Power supplies & batteries - Expert commentary

Key-centric access management system: providing the highest possible levels of security
Key-centric access management system: providing the highest possible levels of security

In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximise benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realise the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronised to the management terminal. Remote authorised unlocking With the key-centric access management system, remote authorised unlocking can be realised Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorised unlocking can be realised. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.

Wire-free, mobile first and data rich? The future of access control is within almost anyone’s reach
Wire-free, mobile first and data rich? The future of access control is within almost anyone’s reach

The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labour costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming 29th June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organisations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practice, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.

Surge protection for security installations: 2017 saw increased investment
Surge protection for security installations: 2017 saw increased investment

In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive approach to risk mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 and beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond.  Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating security integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.

Latest Vanderbilt Industries news

Vanderbilt’s ACT365 integration helps protect marina facilities in Danish city
Vanderbilt’s ACT365 integration helps protect marina facilities in Danish city

In the beautiful marina in the Danish city of Vejle, Vanderbilt’s ACT365, a cloud-based access control and video management system, was recently installed. The brief The marina wanted an access control system that could integrate with their booking system, Harba. Solutions provided There are 750 members with boats in the Vejle marina, and through the Harba booking system, they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. This is done by simply typing their PIN into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed every month via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Why choose Vanderbilt? Vanderbilt’s ACT365 readers are made of robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage-free relay contact. ACT365 has: A modern and user-friendly design A limitless number of users The possibility for short-term access Both RFID tags and smartphone access availability. Main takeaway For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit cards to pay for the use of the marina facilities.  Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.

Xenon Fire & Security completes Vanderbilt’s ACTpro & KONE integration to reduce congestion in Dublin office building
Xenon Fire & Security completes Vanderbilt’s ACTpro & KONE integration to reduce congestion in Dublin office building

Xenon Fire & Security recently completed an integration between Vanderbilt’s ACT access control and KONE, a globally renowned company in the lift and escalator industry. The project was carried out on behalf of a Dublin City-based client, in one of their flagship properties - a 7-storey, multi-tenancy office blocks, located in the heart of the city quays in Dublin, Ireland. The building includes 6 upper floors and a basement area. The reason behind the integration was to attain greater efficiency in accommodating the large footfall in the office building, during peak times. This included reducing waiting times at lifts. ACT access control - KONE integration As Xenon Fire & Security had previously carried out this same integration work between both ACT and KONE in another building, located in Dublin city, they were more than confident that ACT would perfectly meet the client's standards and expectations. The installation and integration of ACT and KONE is much more straightforward The installation and integration of ACT and KONE is much more straightforward. Unlike with a traditional hardwired elevator control, there is no cabling required, as the ACT software talks directly to the KONE server, via the KONE API. Integration offers multiple benefits Commenting on the project, Dermot Ryan, the Contracts Manager at Xenon Fire & Security, said “The system works as intended. It makes access and egress of the building more user friendly and reduces congestion, and queues. Vanderbilt was there to help and advice at all times, throughout the installation process.” Michael Moyna is the Senior Product Manager at Vanderbilt and is responsible for the development of ACTpro. He said, “The ACTpro integration with KONE has many benefits, such as efficient transportation of people to their destination, especially during peak times. Rules can be customised to individual needs, for example, janitor may require a large elevator car.” No cabling required in installation Michael Moyna adds, “Installation and integration of KONE and ACTpro is now much more straightforward, because there is no cabling required, as with traditional hardwired elevator control, since the ACTpro software talks directly to the KONE server, via the KONE API.”

Vanderbilt's ACT365 integration helps protect marina facilities in Danish city
Vanderbilt's ACT365 integration helps protect marina facilities in Danish city

The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. Harba booking system There are 750 members with boats in the Vejle marina, and through the Harba booking system; they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed every month via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Access control readers ACT365 has a modern and user-friendly design and a limitless number of users ACT365’s readers were well-suited to this installation because they are made of a robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage-free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. Self-service terminal For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit cards to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.