Browse CCTV Power supplies & batteries

Power supplies & batteries - Expert commentary

Key-centric access management system: providing the highest possible levels of security
Key-centric access management system: providing the highest possible levels of security

In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximise benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realise the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronised to the management terminal. Remote authorised unlocking With the key-centric access management system, remote authorised unlocking can be realised Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorised unlocking can be realised. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.

Wire-free, mobile first and data rich? The future of access control is within almost anyone’s reach
Wire-free, mobile first and data rich? The future of access control is within almost anyone’s reach

The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labour costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming 29th June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organisations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practice, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.

Surge protection for security installations: 2017 saw increased investment
Surge protection for security installations: 2017 saw increased investment

In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive approach to risk mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 and beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond.  Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating security integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.

Latest IDIS news

IDIS announces the release of IDIS Intelligent Video Wall Station that offers affordable and effective centralised monitoring
IDIS announces the release of IDIS Intelligent Video Wall Station that offers affordable and effective centralised monitoring

The new IDIS Intelligent Video Wall Station, designed as a simple plug-in for the cost and licence-free IDIS Center VMS, brings the benefits of video wall services to a wider market, including smaller and mid-sized customers. The new offering makes it easier for businesses to plan, design, configure, and use dynamic video walls. It lets them optimise safety and security, with centralised monitoring for single or multiple-sites, without the traditional price tag.  IDIS Intelligent Video Wall Station Integrating seamlessly with IDIS’ full line-up of network and analogue cameras and devices, as well as third-party technologies, the IDIS Intelligent Video Wall Station uses a single server and network wall controller, to manage up to 12 UHD monitors as standard. The station connects up to 4,096 cameras and lets operators monitor 64 panes simultaneously, including de-warped 360-degree fish-eye video. Now, users can easily customise their monitors to display the most critical video streams and event data, to provide a real-time visual overview. Fast and efficient incident response The new solution combines remote and straightforward configuration with batch firmware updates Advanced features enable a quicker and more efficient incident response, paired with smoother and more dynamic video search, playback, and forensic export. The new solution combines remote and straightforward configuration with batch firmware updates, simple role-based access management, audit trails, and device health monitoring. For customers, this results in increased efficiency and minimal maintenance, delivering on the IDIS promise of a low total cost of ownership (TCO). Designed for 24/7 video surveillance operations And with H.264 and H.265 dual codec fully supported, users can retain their existing and third-party screens, reducing waste and saving budgets, or for upgrades, they can also choose from the IDIS range of reliable, low power consumption monitors, designed for powerful, but economical 24/7 surveillance operations. The IDIS Intelligent Video Wall Station also integrates seamlessly with the enterprise-level IDIS Solution Suite VMS, making it easy to expand or adapt the system, as operational requirements change, giving customers the assurance of a future-proof investment. Dynamic video wall monitoring solution “It’s more important than ever for organisations to enhance situational awareness, while increasing efficiency,” said Andrew Myung, the President at IDIS America. He adds, “The addition of the IDIS Intelligent Video Wall Station delivers the benefits of advanced and dynamic video wall monitoring, without the need to design and build dedicated control rooms, or incur the costs of traditional VMS recurring maintenance agreements, or ongoing device connection fees.”

YMCA protects ‘Heart of England’ facilities with IDIS
YMCA protects ‘Heart of England’ facilities with IDIS

YMCA Heart of England has upgraded video systems across its busy community facilities in Birmingham, Solihull, Rugby, and Coventry with a roll-out of end-to-end DirectIP technology from IDIS. Part of the international YMCA movement, YMCA Heart of England supports local people, including vulnerable groups, with services from housing to youth services. Need for end-to-end system Systems integrator Unison Integrated Technology was asked to replace YMCA’s poorly performing mix-and-match systems, incorporating elements from different vendors, with more efficient end-to-end technology from IDIS, Korea’s largest in-country video manufacturer. YMCA selected IDIS because the single-source model offers advantages including assured compatibility and ease of installation, lower up-front costs, ongoing tech support, and long-term value, all ensuring the lower total cost of ownership (TCO). IDIS was easy to implement due to the true, plug-and-play design, allowing the project to be completed  IDIS DirectIP® solution At the YMCA Birmingham centre, for example, the inefficient video has been replaced by an IDIS DirectIP® solution comprising a 32-channel NVR; 19 Full-HD vandal-resistant IR domes; and 11 Full-HD IR bullet cameras. The IDIS technology was easy to implement due to the true, plug-and-play design, allowing the project to be completed without interruption to day-to-day activity at the centre. 4k NVR box and bullet cameras The 2.8mm fixed lens 2MP dome and bullet cameras, equipped with true WDR and IR LED, were set up to capture crisp, clear images of the building exteriors, entrances and internal corridors, and communal areas day and night. And the powerful 4K NVR delivers throughput of up to 960ips real-time recording and live monitoring with no visible latency. IDIS deep learning analytics The new infrastructure will allow YMCA Heart of England to take advantage of increased video resolutions in the future Unison also opted to replace the entire legacy cabling, upgrading to a future-proofed Cat6. This new robust infrastructure will allow YMCA Heart of England to take advantage of increased video resolutions in the future, making it easy for them to adopt powerful yet affordable IDIS Deep Learning Analytics for a range of automated detection functions that trigger highly accurate alarms and notifications. The new solution is simple to use, with the license-free IDIS Centre VMS giving staff and authorised volunteers an intuitive interface to manage devices, benefitting from high-performance live monitoring and rapid retrieval of footage, while easily configuring user permissions to provide team members with appropriate role-based access rights. Cost-effective upgrade “YMCA Heart of England was so impressed with the results we delivered at their Birmingham centre they then asked us to upgrade all their premises across the whole region,” says Matthew Rodden, Director, Unison Integrated Technology. The entire project was completed in just four weeks. And reducing waste and costs further, several third-party legacy cameras were retained to operate seamlessly under the IDIS Centre VMS. “We are delighted that IDIS technology has proved to be the best solution for YMCA, with competitive up-front pricing and the low ongoing lifecycle costs,” says Reiss Spear, Sales Manager, IDIS Europe.

IDIS brings Solution Suite (ISS) version 3.5 with increased situational awareness and response
IDIS brings Solution Suite (ISS) version 3.5 with increased situational awareness and response

IDIS has released IDIS Solution Suite (ISS) version 3.5, its most powerful enterprise-class VMS yet. New features and service modules are designed around increased situational awareness, efficient response coordination, and sped-up investigations. A new Real-Time Transport Protocol (RTP) service enables seamless and stable video and voice relay to third-party devices and software without an SDK or API, increasing system flexibility and helping security teams coordinate responses to threats and incidents. Real-time monitoring Improving real-time monitoring, text-to-speech allows operators to pre-set verbal multi-lingual notifications to pre-determined events. Operatives can now also benefit from real-time pop-ups based on the GPS location of a triggered alarm, providing enhanced wide-area awareness from cameras ranging from a 10 to 100 kilometre radius. ISS v3.5 also includes instant synchronised playback, which presents operators with precisely time-synched screen views of video streams across single or multiple sites, removing the need for manual configuration, and reducing stress and complexity for operators, particularly during time-critical investigations. And the new Event Notification Center enables centralised control of multiple audio devices, giving security teams mass-and targeted-communications capabilities, which can help them to pre-empt security or safety breaches, or to issue warnings in the event of an emergency. Enterprise-class streaming IDIS person match speeds up investigations by extracting a person’s characteristics from multiple stream IDIS person match speeds up investigations by extracting a person’s characteristics from multiple streams to present a clear timeline of events and last known locations. All the new features work in harmony with enterprise-class streaming, recording, and administration functionality, and come with a fair pricing structure - no annual licence fees or OPEX burden - to make ISS significantly more affordable than traditional enterprise video management software. As a result, IDIS Solution Suite continues to cut annual costs for customers, making advanced video management available to more users, including medium-sized organisations and those with single sites. A modular solution, it allows users to choose the right service modules to meet their unique security, operational and compliance needs, meaning customers never pay for functionality they don’t use. Multi-layered failover The choice of modules includes federated architecture to manage an unlimited number of devices and sites using centralised and local command and control; multi-layered failover and redundancy offering protection against a range of fault conditions; video wall multi-stream management, and highly accurate IDIS Deep Learning Analytics (IDLA). “With our latest version of IDIS Solution Suite, we are making it easier than ever for users to manage an unlimited number of devices and sites, giving them enterprise-performance without the usual associated price tag or ongoing lifecycle costs,” says Andrew Myung, President, IDIS America.