Safety & Security Gates(22)
Traffic access control professionals can now set up Delta Scientific MP5000 portable barriers on concrete, asphalt, compacted soils or vegetation in 15 minutes or less to provide certified M50 stopping power. Original models provide M40 protection while the new models stop 15,000 pound (6804 kg) medium-duty trucks traveling at 50 mph (80.4 kph). Significantly, Delta are releasing the first M50 rated portable barrier system to the world at a time when military grade portable protection is imperative. With over 2,000 working units in the field over the past decade, this portable barrier has proven its capabilities to clients throughout the world. Especially important to our government customers and select commercial clients, high security professional can now protect assets that have traditionally required an M50 rating with a portable product. The MP5000 is available in 12-, 16- and 20-foot openings. It is easily towed behind a truck or other vehicle to its location where it sets up in less than fifteen minutes. Once it has performed its duty, it is quickly packed up and towed to its next project. The MP5000 is self contained and battery powered. It has been seen at G20 meetings, presidential inaugurations, papal parades, international embassies, municipal parades, Mardi Gras, stadiums and other civilian locales from the United States to Australia and is especially popular at forward operating military bases from Afghanistan through the rest of the world.
Featuring a 7” full-colour, high-resolution touchscreen, TSP-3 provides quick and secure access to arm/disarm/home arm the system and an intuitive way to operate the security system. Connected to the control panel via Wi-Fi network, TSP-3 displays an overview of the system with its intuitive graphic user interface. By gaining control over security and home automation sensors in the system, TSP-3 enhances convenience and comfort level of living. Built-in 2 megapixel front camera is able to take photos, providing with the basis for algorithm analysis to detect and prevent potential harms. With adjustable privacy shutter in front of the camera, TSP-3 offers another layer of peace of mind for users. In addition, TSP-3 can be wall-mounted or placed on the table with its stand. With its flexibility of installation and the capabilities of security and home automation control, TSP-3 provides an effortless way for users to gain access control, as well as an easier, smarter way of living. Features 7” high resolution colour graphic touchscreen to control devices in the system User-friendly and intuitive interface Built-in 2 megapixel camera Adjustable privacy shutter Built-in microphone and speaker Home automation capabilities Take photos for algorithm analysis to detect and prevent potential harms Flexible installation options of wall mounting or desktop deployment Compatibility with video doorphone for live answer (available soon) Suitable for residential and commercial premises Specifications Display: 7” LCD Wi-Fi: 802.11 b/g/n 2.4GHz Power Source: 5V/1.4A, USB adapter Backup Battery: 3.7V 2500mAh Lithium-ion polymer battery Backup Battery Life: 4 hours* Camera: 2 megapixel camera Audio: Built-in microphone and speaker Operating Temperature: -10°C to 45°C (14°F to 113°F) Operating Humidity: Up to 85% non-condensing Dimensions: 195 mm x 114 mm x 17 mm *Note: Actual battery life may vary due to product settings, operating environment and usage.
ASSA ABLOY access control software can do the hard work, while you benefit from upgraded IT infrastructure, high availability and total management flexibility. The CLIQ® Software as a Service (SaaS) solution gives your access system the highest levels of security and scalability, saving you time, money and stress in the process. That’s why so many companies with sensitive assets trust CLIQ® SaaS. CLIQ® is a mechatronic locking system which combines the strengths of high-end mechanical and electronic security. Physical security is maximised with a range of electromechanical cylinders and padlocks, operated with intelligent, programmable, battery-powered keys. The intuitive CLIQ® Web Manager software supports efficient workflow management, enabling you to filter access to specific locks according to your precise needs. You can create individual schedules for users, doors or audit trails. With a few clicks, a CLIQ® key or system can require regular key revalidation, making it much safer to issue time-limited access to contractors or visitors. The software works securely to help you administer access control in the most efficient way for your site, in a self-managed IT environment or with ASSA ABLOY’s CLIQ® SaaS offering. “We designed our SaaS offering to remove the added strain of managing IT infrastructure at the CLIQ customer’s side,” says EMEA DAS Technical Support & operations Director, Thomas Akerberg. “Knowing our flexible, secure architecture has you covered leaves you free to concentrate on security management, rather than IT. “Our SaaS solution makes budgeting more predictable and removes the need to hire additional in-house IT support and maintenance teams. You always know ahead of time how much resource to allocate and you can scale infrastructure up or down instantly.” With ASSA ABLOY’s CLIQ® SaaS solution, you benefit from complete redundancy in data storage, meaning you meet compliance requirements without stress. We offer round-the-clock support, maintenance and incident reporting as standard, with Service Level Agreements delivering up to 99.5% availability. Your CLIQ® software is always up to date — a major benefit for cyber-security resilience, according to one recent market study*. Customers also rate SaaS above internal cloud or server solutions for flexibility, scalability, cost-effectiveness and suitability for managing access control in SMEs, according to survey data quoted in the same report. “Because they spend less on server hardware, less on staff and fewer hours ensuring software is up-to-date, our CLIQ® SaaS customers save time and money,” adds Thomas Akerberg. *: see https://campaigns.assaabloyopeningsolutions.eu/wacreport2018
Making business more sustainable is a growing challenge for us all — and made even tougher for any business with dispersed sites or a mobile workforce. Mileage mounts up when workers return to base to collect keys or update their access rights. Car and van use eat into budgets and produce harmful carbon emissions. Fortunately, there is a solution. Despite advances in car engine efficiency, mobile workers use more fuel and increase your company’s carbon footprint. You will make a business more sustainable quickly if you reduce the mileage they travel. Yet reducing miles while maintaining security is not easy, if you rely on mechanical keys to lock remote sites. CLIQ® Connect eliminates the need for workers to return to headquarters to collect or return a mechanical key. With CLIQ® Connect, everyone carries their own programmable CLIQ® key and keeps its access rights up-to-date on the move with just a smartphone — meaning fewer miles driven and less money wasted on unnecessary fuel. It’s an easy solution to becoming more sustainable. Security meets sustainability Part of the trusted CLIQ® access control ecosystem, CLIQ® Connect makes an immediate operational impact. The wire-free locking system is based on multiple mechatronic cylinder formats and programmable electronic keys. With CLIQ® Connect, a key-holder no longer updates their access rights physically in person by returning to base, nor even moves to the nearest programming device. All they need is the CLIQ® Connect app and a Bluetooth connection. It’s simple, agile and more sustainable. It saves fuel and cuts emissions instantly. The app pairs your programmable CLIQ® Connect key, via an encrypted connection, with the CLIQ® Web Manager. To change a key-holder’s access rights or key validity, a system administrator accesses the CLIQ® Web Manager — from anywhere — and updates it. The system is managed easily by secure cloud-based software interfaced with the app. A key-holder makes a Bluetooth connection between their CLIQ® Connect key and the app to instantly update access permissions or key validity securely. There is no travel involved and zero fuel consumption. A recent Future of Fuels report concludes: “Fuels create many sustainability impacts and addressing them should be a high priority for companies.”* CLIQ® Connect keeps your business moving in the right direction. How much wasted fuel and unnecessary energy use could you save by switching to CLIQ® Connect? To find out, download a free Environmental Friendly Checker at https://campaigns.assaabloyopeningsolutions.eu/cliq-sustainability
Gallagher Command Centre is a powerful access and control solution designed to give you complete site control. Fully configurable to suit the unique needs of your site, Command Centre allows you to define, manage and report on all aspects of your system. Everything that happens on-site is relayed to your Command Centre operators in real time, enabling a swift and appropriate response to security threats. Seamless integration with complimentary security and site management solutions means Command Centre delivers on its promise. You’re in command. Command Centre v8 introduces new Site Plan functionality for greater situational awareness and responsiveness; Broadcast notifications to Mobile Connect for better communication in emergency situations; and Status and Overrides REST APIs for increased integration flexibility.
When we say Code Handle is an easy way to add PIN security to any interior door, we mean it. From the minute you open the box, Code Handle makes upgrading internal door security simple. Code Handle is a secure handle with a built-in PIN keypad. It adds reliable electronic security to any sensitive interior door. With Code Handle, you don’t need an expensive access control system. There are no cumbersome keys to carry or track. Its secure PIN code makes sure only authorised people can unlock your door. Press a PIN code on the handle’s keypad and the door opens. Close the door and your Code Handle locks itself automatically behind you. Best of all, Code Handle is simple even for the inexperienced to install. Easy installation, easy PIN change, easy security Fitting your Code Handle is easy. There’s no wiring, no specialist tools, and no need to drill any new holes. All it takes is two screws to fit your new Code Handle to almost any interior door, from 35mm to 80mm thick. An optional distance ring enables installation on even thinner doors. With Code Handle, there is no need to cable the door or connect it to the mains. Code Handle adds electronic security without an access control system. You don’t even need to change your door cylinder. Just slot in two standard batteries, secure your Code Handle on the existing cylinder, and your security is upgraded. When you install Code Handle, you set your own Master Code and can choose up to 9 additional user PINs (4–6 digits). Don’t worry if an employee leaves or changes jobs: you can amend or remove their PIN in seconds, without removing your Code Handle from the door. Code Handle keeps sensitive files, personal belongings and valuable stock separated and secure from the public — and from the moment you open the box. Why did we make the Code Handle so simple to install? Because nobody wants a straightforward security upgrade that needs an expert to fit. Visit https://campaigns.assaabloyopeningsolutions.eu/codehandle to learn more.
As building security becomes smarter, the need for electronic access control systems spreads further. Wired access points and security doors have long been the backbone. Yet at the same time, even buildings with extensive electronic systems leave mechanically locked doors unmonitored and unguarded — and certainly not “smart”. Mechanical locks cannot be connected. Thankfully, the latest generation of wireless locks can replace them easily and integrate them seamlessly within almost any access system. A recent industry survey — cited in the “Wireless Access Control Report 2018”, from ASSA ABLOY and IFSEC Global — finds integration is an increasing concern. Over 90% of industry professionals polled for the report suggest integrating security systems with each other (and with other smart building systems) has increased in importance in the last few years. Integration is a recurring theme in conversations among professionals. For 53% of survey respondents, easy integration with CCTV, alarms, time and attendance, lighting and HVAC would make them interested in upgrading to a particular product — more than any other factor. Forty-three percent said easier integration with existing access control systems would make them more likely to upgrade. But why the focus on integration? What are the advantages? Why integrate? Fewer security interfaces are easier to support and so require less training. Integration can also enhance the experience of building occupants. One credential opens the car park, then the building, and accesses their laptop and buys lunch in the café. Integration across the business also means security systems — and security teams — contribute to business efficiency, not just the protection of people, premises and other assets. Integrate HR systems with your access control system, for instance, and smart access cards can be automatically revoked when people leave the organisation, reducing overheads and even headcount. A majority of those polled for the “Wireless Access Control Report 2018” believe it very important (58%) that access control supports open standards in order to be flexible and future-proofed. A huge majority (91%) consider it at least somewhat important. Future-proofing is high on any list of procurement criteria. Will your system accommodate a changing business and the evolution of functions within it? Can you extend access control with components that contribute to, rather than detract from, the flexibility of all your building systems? The solution to extend access control Expanding the coverage of traditional locks can be expensive and intrusive. But one fast, easy and cost-effective alternative enables you to forget about keys and the hassles of key management: wireless devices like Aperio®, battery-powered locks with integrated RFID-readers. The aforementioned report cites growth forecasts for the wireless access control market of around 8% annually through 2025. The ease and cost-efficient integration wireless offers is surely driving this growth. Because Aperio® has an open architecture, it is flexible and modular, so those who already have wired access control and want to add more doors to their existing system find wireless is the solution. Aperio® wireless locks integrate with security systems from over 100 different OEMs worldwide, for new installations or to upgrade an existing system. Integration is seamless, extending the reach of an existing system with future-proofed devices. Security administrators operate the new Aperio®-equipped doors from the same interface as the installed system. Site users carry a single smart access card for all doors, and other functions like canteen payments or library loans are just as easy to integrate. What if your security system uses mechanical keys, without electronic access control? Wireless locks like Aperio® can also be the right solution. Battery-powered Aperio® RFID-equipped cylinders, escutcheons, handles and locks can be fitted as a new access control system, or extend an existing installation by linking new doors to the same system wirelessly. There’s no need for staff to swap their key-cards, nor for anyone to carry more than one credential. Aperio® locks work within almost every major access control ecosystem on the planet, from over 100 different manufacturers. They are energy-efficient, with batteries lasting an average of 40,000 cycles (typically 2 years) before they need replacing. “It’s easy to start the upgrade process,” says Matthias Weiß, Aperio® Product Manager at ASSA ABLOY EMEA. “Your security or facilities manager only needs to contact their regular access control provider to find out if they offer Aperio®. We can upgrade nearly any system.” Aperio® integrates access control — quickly and painlessly Installing wireless locks is also more cost-effective than hard-wiring more doors, because there’s no cabling or invasive building work around the door. Changing door hardware is unnecessary. For example, it’s fast and easy to switch a mechanical handle for an Aperio® wireless handle with integrated RFID reader, to bring more doors into an access system. (Installation takes mere minutes: see https://youtu.be/lr6Sw95qqm8) Aperio® devices with built-in RFID readers fit almost any opening or security level. Aperio® locks protect both exterior and interior doors, from fire and escape route doors to meeting rooms, labs and offices; wooden, glass or aluminium doors are no obstacle. The portfolio includes cylinders, escutcheons and complete locks for security doors, plus a revolutionary new wireless handle with integrated RFID reader, which recently won Intersec’s Access Control Product of the Year. Aperio® locks are compatible with all common door profiles: Euro, French, Finnish, Scandinavian and Swiss. Integration with your existing system can be Online or Offline, or both. Learn more about Aperio®, visit https://campaigns.assaabloyopeningsolutions.eu/aperio
Fermax proposal is called Wi-Box, a small device (80 x 80 x 20 mm) that allows any old VDS equipment to connect to the home’s WiFi and transfer its functions to a mobile phone. Wi-Box is added to the existing installation and allows the VDS equipment to connect to the home WiFi network through the home router. Security, comfort and mobility for the user. And for professionals, a new business opportunity. According to Fermax’s calculations, there are currently more than three and a half million VDS equipment installed in the world. VDS is a reliable, successful and stable technology because of its characteristics and for a long time, it has been the favourite of installation companies. Today, the VDS installations continue to offer the final customer excellent performance. That is why Fermax proposes to give a new digitalized life to the old VDS equipment thanks to Wi-Box. For families who already have a VDS terminal at home, the advantages are more than obvious: extra comfort, security and mobility that are very much appreciated by today's digital citizens. For installation companies, Wi-Box means the opportunity for a new business, allowing them to return to customers' homes and offer new solutions to property owners. It is offered at a very attractive price and it works with the VDS audio and video door entry models that Fermax has put on the market over the last few years.
Akuvox is the leading IP Door Entry Phone (DEP) solution within the Vanderbilt portfolio tailored to support both standalone and Vanderbilt’s access control system support scenarios. The Akuvox portfolio has a range of solutions to cover needs for single occupancy buildings, or multi-tenant office and residential buildings. With cloud and mobile apps, Akuvox offers a cloud intercom system that allows for smartphone video calling and unlocking, the issuing of temporary keys via QR Code (R29 Only), and a centralized remote property maintenance system. Akuvox: Convenience By being able to easily monitor door and gate entrances, Akuvox increases security on residential and commercial premises. Cloud and mobile apps also add to the product’s ease of use and convenience, while overall the solution setup can free up the productivity of personal by no longer needing them to be stationed at entrances. More importantly, you can speed up your response time to visitors and deliveries that require access. Installer USP's From an installer’s point of view, Akuvox’s solutions are straightforward to install. Simply buy one door station, one internal monitor, and a POE switch, and you have an intercom solution for your building! In addition, with every Akuvox product, wiring is made easy thanks to their Screwless Terminal Blocks. Moreover, installers and property managers can utilize the Akuvox cloud for multiple sites from the online platform. The Vanderbilt Akuvox portfolio contains: The R29 smart IP video doorphone The R27 video doorphone The R20a video doorphone The IT82W audio and video communication interface The C315 audio and video communication interface Simply shop online on Vanderbilt's new webshop to discover more about each of these top-of-the-range products.
Increasingly, access control is viewed as a wireless technology, as one recent market report* shows. Based on a 2018 survey of senior security professionals, the “Wireless Access Control Report” reveals almost 4 in 10 access control systems include wireless technology in their set-up. At places without wireless devices protecting their doors, twice as many already plan to add wireless locks as do not. The myth that wireless technology is not adapted to access control is rapidly fading away. Wireless access control upgrades security without breaking the bank. Wireless RFID locks are much cheaper to install than hard-wired doors, because there’s no cabling around the door. They are also cheaper to operate, because they use no mains electricity. Wireless devices easily accommodate modern credential solutions such as virtual keys on smartphones, too. Now available globally for a decade, Aperio wireless devices from ASSA ABLOY protect both exterior and interior doors, from fire doors to meeting rooms, labs and offices. Ten years of innovation investment have enhanced the security and usability of Aperio® hardware and firmware — and the range of applications Aperio® finds in businesses across Europe. The Aperio® product range includes battery-powered cylinders, escutcheons and complete locks for security doors which transmit door status. An Aperio® server cabinet lock protects servers onsite or in a co-located data centre. Product design has also become a focus for refinement, with the new Aperio® H100 Electronic Handle. It packs the flexibility of Aperio® wireless access control into a slim door handle — “a brilliant example of product design,” one awards panel judged. Aperio® integration can be Online or Offline, depending on your needs. Whichever you choose, a single interface controls any existing hard-wired doors as well as the Aperio® devices. Online integration is via Wiegand, RS485 or IP communication hubs which connect up to 16 Aperio® devices to the admin software. Aperio® also supports the leading industry standard for Offline integration, OSS Standard Offline. Aperio® locks are compatible with all major door profiles, including Euro, French, Finnish, Scandinavian and Swiss. Ten years of trust... in all kinds of industries and security systems Businesses and buildings serving many different industries turn to Aperio® to expand the reach of their access control — wire-free. Universities in Birmingham (UK), Lund (Sweden), Hamburg (Germany) and many other cities remove the expense and hassle of lost keys when they control access with Aperio® devices instead of mechanical locks. Hospitals and health centres from Ghent to Grenoble protect patients, confidential records, drug storerooms and more with Aperio® wireless devices. At H-Farm, a campus-style business innovation centre in northern Italy, Aperio® handles, security locks and escutcheons integrate seamlessly with an AXIS access control system. To serve customers better with the best wireless locking devices available, over 100 different access control and security manufacturers now integrate Aperio® locks seamlessly with their systems. The fast-growing list of Aperio® partners includes market leaders like Nedap, Gallagher, AXIS, Genetec, Lenel, ACS and many, many more. Because it is built on an open platform and compatible with all standard RFID technologies, Aperio® also streamlines building management. At student accommodation provider CROUS Montpellier, Aperio® integrates with payment systems as well as access control, for example. It offers a single-card solution to replace mechanical keys. A decade since launch, Aperio® access control technology continues to provide flexible, future-proofed, wireless security in diverse industries and premises. At schools and universities; hospitals, health centres and care homes; warehouses, factories and corporate headquarters; sports venues and concert halls, Aperio® makes buildings (and the people who use them) safer. What could the next 10 years bring? Learn more about Aperio®, visit campaigns.assaabloyopeningsolutions.eu/aperio *: see https://campaigns.assaabloyopeningsolutions.eu/wacreport2018
A century after the ABLOY brand invented disc detainer technology, the company is still reimagining the future of security. In Finland, the ABLOY PULSE ecosystem now delivers highly encrypted, electronic access control via self-powered cylinders, padlocks and electronic keys — with no need for batteries or any external power supply. A thirst for sustainable solutions grows in all walks of life — including security. In a recent survey for ASSA ABLOY’s “Wireless Access Control Report”* around three-quarters of industry leaders report sustainability as a growing influence on procurement decisions. Almost half of survey respondents pointed to greentech innovation like energy harvesting as a potential future solution. “While the self-powered mechanism doesn’t generate much power,” notes the Report, ”electronic door readers and wireless locks don’t actually need much power. They are inactive, and can power down, for long periods. Their only task — reading card credentials and releasing the lock — is completed in less than a second and at the expense of minimal energy.” With PULSE key-based access control, ABLOY is already delivering this sustainable future. Reliable, sustainable security PULSE locking is beautifully simple. A user inserts their PULSE key. The power generated by inserting and turning powers the lock’s encrypted electronic access control features. If the key is authorised, the lock opens. Cloud-based access control software ensures administrators can program PULSE keys with just the right access permissions. Users carry one PULSE key programmed with their cleared permissions, no matter how many doors they need to open. “With PULSE, sustainability, security and user-friendly operation work side-by-side,” says Kimmo Hirvonen, ABLOY PULSE Product Manager at Abloy Oy. “PULSE does everything you need from a 21st-century electronic access control system. And does it sustainably.” “At ABLOY we have been creating the future of access control for over a century. Energy harvesting technology is the latest chapter.” PULSE in action PULSE is easy to install, because its locks require no major adjustments to doors. An installer just switches the existing cylinder for a PULSE cylinder. No wires and no batteries means PULSE is cost-efficient as well as sustainable. PULSE is perfectly adapted to any multi-resident housing block. A single PULSE installation can include a wired reader to secure communal doors, key-operated locks for apartment doors, and padlocks for storage rooms. Residents carry a single, programmable key to open every lock they need. For block security managers, it is easy to investigate incidents because cloud-based software logs events and can generate audit trails for any lock or key. PULSE keys and cylinders are reusable and reprogrammable, so managing resident turnover is simple, too. Maintenance is minimal, because PULSE products are durable and weather-resistant. To learn more about PULSE visit www.abloy.fi/PULSE * Download a free copy of this 22-page report at https://campaigns.assaabloyopeningsolutions.eu/wacreport2018
Hikvision is launching its new 2-Wire modular IP Intercom for retrofitting in multi apartment buildings. This is an extension solution to already successful 2-Wire kits that are mainly used for small residential houses, using the same housing and components from the recently launched 2nd Generation IP intercom technology, also ‘inheriting’ it’s modular nature, which makes it flexible for any scenario. The Intercom delivers all the benefits of IP surveillance through just two wires – data and power. This makes it simple to install, saving time and cost - great for retrofitting and modernising large residential and office building projects. Full HD images give a clear picture of the door area on your indoor station. IR provides excellent night vision, and the inclusion of WDR (wide dynamic range) means there’s no problem if the camera is faced with direct light from outside. All in all, your indoor station screen will give you a clear overview of your doorstep, and a mobile app means you can manage entry from anywhere you like. The modular nature of the Intercom gives the system massive flexibility, with a range of modules to choose to build the right system for the scenario. This can also be integrated with video surveillance, access control and intrusion systems so it can be a seamless part of any total security solution. The 2-Wire system can be combined with IP intercoms through a network that is connected to power and data distributors while also sharing common accessories and modules. Other features include: Great looking image from camera that can be recorded in Video Surveillance system High quality of audio even on noisy streets Remote control via common mobile application Simplified configuration Optional wall or flush mounting installation Common Hikvision software and application Up to 16 additional cameras can be observed at the indoor station. Typical applications for this new product will be in modernization of residential apartment buildings, school buildings and office buildings. “This extension to our intercom range is a great example of Hikvision as a smart home security solution provider, combining intercoms with Video Surveillance, Access control and intrusion”, says Cenek Maly, EU Channel Product Manager at Hikvision, “It brings a variety of modern functions such as mobile app control, high resolution images delivered at high speed, and audio quality to bring residential intercom systems to the next level.”
Style, intelligence and robustness come together in the new SMARTair® Knob Cylinder from ASSA ABLOY. Part of the SMARTair® access control system, this intelligent device with integrated RFID reader is now more resistant to attack. It comes in elegant, contemporary finishes and colours, upgrading aesthetics and functionality in equal measure. It quickly upgrades almost any existing regular door to an access-controlled door — without any drilling. The new Knob Cylinder fits seamlessly and flexibly into a SMARTair® system, providing advanced, user-friendly access management designed to make any workplace work better. If you need to monitor and control who goes where, and when, you need the new SMARTair® Knob Cylinder. The Knob Cylinder is battery-powered and works with every SMARTair® access management option, so you can choose between online (“real-time”), offline, update-on-card and standalone management — or combine more than one system at the same site with the same software interface. Upgrading to the new Knob Cylinder is simple: just replace an existing mechanical cylinder with the new device. No complex installation or drilling stands between you and safe, reliable, flexible SMARTair® access control. Glass, wooden or aluminium doors — Scandinavian, Euro and many other profiles — present no problem. A modern, mobile solution The Knob Cylinder works with all standard proximity technologies, including MIFARE®, DESFire and iCLASS®, and also offers another new way to open your doors — with the SMARTair® Openow™ mobile app. With Openow™, users no longer carry separate credentials; just their smartphone with secure virtual keys stored inside. There’s no longer any need to collect or validate an access card to open authorized doors locked with the new SMARTair® Knob Cylinder. With Openow™, if you have your phone, you are already carrying your keys. Modern and mobile-ready, the SMARTair® Knob Cylinder is built to make your building smarter. Its robust design, redefined aesthetics and easy installation are perfect for securing offices, business headquarters, conference and meeting rooms.
True to their commitment to make the best technology available to the mainstream market, FERMAX launched DUOX VEO WiFi and DUOX VEO-XS WiFi door entry monitors with integrated Internet connectivity, which allows calls at home to be diverted to the user's smartphone or tablet. All you need is a DUOX VEO or VEO-XS WiFi monitor installed in the house, then download the free BLUE app and pair it to your mobile device. Comfortable and easy communication, whether you are at home or not. And for individual homes, the DUOX VEO WiFi and DUOX VEO-XS WiFi monitors are also available as KITS: all-in-one solutions with all the necessary elements for the installation.
The TT280 Linear Crash Gate will withstand the impact of a 6,803 kg vehicle striking the gate at 80 KPH, suffering no significant damage. The TT280 was created for the highest security applications such as embassies, government facilities and corporate headquarters. The gate can be tailored to match the surrounding decor in a wide variety of architectural treatments. Delta Scientific's sliding security gates are all crash rated. One model, the TT280, pictured here, exceeds every known standard for crash worthiness. Some models operate without contact with the ground across the opening, one is a manually operated swing gate while others operate with rack and pinion drives across V-groove wheel ground tracks while incorporating IR safety beam and safety edges. Swing versions are also available. The clear openings range from 12 to 30 feet (3,657 mm to 9,144 mm). The standard height for all, except the swing gate, is 109 inches (2,769 mm).Add to Compare
Browse Safety & Security Gates
Gate products updated recently
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
- Panasonic helps reduce hooliganism and increase safety at Danish Superliga football club Brøndby IF
- Carlisle Support Services receive a 3 year contract to provide manned security services at AELTC
- 33 Congress Street in Boston installs custom-designed Boon Edam revolving doors and turnstiles
- Gallagher secures Merthyr County Council from intruder attacks with its monitored pulse fence system