly dynamic approach to secure electronic access control, HID Signo Readers are designed to be highly versatile, powerful, and connected for the future. A perfect fit for door applications requiring a narrow card reader, the HID Signo Reader 20 supports an unparalleled range of different credential technologies in a variety of form factors including cards, fobs and mobile devices.
As building security becomes smarter, the need for electronic access control systems spreads further. Wired access points and security doors have long been the backbone. Yet at the same time, even buildings with extensive electronic systems leave mechanically locked doors unmonitored and unguarded — and certainly not “smart”. Mechanical locks cannot be connected. Thankfully, the latest generation of wireless locks can replace them easily and integrate them seamlessly within almost any access system. A recent industry survey — cited in the “Wireless Access Control Report 2018”, from ASSA ABLOY and IFSEC Global — finds integration is an increasing concern. Over 90% of industry professionals polled for the report suggest integrating security systems with each other (and with other smart building systems) has increased in importance in the last few years. Integration is a recurring theme in conversations among professionals. For 53% of survey respondents, easy integration with CCTV, alarms, time and attendance, lighting and HVAC would make them interested in upgrading to a particular product — more than any other factor. Forty-three percent said easier integration with existing access control systems would make them more likely to upgrade. But why the focus on integration? What are the advantages? Why integrate? Fewer security interfaces are easier to support and so require less training. Integration can also enhance the experience of building occupants. One credential opens the car park, then the building, and accesses their laptop and buys lunch in the café. Integration across the business also means security systems — and security teams — contribute to business efficiency, not just the protection of people, premises and other assets. Integrate HR systems with your access control system, for instance, and smart access cards can be automatically revoked when people leave the organisation, reducing overheads and even headcount. A majority of those polled for the “Wireless Access Control Report 2018” believe it very important (58%) that access control supports open standards in order to be flexible and future-proofed. A huge majority (91%) consider it at least somewhat important. Future-proofing is high on any list of procurement criteria. Will your system accommodate a changing business and the evolution of functions within it? Can you extend access control with components that contribute to, rather than detract from, the flexibility of all your building systems? The solution to extend access control Expanding the coverage of traditional locks can be expensive and intrusive. But one fast, easy and cost-effective alternative enables you to forget about keys and the hassles of key management: wireless devices like Aperio®, battery-powered locks with integrated RFID-readers. The aforementioned report cites growth forecasts for the wireless access control market of around 8% annually through 2025. The ease and cost-efficient integration wireless offers is surely driving this growth. Because Aperio® has an open architecture, it is flexible and modular, so those who already have wired access control and want to add more doors to their existing system find wireless is the solution. Aperio® wireless locks integrate with security systems from over 100 different OEMs worldwide, for new installations or to upgrade an existing system. Integration is seamless, extending the reach of an existing system with future-proofed devices. Security administrators operate the new Aperio®-equipped doors from the same interface as the installed system. Site users carry a single smart access card for all doors, and other functions like canteen payments or library loans are just as easy to integrate. What if your security system uses mechanical keys, without electronic access control? Wireless locks like Aperio® can also be the right solution. Battery-powered Aperio® RFID-equipped cylinders, escutcheons, handles and locks can be fitted as a new access control system, or extend an existing installation by linking new doors to the same system wirelessly. There’s no need for staff to swap their key-cards, nor for anyone to carry more than one credential. Aperio® locks work within almost every major access control ecosystem on the planet, from over 100 different manufacturers. They are energy-efficient, with batteries lasting an average of 40,000 cycles (typically 2 years) before they need replacing. “It’s easy to start the upgrade process,” says Matthias Weiß, Aperio® Product Manager at ASSA ABLOY EMEA. “Your security or facilities manager only needs to contact their regular access control provider to find out if they offer Aperio®. We can upgrade nearly any system.” Aperio® integrates access control — quickly and painlessly Installing wireless locks is also more cost-effective than hard-wiring more doors, because there’s no cabling or invasive building work around the door. Changing door hardware is unnecessary. For example, it’s fast and easy to switch a mechanical handle for an Aperio® wireless handle with integrated RFID reader, to bring more doors into an access system. (Installation takes mere minutes: see https://youtu.be/lr6Sw95qqm8) Aperio® devices with built-in RFID readers fit almost any opening or security level. Aperio® locks protect both exterior and interior doors, from fire and escape route doors to meeting rooms, labs and offices; wooden, glass or aluminium doors are no obstacle. The portfolio includes cylinders, escutcheons and complete locks for security doors, plus a revolutionary new wireless handle with integrated RFID reader, which recently won Intersec’s Access Control Product of the Year. Aperio® locks are compatible with all common door profiles: Euro, French, Finnish, Scandinavian and Swiss. Integration with your existing system can be Online or Offline, or both. Learn more about Aperio®, visit https://campaigns.assaabloyopeningsolutions.eu/aperio
Openow™, the new complete mobile solution for SMARTair® wireless access control, makes life easier and more secure for everyone. Users of a SMARTair® access control system can open doors with their mobile phone and the Openow™ app. Facility managers can send, revoke and update virtual keys from anywhere. For security staff, business owners and every user of a site — from nurses on a ward, to mobile workers in a co-working space, to students in an accommodation block — Openow™ takes mobile credentials to the next level. With Openow™, facility managers and security administrators have more control and no longer need to administer physical credentials. And it’s fast and easy to upgrade an existing SMARTair® system to work with Openow™ or to install mobile-ready, wireless SMARTair® access control from scratch. The new Openow™ app has been designed around convenience, security and user experience with virtual keys. Information transfer between administration software, smartphone app and the SMARTair® device is protected by end-to-end encryption. “Right from set-up — involving simple, secure email subscription — users find the Openow™ app a joy to operate. Tap a SMARTair® lock with your phone carrying a valid virtual key, and the door unlocks. The device you carry everywhere — the smartphone — now replaces a separate RFID card with MIFARE®, DESFire, iCLASS® and other proximity technologies.” explains Félix Morán SMARTair® Product Manager at ASSA ABLOY. Openow™ also adds further layers of security to every premises Facility managers find life a lot simpler when managing access rights with the Openow™ mobile solution. Change the validation time in the administration software to automatically update a user’s virtual key (when the phone has a signal). Cancel a virtual key and it vanishes immediately from a user’s app. Facility managers can check and amend the validity of each virtual key whenever they want, and wherever they are. The complete mobile solution includes the SMARTair® device range, with wireless escutcheons and cylinders plus wall readers; the intuitive SMARTair® TS1000 software; user credentials, e.g. cards and the new Openow™ app. Business owners and directors project the right image for their premises when they offer mobile credentials via Openow™. Phones replace plastic key-cards, so there’s no need for a card activation terminal on reception or elsewhere. Users also save time, because there’s no longer any need to collect or validate an access card: your key is already on your smartphone. Openow™ makes it easy to organise virtual keys inside the app, check how long they are valid, and protect them further with an individual PIN. If you have virtual keys from multiple sites or premises, Openow™ easily handles those, too. No more key-card, or wondering where you left it; no more appointments to pick one up or have it revalidated. With Openow™, if you have your phone, you are already carrying your keys. The SMARTair® Openow™ app is free to download now from Apple’s App Store and the Google Play Store. For more information, see https://campaigns.assaabloyopeningsolutions.eu/openow?utm_campaign=smartair-openow&utm_source=PR
Hikvision has released its new generation of IP Villa Door Stations (DS-KV8X13/DS-KV61X3 series), providing a simpler video intercom solution for houses and small buildings, and delivering more convenience, security and style on the doorstep. The door stations have been designed to be user-friendly, making installation easy and cost-effective. Standard Power over Ethernet (POE), Plug and Play, and Wi-Fi technologies simplify installation, and can provide fast and convenient data transmission. Either intuitive step-by-step configuration wizard on machine or online web configuration way makes the set-up process more convenient and easier. For DS-KV8X13 series, both flush and surface mounting options are available for a flexible installation. With protection to IP65 and IK08 standards, Hikvision’s DS-KV8X13 series IP Villa Door Stations are robust and resistant to force and water. A 2MP Fisheye IP camera, which supports WDR, can provide sharp HD images, enabling users to see clearly who is outside and to keep better security and peace of mind. Other features include: Noise suppression and echo cancellation Low illumination Access control functions Tamper-proof 2.4 GHz Wi-Fi Hikvision’s new IP Villa Door Stations are a great addition to solutions in homes, shops, offices and other small buildings. With help of a mobile app, securing homes or small businesses is a breeze, even when users are on the move.
Dahua’s new Wi-Fi Video Doorbell (DHI-DB11) is a part of the Dahua LincX2PRO camera series. This new series is designed to integrate with home and small business applications for a comprehensive and seamless professional installation. The doorbell offers Passive IR motion detection and transmits video and audio to a mobile phone for remote visual confirmation and communication with visitors using the built-in microphone and speaker. The camera offers a 140° wide view, capturing whatever is below the camera to prevent visitors from ducking under the field of view. This video doorbell is compatible with Dahua NVRs; Dahua X5, X7, and X82 Series HDCVI DVRs, and with the DMSS mobile application for easy integration. The 1080p video doorbell features a built-in microphone and speaker for real-time communication and an SD card slot for recording at the edge without having to pay a subscription fee.
Most likely, tenants and visitors to your coworking space value agile, modern solutions. In other words, pretty much the opposite of mechanical lock-and-key technology. Thankfully, there is an intelligent security alternative that won’t blow your budget or create renovation chaos. One forecast suggests flexible workspaces in the EMEA region will number around 17,000 by 2022*. Coworking provision is a dynamic market, with increasingly fierce competition for a user base that knows what it wants. The right access solution helps your space stand out from competitors and can deliver real benefits for users and the way they work. Smarter space use Many creative and tech-oriented coworkers demand round-the-clock access. Indeed, according to the Harvard Business Review, the sense of control this flexibility gives is one reason people thrive in coworking spaces**. If you have an access system you can manage remotely, from a PC or smartphone, staff need not be on-site to manage people coming and going 24/7. An intelligent access system can also feed back critical business data in real time. Who is using your space? And when? The more you know, the more likely you will make better business decisions. Safer belongings, slicker incident handling Open, collaborative coworking involves lots of expensive tech and personal items lying around. In the words of one report by commercial property experts JLL, “While coworking spaces are perhaps safer environments to leave equipment unattended than your typical coffee shop, companies still risk a loss of equipment.”*** You can maximise security and minimise space users’ risk with effective access control. Coworkers will not rent desks where intrusion is easy — and you do not want to operate a space with a reputation for petty theft. Imagine the worst happens to a tenant: something unexpected occurs or their valuables go missing. An access control system helps you sort it out quickly and efficiently. Because everyone carries personalised credentials — and you can order instant audit trails using access system software — you quickly find out who went where and when. Investigation is easier. Cutting out cutting keys In any sizeable workspace, standard physical keys are difficult to track without a dedicated key management system. Some types of physical key are relatively straightforward to cut without permission. How much time do you waste when a key is lost or stolen? Changing a standard mechanical lock is time-consuming and expensive. When you install an access control system, one click cancels any “key”, key-card or smartphone credential. You can program and reprogram your door devices as many times as you like. You’ll never change a lock again. Room to grow — or change your mind Around two-thirds of coworking providers expect to expand their workspace in the future****. The good news is wireless access systems like ASSA ABLOY’s SMARTair are almost infinitely flexible; you can bolt on new areas, easily move locks around, or add new sites as you grow. Wireless access control helps you change the security status of a door at any time — or expand your coworking area to another floor cost-effectively. Add a meeting space, connect two offices, no keys or cables needed. Image can be everything Modern workers prioritise convenience and user experience. The latest electronic access systems include an option for them to carry virtual keys on their smartphone, in place of a physical key or key-card. Savvy, smartphone-enabled access will set your space apart from local competitors. Could your coworking space find another revenue stream by hosting weekend or evening events? Because smartphone keys are so flexible, they make it easy for you to issue time-limited access for temporary staff or one-time attendees. When the event is over, their “keys” no longer unlock your doors. You do nothing — it’s all automatic. To learn how to transform coworking space security affordably, download a free coworking access control guide or book a free expert consultation now: https://campaigns.assaabloyopeningsolutions.eu/smartair-coworking?utm_campaign=smartair%20coworking&utm_source=PR
Traffic access control professionals can now set up Delta Scientific MP5000 portable barriers on concrete, asphalt, compacted soils or vegetation in 15 minutes or less to provide certified M50 stopping power. Original models provide M40 protection while the new models stop 15,000 pound (6804 kg) medium-duty trucks traveling at 50 mph (80.4 kph). Significantly, Delta are releasing the first M50 rated portable barrier system to the world at a time when military grade portable protection is imperative. With over 2,000 working units in the field over the past decade, this portable barrier has proven its capabilities to clients throughout the world. Especially important to our government customers and select commercial clients, high security professional can now protect assets that have traditionally required an M50 rating with a portable product. The MP5000 is available in 12-, 16- and 20-foot openings. It is easily towed behind a truck or other vehicle to its location where it sets up in less than fifteen minutes. Once it has performed its duty, it is quickly packed up and towed to its next project. The MP5000 is self contained and battery powered. It has been seen at G20 meetings, presidential inaugurations, papal parades, international embassies, municipal parades, Mardi Gras, stadiums and other civilian locales from the United States to Australia and is especially popular at forward operating military bases from Afghanistan through the rest of the world.
You can work smarter and more sustainably when electronic locks and keys power your security. An electronic locking solution minimizes security risks when keys go missing. With an eCLIQ system from ASSA ABLOY, you can manage everyone’s access from anywhere, at any time — electronically, securely and wirelessly. Based on award-winning CLIQ® access control technology, the eCLIQ system is built around precise locking mechanics and high-end microelectronics. A battery inside each programmable key powers the wide range of programmable cylinders and padlocks — and secures every data transfer. An eCLIQ system is also convenient. Thanks to multiple software options, you manage users’ access rights in a way that suits you best. Authorised key-holders carry a single, battery-powered key programmed with only their cleared access permissions. Low maintenance for technical components you can trust Robust and durable, eCLIQ cylinders are available for a wide range of doors, cabinets, lifts, alarm boxes, machines and entrance gates. Looking after your eCLIQ components is easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. eCLIQ keys are durable, compact, and waterproof (IP67). They are easy to reprogram, enabling temporary and time-limited access permissions for every employee or contractor. AES encryption, rapid processing, and efficient energy management is built into the chip. When a key’s battery runs out, it is easily replaced without tools. Mechanical and encrypted electronic elements work together to make an eCLIQ installation highly resistant to both physical and electronic attack. Easy installation — simple, secure management Managing eCLIQ is straightforward. You can program keys with easy-to-use eCLIQ Manager software: choose between a local software installation or our secure web-based software which manages access rights from anywhere, in the cloud. Security managers can host the Web Manager software on their own or use ASSA ABLOY’s Software as a Service solution. Users can also update their own keys with a range of programming devices, including wall-mounted units. With eCLIQ, missing keys are quickly de-authorised, cutting risks associated with key loss or theft. At any time, facility managers can generate a full audit trail to discover who has accessed which locks. Unlike other electronic access control systems, eCLIQ uses no mains electricity. The microelectronics inside an eCLIQ lock are powered by a standard battery inside every key. Energy-efficient and sustainable, battery power also minimizes disruption when you switch to eCLIQ. Because there is no cabling around the door, you don’t need to schedule invasive, expensive electrical wiring. eCLIQ in action “eCLIQ is more durable, more secure and more efficient than conventional locking systems,” says Stephan Schulz, CLIQ® Product Manager at ASSA ABLOY EMEA. “This evolution of our award-winning CLIQ® technology is already protecting businesses and public services across Europe. A range of sectors and building types — from banks and hospitals to shops and warehouses — have learned eCLIQ provides the control and flexibility their premises need.” For an access control overhaul at University Hospital Frankfurt, managers sought a secure locking system for a new building: 1,100 eCLIQ cylinders and keys provided the solution. Now, with eCLIQ installed, nurses update access rights every morning for the day ahead. This new workflow minimizes security vulnerabilities and keeps everyone safer. Retail banking combines high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs and clearances. Creval’s bank doors across Italy’s Lombardy region are now locked with more than 30 eCLIQ cylinders, putting managers in total control of entrance security. In the unlikely event a key is misplaced, Creval administrators simply delete it from the system. In Germany, eCLIQ locks AMPELMANN GmbH branches and their 2,200 m2 logistics centre, meeting the needs of their decentralized branch organization. Its 8 Berlin branches are staffed by several permanent employees. External service providers like cleaners need access. eCLIQ provides it — safely, securely and without major key-management workload.
Gallagher Command Centre is a powerful access and control solution designed to give you complete site control. Fully configurable to suit the unique needs of your site, Command Centre allows you to define, manage and report on all aspects of your system. Everything that happens on-site is relayed to your Command Centre operators in real time, enabling a swift and appropriate response to security threats. Seamless integration with complimentary security and site management solutions means Command Centre delivers on its promise. You’re in command. Command Centre v8 introduces new Site Plan functionality for greater situational awareness and responsiveness; Broadcast notifications to Mobile Connect for better communication in emergency situations; and Status and Overrides REST APIs for increased integration flexibility.
HID Signo™ is the signature line of physical access control readers from HID Global. The versatility, performance and connected capabilities of HID Signo readers set a new industry benchmark for the most highly adaptable, interoperable and secure approach to electronic access control. Offering an unparalleled breadth of functionality, HID Signo affords security system installers and administrators a simple and effective approach to secure access control for almost any scenario. With support for the widest array of credential technologies — past, present and future — HID Signo is the perfect choice for those looking to make the transition to a secure authentication technology. HID Signo readers transcend the traditional approach to security by being designed to be connected and managed remotely without needing to physically touch each device. This functionality empowers access control systems to dynamically respond as new needs, configurations or threats arise. The HID Signo Keypad Reader 20K is a founding member of the Signo platform. Offering a truly dynamic approach to secure electronic access control, HID Signo Readers are designed to be highly versatile, powerful, and connected for the future. A perfect fit for multi-factor authentication door applications requiring a narrow keypad reader, the HID Signo Keypad Reader 20K supports an unparalleled range of different credential technologies in a variety of form factors including cards, fobs and mobile devices.
HID Signo™ is the signature line of physical access control readers from HID Global. The versatility, performance and connected capabilities of HID Signo readers set a new industry benchmark for the most highly adaptable, interoperable and secure approach to electronic access control. Offering an unparalleled breadth of functionality, HID Signo affords security system installers and administrators a simple and effective approach to secure access control for almost any scenario. With support for the widest array of credential technologies — past, present and future — HID Signo is the perfect choice for those looking to make the transition to a secure authentication technology. HID Signo readers transcend the traditional approach to security by being designed to be connected and managed remotely without needing to physically touch each device. This functionality empowers access control systems to dynamically respond as new needs, configurations or threats arise. The HID Signo Reader 40 is a founding member of the Signo platform. Offering a truly dynamic approach to secure electronic access control, HID Signo Readers are designed to be highly versatile, powerful, and connected for the future. A perfect fit for door applications requiring wall switch mounting, the HID Signo Reader 40 supports an unparalleled range of different credential technologies in a variety of form factors including cards, fobs and mobile devices.
Delta Scientific's new bolt down DSC7090 beam barricade has passed its crash test garnering an ASTM M30/P1 rating. That means the DSC7090 will stop a 15,000 pound (6800 kg) truck going 30 mph (50 kph) with negative 6.3 feet (1.9 m) of penetration. Raising in only five seconds and lowering in merely two seconds yields a fast cycle rate of over 100 vehicles in and out per hour, making the new DSC7090 ideal for higher traffic and population locations. The dual beam design provides coverage of 12 to 24 feet (3.7 to 7.3 m) of roadway with a full 90 degree opening. The new DSC7090 will be used in locations where wide roadways need to be secured from attacking vehicles and in larger parking areas where security systems are needed to deter theft. To meet these heightened demands, the DSC7090 deploys sophisticated touch screen controls and the same logic as used by key government organizations. This includes an LED light package with traffic lights. Also available is a strobe light and audible alarm package. The DSC7090 operates remotely by means of an integral Hydraulic Pumping Unit (HPU) that is buttress enclosed. The HPU can be powered from a local single or three-phase power source. Alternative power options are also available.
HID Signo™ is the signature line of physical access control readers from HID Global. The versatility, performance and connected capabilities of HID Signo readers set a new industry benchmark for the most highly adaptable, interoperable and secure approach to electronic access control. Offering an unparalleled breadth of functionality, HID Signo affords security system installers and administrators a simple and effective approach to secure access control for almost any scenario. With support for the widest array of credential technologies — past, present and future — HID Signo is the perfect choice for those looking to make the transition to a secure authentication technology. HID Signo readers transcend the traditional approach to security by being designed to be connected and managed remotely without needing to physically touch each device. This functionality empowers access control systems to dynamically respond as new needs, configurations or threats arise. The HID Signo Keypad Reader 40K is a founding member of the Signo platform. Offering a truly dynamic approach to secure electronic access control, HID Signo Readers are designed to be highly versatile, powerful, and connected for the future. A perfect fit for multi-factor authentication door applications requiring a narrow keypad reader, the HID Signo Keypad Reader 40K supports an unparalleled range of different credential technologies in a variety of form factors including cards, fobs and mobile devices.
Vanderbilt’s Bluetooth Low Energy (BLE) readers work in conjunction with the company’s ACT Enterprise 2.10 access control software. The new range includes Wiegand and OSDP readers, a contactless door release button, virtual credentials available through an ACT Enterprise license, and a free end-user app for Android™ and iOS™. Vanderbilt’s BLE readers remove the need for a physical credential and replace it with a virtual credential for smartphone devices that will provide customers with a far greater and smoother user experience. Designed with a customer-first mindset, mobile credentials are also extensively secure and are protected with the same grade of data encryption used by banks and hospitals. Customer-first Focus A strong indicator of Vanderbilt’s dedicated customer-focused approach to releasing this progressive technology is, in comparison to other brands in this area, the company is offering a one-off license purchase as opposed to a subscription-based model that would include annual charges per virtual credential. Instead, Vanderbilt’s license models means its customers won’t have any hidden or extra costs and can make significant savings in the long-term. Ease of Use In addition, making use of the BLE readers couldn’t be easier. The end-user simply downloads the Vanderbilt Bluetooth app, and registers for a credential with the system administrator. Here, authorization can be granted both offline and online. The system administrator then reviews and processes the request. This in turn sends the end-user a QR code that they save to their smartphone and link to their app to generate their credential. Then all the end-user has to do is use the credential through the app on their phone when approaching doors with Vanderbilt BLE readers to gain access. Vanderbilt’s BLE readers aim to give a unique user experience with four identification modes for easy management: “Shake to Go”, “Show to Go”, “Manual Button Mode”, and “Hands Free Mode”. They’re also IP65 water-resistant with waterproof electronics, and easy to install and use with enrolment software in ACT Enterprise.
The TT280 Linear Crash Gate will withstand the impact of a 6,803 kg vehicle striking the gate at 80 KPH, suffering no significant damage. The TT280 was created for the highest security applications such as embassies, government facilities and corporate headquarters. The gate can be tailored to match the surrounding decor in a wide variety of architectural treatments. Delta Scientific's sliding security gates are all crash rated. One model, the TT280, pictured here, exceeds every known standard for crash worthiness. Some models operate without contact with the ground across the opening, one is a manually operated swing gate while others operate with rack and pinion drives across V-groove wheel ground tracks while incorporating IR safety beam and safety edges. Swing versions are also available. The clear openings range from 12 to 30 feet (3,657 mm to 9,144 mm). The standard height for all, except the swing gate, is 109 inches (2,769 mm).Add to Compare
Browse Safety & Security Gates
Gate products updated recently
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
Related white papers
How plate reader technology increases your perimeter security
Reducing the cost of video surveillance system deployment and operationDownload
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals
Intelligent Light Detection and Ranging (LiDAR) sensors from Optex protect endangered elephants in Mount Kenya National Park
- Intelligent Light Detection and Ranging (LiDAR) sensors from Optex protect endangered elephants in Mount Kenya National Park
- Oliver Law Security installs Vanderbilt ACT365 in one of Doncaster’s largest gyms
- AMAG safeguards Valdosta regional airport with its Symmetry SR access control system
- Alvarado secures State Farm Arena and Gaylord Opryland Resort with IntraQ-SU5000 optical gate admission turnstile