Access Controllers
OpenEye, the cloud video platform, and Alarm.com have completed a joint integration to offer businesses more robust security and intelligence solutions. The cloud-to-cloud integration links OpenEye’s powerful cloud-managed video platform, OpenEye Web Services (OWS), with Alarm.com’s cloud-based smart business security platform to provide users of both companies’ solutions with enhanced video verification capabilities and advanced real-time alert notifications. The integration...
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that the Security Industry Association's (SIA) approved Open Supervised Device Protocol (OSDP), which was recently made a global standard by the International Electrotechnical Commission (IEC) and can be used by any manufacturer, has become a major requested feature on Farpointe's mobile, contactless smart card and proximity readers. OSDP provides interoperability among various companies’ access...
Security dealers are often faced with finding ways to differentiate their companies and add tangible value to the services they provide. Now Connect ONE® dealers can offer expanded reporting and documentation to their customers through SmartTest™, an embedded feature of the award-winning service and management platform from Connected Technologies. SmartTest details all interaction with support documentation on exactly what was performed – so customers know what they are pa...
Incedo access management from ASSA ABLOY Opening Solutions is created for businesses on the move, who need a flexible security solution which grows with them. Now security managers managing an Incedo Business solution can work remotely, too — while maintaining complete control over their building’s access points. Incedo connects security software and hardware within a single, seamless platform. To accommodate the restless change and disruption of modern business life, Incedo enables...
Boon Edam Inc., a global front-runner in security entrances and architectural revolving doors, announced that Bothwell Exchange, a new construction commercial space in Glasgow, Scotland, has installed an array of Speedlane Slide optical turnstiles in the lobby and two TQA automatic revolving doors at the main entrance to control access without impacting the building’s high traffic needs. Meets tenants’ connectivity needs Bothwell Exchange is a 9-story, 155,000 sq. ft. commercial bu...
Device Authority, a global front-runner in Identity and Access Management (IAM) for the Internet of Things (IoT), announced KeyScaler for Azure Sphere in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Azure Sphere brings together Microsoft’s expertise in cloud, software and silicon to provide a security foundation and connectivity to create intelligent secure products and accelerate the adoption of IoT at scale. Device Authority&rsq...
News
STANLEY Security, one of the UK’s pioneer security providers, launches intelligent maintenance, an innovative cloud-based service designed to keep security systems up and running, for maximum effectiveness at a minimum cost. Intelligent Maintenance is a proactive service that STANLEY Security has introduced to enhance the level of service and maintenance of CCTV and Intruder systems. The new service forms a direct connection with CCTV or Intruder systems to automatically and actively monitor their health status providing early notifications of any faults. Problem detection software STANLEY Security designs and installs systems for intrusion detection, fire detection, access control, and video surveillance Intelligent maintenance operates 24/7, collecting data, learning from the systems it monitors and detecting any anomalies in real-time. The advanced problem detection software allows STANLEY Security to alert a customer to any potential failures of their equipment, such as cameras that may be out of action. If and when this occurs, STANLEY Security’s specialist support team is on hand to diagnose and fix the fault where possible. This will be done remotely where applicable, for maximum customer convenience and speed, with an average resolve time of just 17 minutes; where this is not possible an engineer will be dispatched rapidly to the site. STANLEY Security designs and installs a range of systems for intrusion detection, fire detection, access control, and video surveillance. It offers a range of preventative, maintenance, and service plans to minimise downtime and repair costs. Plans can be customised to offer the ideal coverage for equipment costs, labour costs, and service response times for all types of protection systems.
Following the outbreak of COVID-19 and the pandemic everyone is living through, the uptake in touchless access control which was previously gaining in popularity has been accelerated driving digital transformation across many industries and technologies. Among these is the rapid growth of mobile and cloud-based systems that make access control a simple and secure solution for businesses to manage keys, users, and doors across multiple locations, simply and conveniently. SALTO Systems, which has been delivering state-of-the-art wire-free and keyless electronic access control solutions since 2001, is acknowledged as a pioneer in the manufacture of these electronic access control solutions. Access control products But with that convenience can come risk and security vulnerabilities for the unwary which is why it’s important to consider that as access control products – both hardware and software - become increasingly attached to networks and other smart systems via the Internet of Things (IoT) cybersecurity needs to be front and centre if it is not to provide a pathway for cyber criminals and hackers. Smart devices commonly use wireless transmission of information often referred to as OTA to deliver software Smart devices commonly use wireless transmission of information often referred to as over-the-air (OTA) to deliver software, firmware, or configuration updates. This can include the use and configuration of security devices for use on networks using NFC, BLE, and RFID. To avoid security breaches and unauthorised attempts to access or unlock data, manufacturers should encrypt and authenticate OTA data and updates and deliver them to end-users via a secure protocol. Secure opening procedure When it comes to mobile technology and the use of ‘virtual’ keys sent to smartphones, one way to do this is to use AES 128 bit encryption which helps prevent skimming, eavesdropping, and replay attacks and a secure opening procedure with the key received securely encrypted using SSL. Another is to ensure products are certified to BSI Enhanced Level IoT Kitemark™ standard which demonstrates that a connected product has a higher level of security controls in place than the market standard for its type and is generally suitable for higher value or risk applications. Assessment to this level involves BSI’s most in-depth and exacting testing and analysis. SALTO has always applied the highest security standards to both its hardware and software products which is why its access control solution was among the first from any major security manufacturer to hold both ‘Secured by Design ‘accreditation and IoT Enhanced Kitemark™ status. Eliminating security flaws Its XS4 electronic escutcheon family, as well as its associated gateways, controllers and wall readers, are all Enhanced Level IoT Kitemark™ approved under the scheme as is the NEO electronic cylinder family and its tough new NEOxx electronic padlock product. Some manufacturers do not invest enough in eliminating potential security flaws from their systems" SALTO Systems Limited MD, Ramesh Gurdev says: “New security challenges will confront us as technologies accelerate and it’s important to stay ahead of the curve. Some manufacturers do not invest enough in eliminating potential security flaws from their systems, and this can be common in many entry level access products imported from Asia and elsewhere. At SALTO we’re driven by continuous improvement and committed to developing the most technologically advanced and flexible electronic locking solutions for any kind of door and user need.” Access control technology “Now we are synonymous with innovative solutions that set new standards in security, manageability, flexibility, and design that bring real-world benefits and this continues to set us apart. More recently, SALTO’s technological expertise has brought us to a leading position in both cloud-based access control technology and mobile access solutions.” “We’re proud that our NEO cylinder family now holds both ‘Secured by Design’ accreditation and Enhanced Level IoT Kitemark™ status as both are increasingly important in the specification of access control systems. Such awards mean we exceed the market standard for a number of security products across our access range which provides SALTO customers with the confidence that they are using some of the most technologically advanced and secure products available on the market today.”
Businesses are always looking for cost-efficient solutions to upgrade their security level. AXIS Entry Manager’s customers can now extend access control efficiently and affordably with Aperio battery-powered locks from ASSA ABLOY. Online integration of the AXIS A1001 Network Door Controller with Aperio cylinders, escutcheons and locks give facility managers real-time control over more doors. Administrators continue to manage every locking point from one AXIS Entry Manager interface, thereby saving time and removing the need to complete extra training. AXIS A1001 Network Door Controller AXIS A1001 Network Door Controller operates on a flexible platform, built to adapt as a site’s security needs change AXIS A1001 Network Door Controller operates on a flexible platform, built to adapt as a site’s security needs change. With this integration, battery-powered Aperio locks are controlled from the same web interface as wired door devices. Because the integration is online, it enables real-time control plus door and user audits on demand. “This integration is the first we have ever done with our access controllers,” explains Ernst Westerhoff, Business Development Manager for Access Control in Europe at Axis Communications, adding “At the end of the day, it costs less for the end-user.” Aperio RS-485 Hub Once installed, an Aperio RS-485 Hub coordinates up to 8 Aperio devices within a 15- to 25-metre range, communicating with the central system via the AXIS A1001. One AXIS A1001 can manage one wired door and one Aperio hub, for a total of 9 doors maximum per controller. AES 128-bit encryption secures all communication between locks and security systems. Aperio locks are wireless, so they require no expensive cabling to install. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates any need for power cabling to controllers. Aperio is cost-efficient during the use phase, too. Wireless Aperio locks Because they run on standard batteries, Aperio locks are much more energy-efficient than equivalent wired door locks. Unlike wired locking, Aperio devices are not connected to mains electricity and use no power when inactive. According to recent ASSA ABLOY benchmarking analysis, choosing wireless over wired locking could bring a large reduction in access control energy use, more than 70% or thousands of euros over a typical installation’s life-cycle. Greater flexibility to expand system coverage Aperio offers Axis end users much greater flexibility to affordably expand or modify their system coverage" “Aperio offers Axis end users much greater flexibility to affordably expand or modify their system coverage. If needs change at a facility, for example, managers want to filter access through more doors, it’s quick and easy for an installer to fit Aperio locks and integrate them online with the AXIS Entry Manager control panel.”, says Lars Angelin, Aperio Business Development Manager at AAOS. The integration allows users to open all wired doors and Aperio wireless controlled doors with the same credential, via almost any standard RFID technology including iCLASS, MIFARE, HID Prox/EM410 and Seos. “We offer to our customers the benefit of easy set-up for wireless access control. They just mount a wireless lock or wireless cylinder to a door and they have full access control,” adds Westerhoff. Streamlining access management The new integration has already been deployed at H-Farm, a business education and innovation hub in Italy. They sought a solution to streamline access management at a geographically dispersed portfolio of buildings. H-Farm experiences rapid user turnover, both because new businesses join regularly and because they organise up to 300 events every year. New locks had to extend the existing Axis system without adding admin workload. Aperio handles, security locks and escutcheons To meet their needs, H-Farm selected Aperio handles, security locks and escutcheons, each easy to retrofit To meet their needs, H-Farm selected Aperio handles, security locks and escutcheons, each easy to retrofit, so as to ensure that day-to-day work at their offices would not be disrupted. So far, 40 Aperio H100 wireless door handles, plus the Aperio wireless locks and wireless escutcheons, have been installed across multiple H-Farm locations in northern Italy. Most of H-Farm’s interior doors are secured with the award-winning Aperio H100 wireless handle, a former Intersec Access Control Product of the Year. The H100 wireless handle packs the flexibility and affordability of wireless access control into a slim door handle. Wireless access control hardware A standard battery slots inside and powers the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without compromising security. “Aperio wireless access control hardware is solid, nice looking and perfectly fits our environment, solving our access problem,” stated Alberto Aldrigo at H-Farm. H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. With the help of seamless integration from Aperio and Axis, the latest transformation upgrades their own access and security management.
A welcoming experience starts at the gate. Within an optimal (secured) access control design, different user groups must be taken into consideration. In almost every organisation, visitors are welcomed in addition to employees and contractors. Visitors are characterised by an occasional or one-time access to the organisation. Although policies vary by organisation type or geographic location, it is essential that registered visitors get a welcoming but secured experience, while unexpected visits do not get immediate access. Visitor management systems Visitor management systems are key to make the visitor sign-in process more efficient, accurate, and consistent. A visitor management system allows organisations to streamline the process of hosting people at their facilities. With a broad portfolio of vehicle and driver identification technologies, Nedap Identification Systems enables access control, visitor, and pre-booking systems for (temporary) gate access. In combination with third-party visitor management systems, Nedap provides a welcoming and seamless guest experience before, during, and after the visit. To enable multiple identification technologies for variety of users in one single access application, Nedap developed the multi-technology reader NVITE for contactless identification. Authorisation for access depends on the type of user. Employees can for example enter the car park by presenting a card, while visitors use a QR code or smartphone credential. Mobile ID protocol To serve a growing number of mobile applications, Nedap has developed the Mobile ID Protocol Especially for visitors, which incidentally use the identification technology, it is key to use a general easy to use access method. Furthermore, to create a welcoming experience the credential needs to be received before the visit. Another key element is that the identifier does not need to be returned, to avoid a complex identifier return process for visitors. If visitors are announced prior to arrival, a QR code can be sent to the facilities. The QR code (printed on paper or displayed at a mobile device) can be scanned by the NVITE reader for check-in at the car park. The same QR reading can also be extended to check-in registration at the entrance of the building. To serve a growing number of mobile applications, Nedap has developed the Mobile ID Protocol. Enabling secure communication This protocol enables secure communication between the reader and any third-party smartphone app and can easily be implemented by third parties to develop a mobile application. In addition, NVITE ensures effortless integration into access control or visitor management systems via interfaces, such as Wiegand or OSDP (Open Supervised Device Protocol). Within high secured areas, it can be desirable to enhance the security level. Therefore, it is possible to identify the vehicle of visitors in addition to the driver's QR credential. The vehicle can be identified based on a pre-registered licence plate number. This means only authorised drivers and vehicles can enter the facility. Nedap offers the ANPR Lumo to identify vehicles by capturing their licence plates. Combined with the NVITE reader, this is a suitable solution to ensure a welcoming experience in a high secured area. Nedap’s NVITE reader is a perfect solution for organisations to host guests at their facilities in a safe and seamless manner.
Altronix, the globally recognised company in power and data transmission solutions for the professional security industry, has announced that its award-winning Tango PoE Driven Power Supply/Chargers are now UL 294 listed for access control applications. This reaffirms the high quality and performance of Tango solutions that end-users, architects and security consultants demand for mission critical access control applications. Tango PoE Driven Power Supply/Chargers Tango leverages low-voltage installation methods, eliminating the need for an electrician and dedicated conduit and wire runs. This unique solution delivers 12VDC and 24VDC simultaneously from any 802.3bt PoE source up to 90W such as Altronix NetWay injectors. When combined with Altronix stackable sub-assemblies, Tango can support up to 8 locking devices with power for controllers and ancillary devices. A single Lithium Iron Phosphate battery (LiFePO4) provides backup for 12VDC and/or 24VDC systems, adding to the systems ROI. Plug-and-play option to deploy access control UL 294 listed for access control, Tango is documented to operate with the highest levels of reliability and safety" “Tango provides system designers and installers with a cost-effective and efficient means to power access control and security devices by employing the latest PoE technology,” said Ronnie Pennington, National Sales Engineer, Altronix Corporation. Ronnie adds, “Now UL 294 listed for access control, Tango is documented to operate with the highest levels of reliability and safety, providing a plug-and-play option for deploying access control systems.” Flexible to accommodate Altronix sub-assemblies The Tango Series is available in myriad configurations to meet a wide variety of system applications. All models are equipped with LiFePO4 (Lithium Iron Phosphate) battery backup. Tango solutions are flexible to accommodate Altronix sub-assemblies, including the Altronix PDS8 Dual Input Power Distribution Modules that distribute 12VDC and/or 24VDC over a total of eight (8) fuse or PTC protected selectable outputs and Altronix ACMS8 Dual Input Access Power Controllers that distribute power over a total of eight (8) fuse or PTC protected Fail-Safe, and/or Fail-Secured relayed outputs. Additionally, network versions of these boards with embedded remote power management. Altronix products are manufactured in the U.S.A. and backed by a lifetime warranty.
Honeywell announced the expansion of capabilities of its MAXPRO Cloud portfolio with the launch of MPA1 and MPA2 access control panels that offer cloud, web-based or on-premise hosting options. “Our technologies can be integrated into existing systems, helping our customers create and maintain flexible, bespoke solutions that are best suited to their needs, which is especially important for SMBs,” said Rick Koscinski, North America General Manager, Honeywell Commercial Security. Rick adds, “Our new MPA1 and MPA2 control panels strengthens our MAXPRO Cloud offering by giving users cost-effective access control functionality and real-time security information from anywhere.” MAXPRO Cloud security solution MAXPRO Cloud is a cloud-based security solution designed for multi-site small and medium-sized businesses, which provides effective and efficient security and safety, while minimising IT costs and future-proofing investments. The MAXPRO Cloud solution integrates access control and video into an integrated and easy to use platform The MAXPRO Cloud solution integrates access control and video into an integrated and easy-to-use platform, and is used to protect multi-site infrastructure, such as retail, franchises, multi-tenant commercial and residential properties, schools and churches. With features such as global credential management, automated reporting and remote management of doors and schedules, the cloud-based security system is not only a great security solution, but also a powerful business tool. MPA1 single door POE-powered controller MPA1, a single door POE-powered controller is easy to install, operate and maintain, thanks to its unique edge installation design and its dedicated Device Utility App for fast and easy commissioning. It can either be mounted in a U.S. single gang junction box or in a specially designed compact enclosure with Status LED diagnostics. In addition, the embedded web interface allows the MPA1 to operate in stand-alone mode in single and multi-panel solutions. Honeywell MPA1 control panels feature: Flexible capability: With its small design and sleek enclosure, it can be leveraged for diverse deployment across a variety of jobs. In standalone mode, MPA1 can control a single door or manage multiple networked controllers. Faster installation: Single door Power over Ethernet (PoE) powered edge controller is fast and easy to commission via the Device Utility App on an Android or iOS mobile phone. At-the-door mounting decreases cable runs and with the small edge design, the MPA1 fits in U.S. single gang junction box. Only Open Supervised Device Protocol (OSDP) support: The latest communication technology for card readers provides strong encryption, bi-directional communication and improved cyber security resilience. It gives users the option of forming a platform that can be expanded in the future. It also features SSL certificate security, safeguarding connections to the panel. MPA1 has been developed with a small installer-friendly design that easily adapts to existing IT infrastructure and methods, reducing installation and support costs and supports OSDP reader connections, ensuring end-to-end secure communication from smart card to the host. So, as a system grows, MPA1 grows as well. MPA2 cloud-based access control panel MPA2 is a cloud and standalone access control panel for two door access control. The MPA2 panel features enhanced security due to a 128-bit AES encrypted bi-directional Open Supervised Device Protocol (OSDP) communication with access control readers. This combination of features, bolstered by an intuitive, browser-based user interface, gives customers an easy-to-use and secure site-access system. Users can manage MPA2 securely using Ethernet or Internet connections. Honeywell MPA2 control panels feature: Flexible 3-in-1 capability: Embedded, cloud- or software-hosted capability from one panel. This means that MPA2 can be deployed for a large variety of jobs, from basic access control for a single site to multi-site, enterprise-level security with fully integrated access, video and Faster installation: User-friendly, screwdriver-less installation is facilitated by push-in connectors and RJ45 cabling, halving the time previously required in fitting similar panels and offering benefits to installers, in terms of reduced operation and maintenance costs. IP-based hardware with Power over Ethernet (PoE) PLUS capability eliminates additional network module wiring and simplifies powering the panel. At-the-door mounting also decreases cable runs. MPA2 is built to use the Structure Cabling System in new buildings, where network/RJ45 cabling is already in place, reducing installation cost by up to 50%. Wiegand and OSDP Support: Next to legacy Wiegand communication, which makes it easy to connect to the most common Wiegand connected readers, MPA2 provides the latest communication technology for card readers for strong encryption, bi-directional communication and improved cyber security resilience. It gives users the option of forming a platform that can be expanded in the future. It also features SSL certificate security, safeguarding connections to the panel. MPA2 offers a simplified approach to security management, improving business and employee productivity, by reducing both training and operating time. The new panel is available as a standalone product and can be fitted into existing security set-ups with ease.


Expert commentary
If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organisations up and down the country. By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years. There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s only been sped up by the pandemic. It’s true that many businesses are still very much focused on remote working, although many are now starting to implement new-and-improved strategies that are better suited to protect the workforce moving forward. Mobile ID systems As the next normal becomes clearer, businesses will be reviewing procedures such as access control, occupancy monitoring, reducing touch points and tracking visitors. Mobile ID systems are ideally suited to this task. But what are the key reasons for considering such a setup in 2021? But why is this new technology so well-suited to future-proof your physical access system, and why is it becoming so popular? Eradicating outdated legacy credentials Have you seen just how vulnerable outdated Proximity card technology can be? Low-frequency 125kHz cards can be cloned in a matter of seconds with the use of cheap, readily available tools. Despite their weaknesses, they are still used by a huge majority of businesses – big and small. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential Replacing such a system with a mobile-enabled system is one of the best ways to increase security ten-fold. Thanks to a cloud-based infrastructure, mobile ID offers best-in-class security and cryptography. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential. Bluetooth Smart and NFC (Near Field Communication) make them the best product to operate such a credential via a secure app. If you’re looking for best-in-class security in 2021, mobile access is most definitely the way forward. Removing touch points across the business Reducing touch points and the adoption of touchless facilities has become a key priority for businesses in the wake of COVID-19. Even as businesses start to return to the office and operate a home/office split, it will be imperative that unnecessary contact is kept to an absolute minimum between staff. The traditional issuance of identification and access control credentials can pose problems in this regard. Facility and security managers who are responsible for onboarding and processing ID have done the process face to face. Mobile access makes it possible to carry this process out without people coming into direct content. First, the security manager has access to a secure portal, allowing them to create, manage and edit credentials anywhere. They can upload and remotely transfer mobile ID and access control credentials directly to users’ smartphones over the air. Via the secure app, users can view and see their credentials and immediately begin using it for ID and access control by simply placing their smartphone over card readers. Enabling a more flexible way of working The way in which we work has changed for good. Even as people more people return to the office in 2021, a majority of businesses will be operating a home/office split indefinitely. This once again reinforces the need for a smarter, more adaptable onboarding system. Implementing mobile ID is the perfect way of doing this: over-the-air delivery of credentials and security data is now a given, helping businesses create the perfect balance between the home and the office. No longer do people have to come into the office for the onboarding process. Increasing convenience and user experience More often businesses are realising the value mobile ID can have for enhancing the work experience as well as security Ok, so mobile ID is the perfect way of increasing security and adapting workplaces to a post-COVID way of working. And we’ve not even touched on the most obvious advantage yet: Convenience. How many times have you forgotten your ID card? We’re sure it’s more times than you forget your smartphone. These powerful processors have become intertwined with the way we carry out tasks on a daily basis. They’re so vital that people will soon notice if they’ve forgotten it. From an employee’s perspective, mobile ID and access control is simple, convenient and extremely user-friendly. More and more businesses are realising the value mobile ID can have for enhancing the work experience as well as security. From the employer’s perspective, mobile ID means it’s easier for administrators to manage access and credentials. Future-proofing access control now will ensure that in the longer term, mobile ID is well worth the investment. The annual expenditure of printing ID cards and purchasing credentials can be vast, while reissuance costs can also quickly add up for larger organisations. These issues are a thing of the past for businesses using mobile ID. Mobile ID perfect tool for 2021 and beyond Until mobile ID, new and improved credentials’ main focus was on increasing security. Mobile ID not only delivers that, but it also provides a more convenient way of accessing the office in a way that’s perfectly suited to returning to the office in 2021. If there was ever a time to upgrade, now is the time. Summing up, mobile access is changing the way we access the office by: Eliminating weak links in security systems such as outdated legacy card technologies Eradicating the need for touch points across multiple areas of the workplace Enabling a smarter, more flexible approach to onboarding Increasing convenience – for both employers and employees.
In a world forever changed by the coronavirus pandemic, companies worldwide are now expanding their concept of physical security to best safeguard their facilities and employees. Few incidents have had as much of an impact on businesses globally as the COVID-19 pandemic; much of the world is still struggling to contain COVID-19, navigating the lasting effects and exploring what the “new normal” looks like. While some organisations are still engaged primarily in “anywhere operations”, i.e. remote work, many organisations are implementing strategic physical security solutions that better protect everyone through the use of video surveillance technology and advanced intelligence capabilities. As this new normal takes hold within the business environment, security strategies will largely be centered around several key initiatives like access control, people counting, occupancy controls, temperature screening, contact tracing, and reducing office touch points. With the use of a video management system (VMS) in the shadow of COVID-19, occupancy data from a VMS can trigger a lockdown and not permit new entrants until the occupancy drops below a certain threshold; this is significantly useful for organisations that have returned to in-person work. But there’s a caveat: though many legacy security systems are being re-evaluated to allow for touchless or frictionless access control — a move designed to eliminate the need for employees and visitors to physically touch a surface when using an access control system — upgrading the outdated technologies can be cumbersome and expensive, especially for organizations that had not planned for an interruption like the pandemic. Security contractors will be vital So, what is the solution? Security contractors will play a vital role in helping end-users across a range of vertical markets — large and small — to achieve their goals in the new paradigm. For some, this may mean leveraging existing access control and video surveillance systems with upgrades where needed. For others, an entire overhaul is made possible with budget friendly solutions for businesses to migrate to integrated access control through end-to-end security solutions that tie into existing infrastructures without major disruptions (meaning the organisation will never be left vulnerable). Cybersecurity is becoming even more intertwined with physical security There is massive transformation occurring in the security industry, most notably the movement to digitise physical access and integrate it with video management systems and surveillance. This shift means that cybersecurity is becoming even more intertwined with physical security, allowing organisations the ability to correlate the metadata of people’s behaviors and activities — a plus point for those looking to remain vigilant against future pandemic-esque business interruptions. Access, video, and audio are converging into consolidated platforms. Due to lower costs and pairings with IP-based, wireless infrastructure, there are infinite solution configurations. IT security requirements are beginning to apply to physical security because of this integrated infrastructure. Multi-factor authentication The security industry is also beginning to see a trend of multi-factor authentication, which is going to dominate in the days to come as it makes solutions more reliable. Most people carry smartphones these days, which have green check communication capabilities that allow easy multi-factor authentication. Costs are going down, and algorithms are getting better, making more people willing to try it. Some new solutions have both the fingerprint reader and a camera for facial biometrics Some new solutions have both the fingerprint reader and a camera for facial biometrics. Cameras and CCD modules cost almost nothing, and they do not have to be super high-end anymore, especially if organisations are doing one-to-one verification. It’s not just about security now; it is security, health, and safety. Access control with video, intelligent readers, and credentials is a perfect platform for next generation solutions.
Access control and door entry is a huge responsibility, and challenge, for local authorities and housing associations UK wide. For councils, they’re accountable for the security and safety of many public facilities such as leisure centres, libraries as well as residential housing developments which are often large scale and home to hundreds of people. Housing associations manage affordable rental housing which also means they’re responsible for the appropriate access control management for each individual house or flat. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage. For example, with modern intercom and access control systems, remote management and communication is something that offers local authorities and housing associations features that enable them to reduce costs and cut their carbon footprints by managing multiple sites from one place. On the other hand, such technological innovation has meant that local authority and housing association specifiers and consultants now have a wide range of systems and products to choose from which can cause issues in ensuring the right system for a specific building or development is chosen. Choosing an appropritate access control system In choosing an appropriate system, local authorities and housing associations need to opt for a cost effective solution that can be easily maintained with excellent support from the manufacturer and guarantees that the system and system parts will remain supported for the duration of its expected life cycle. It is also important that the chosen system is flexible to cater for the varying needs of the tenants and visitors. Of increasing importance is the reduction of anti-social behaviour which new technology can help by providing the use of data loggers which track the use and events of a door entry system, allowing specific evidence to be located by integrating with CCTV. Using technology to our advantage Through advancements in management systems and services, we can gain a much better visual representation of the events and general usage of an intercom entry system and not just its proximity access control. Systems, for example, can now send email alarms or notifications to the administrator or management. We are now able to modify user rights and access levels on the go from a mobile app which enables a much greater control over service and maintenance engineers, such as making sure they have full access when required via an app, rather than arriving to site with the incorrect keys or access fob. Systems, for example, can now send email alarms or notifications to the administrator or management Dealing with tenant’s lost and stolen keys has never been so easy either. The blocking or deletion of lost fobs and adding a new fob can be carried out in minutes while at the same time removing the cost of sending an engineer to the development to programme new fobs. This greatly reduces the carbon footprint of the whole task as fobs can now be sent out via post to a secure location for collection. Technology has also helped local authorities and housing associations to overcome the issue of not being able to have a concierge or building manager available 24/7 at some developments. Now with internet communication, it’s possible for tenants and visitors to get in touch with someone should they need assistance, whether that’s from within the apartment or from an entrance point. For example, lets take the Videx VX2200 with IP concierge integration. This system is exceptionally flexible, enabling calls to be answered on Videx intercoms and also mobile phones if required. With the integration of the IP concierge each block can be either standalone or networked via the internet back to a central control room. Reduced maintenance costs and carbon footprint We work with a wide range of local authorities and housing associations to help them overcome access control and door entry challenges. One organisation we have recently partnered with is The Living Group to help them greatly reduce their maintenance costs and carbon footprint by installing the MiAccess offline proximity system on many of their developments across the North East. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage By installing an appropriate system, The Living Group has managed to overcome issues caused by the existing system’s limitations and also enabled much more flexibility when it comes to effectively managing the access control system of all their included developments. For those responsible for effective and appropriate access control, the management of the systems are easier, quicker and there’s no delay or on-going costs for needing a specialist programme to modify fobs and access rights as this can now all carried out in-house. Improved security legislation Further advancements in programmes such as Secured by Design (SBD), a police initiative that improves the security of buildings and their immediate surroundings to provide safe places to live, work and visit, means that there’s more security legislation being implemented that’s making intercoms and access control more secure, without affecting ease and convenience. Videx holds an SBD accreditation and we know, from first-hand experience, how it’s making a difference in keeping tenants safe. When you combine the safety features promoted by an SBD member company like ourselves with the likes of the Videx event logging, image capture and ability to modify access users on the go, for example, we can help to create a very safe and secure environment. Personally, I think there needs to be a greater emphasis on the role of security legislation Technology has completely transformed the way local authorities and housing association are able to choose, install and manage door entry and access control systems for tenants and visitors alike. Personally, I think there needs to be a greater emphasis on the role of security legislation such as Secured by Design to ensure all councils and housing association consultants are up to date with what constitutes a robust and secure system that’s also cost effective too. In my role, I see weaknesses in systems and constant ongoing costs that could easily be avoided. For instance, features such as timed remote entry means local authority and housing association management no longer need to worry about keys being lost, the wrong keys being supplied or locks needing to be changed. With new systems such as the Videx MiAccess and Videx WS4 range, we can help to massively reduce a housing association’s or council’s carbon footprint and engineer costs by allowing them the access to management and control from an offsite location. Crime prevention We can also use live and logged events to help prevent crime in different ways, from antisocial behaviour growing around a tenant being called or visited much more regularly than others, to knowing a tenant is currently still living at a property but isn’t paying rent or answering to any correspondence. Technology enables local authorities and housing associations to receive detailed data and therefore behavioural insights on the people under their management and care. If consultants and specifiers are advised on the most appropriate systems that meet their specific entry needs, they can ensure greater, safer and more convenient access control that meets the requirements of both the end user and the those responsible for its effective management.
Security beat
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organisations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organisations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-life balance In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and travelling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasising both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Case studies
Sovereign Safe provides deposit facilities that truly push the global standards of the safe deposit industry. With the very latest modular high compression steel vaults constructed and installed by specialist manufacturers, state-of-the-art biometric access with complete audit trail from electronic alarmed lockers, Sovereign stands unrivalled as a globally recognised company in any high security facility services, anywhere in the world. Enhanced security No high street bank or any safe deposit centre can match Sovereign’s credentials and the extraordinary security levels that they have achieved. People across the country have been targeted for their valuables, not only on the streets, but also in their homes. Challenges were to offer a complete peace of mind by delivering the highest-level of security and access permission through various levels of security check (e.g. Card and Biometric Palm Vein Reader). Matrix Access Control solution Matrix Access Control solution is designed to address security concerns in a professional and systematic method Matrix solved these challenges by providing COSEC PANEL LITE, VEGA, PVR, PATH Series, and ARC DC100P. Matrix Access Control solution helps in enhancing security, along with barriers and door controllers. Matrix Access Control solution is designed to address security concerns in a professional and systematic method, without compromising on hospitality and productivity. It allows enrolling visitor’s Fingerprint/Palm Vein Reader/RFID Card, in order to provide the visitor with access to restricted areas, as per the below criteria: 2-Person rule: This is enforced by requiring the presence of at least two authorised persons Route based access: This allows user to access the authorised route only Anti-pass back: This restricts to enter a secured area second time without first leaving it Result: Peace of mind Seamless experience Increase productivity of staff Quick actions on exceptions Multi-layer authentication Boost customer satisfaction Matrix products offered include: COSEC VEGA CAX integrated with turnstile COSEC PVR DOOR CONTROLLER COSEC PANEL LITE COSEC PATH Series COSEC ARC DC100P
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Centre, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Centre is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
Aperio wireless locks from ASSA ABLOY Opening Solutions now integrate seamlessly with the versatile AEOS access control by Nedap to bring a range of concrete business benefits. Optimising access control with these battery-powered wireless locks can boost convenience for building users and help make better use of spaces. It can increase efficiency by enabling the integration of functions and processes across the organisation. Existing AEOS users can integrate battery powered Aperio devices to extend the reach of their system. Or, by combining Aperio with AEOS, the user can build a cost-efficient, wire-free access control system from scratch. Aperio cylinders, escutcheons and locks with online (or offline) capability can be implemented alongside existing or new wired doors connected to AEOS. This gives security managers more control over additional rooms or other defined areas at their premises. Seamless and secure integration Devices from the Aperio lock range that integrate with AEOS include the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100) and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden doors, glass doors and fire doors. Because all Aperio locking devices are wireless, they can be installed quickly, without causing disruption to buildings or work schedules. The locks are connected to AEOS via communication hubs that allow control of up to 16 locks each One recent ASSA ABLOY benchmarking study finds labour costs for installation are over 80% less for wireless locks versus wired locks. There’s also no inconvenience when it comes to identification: site users continue to gain access with the same credentials they were using before the integration. Aperio online integrations can use different interfaces (for example, RS485 or IP). The locks are connected to AEOS via communication hubs that allow control of up to 16 locks each. Improved and efficient management Offline Aperio integration meets the important OSS-SO industry standard for offline access control, so customers have the freedom to choose the best devices to connect to AEOS. Facility managers can connect both online and offline Aperio devices interchangeably. These multiple integration options allow AEOS users to select the most appropriate locks - whether Aperio wireless or wired - for their specific requirements at each door. “ASSA ABLOY’s Aperio wireless locks enable a complete access control solution using wireless technology,” says Christian Nagel, Nedap channel manager. “It enables us to offer a system with a high level of flexibility.” Facility management Staff and visitors open each door for which they’re authorised with their individually programmed MIFARE credential The AEOS control panel provides a powerful set of functions. It displays events for any Aperio device, including door and battery status, as well as tamper detection. The AEOS software enables full control and efficient management and eliminates unproductive tasks, including the need to duplicate data entry. At Ghent’s Hospital Maria Middelares, Aperio locks combine with AEOS to protect staff, visitors, patients and confidential data, as well as medicines and valuable equipment. Around 700 doors are equipped with Aperio offline locks. They are connected to AEOS, which controls every door, credential and user from a one interface, saving facility managers time and money. Staff and visitors open each door for which they’re authorised with their individually programmed MIFARE credential. Electronic security system Similarly, at Rotterdam’s 16,000-capacity Ahoy Arena, offline integration between Aperio and AEOS offered an affordable way to incorporate mechanically locked doors into an existing electronic security system. Facility managers at Ahoy extended access control without having to change card readers or control panels. The Aperio–AEOS integration at InHolland University of Applied Sciences is online, giving security managers real-time control over their multi-site premises. More than 500 Aperio wireless door devices are deployed at 7 separate InHolland campus locations. These battery-powered locks provide tested and trusted protection for the university’s most important areas, including offices and exam storage rooms. “I am very satisfied with the implementation and operation of the Aperio solution,” says Frans Bruggeman, Facility Services Consultant at InHolland.
Located in the heart of west London, Ealing Council serves the residents and businesses of the UK capital's fourth largest borough. With a vast housing portfolio and a commitment to keeping residents as safe and secure as possible, Ealing Council benefits from the use of PAC’s innovative cloud-based access control solution, PAC Residential Cloud. The London Borough of Ealing comprises seven major towns, Ealing, Acton, Greenford, Hanwell, Northolt, Perivale and Southall. Ealing Council’s task is to provide a diverse range of services to the 350,000 residents residing across the area. It is committed to improving its performance, while ensuring value for money and serving a key part of this is the provision of good quality housing that meets the highest possible standards. Ensuring safety and security of residents In addition to carrying out property allocation, repairs, rent collection, homelessness services and estate management, Ealing Council is responsible for ensuring the security and safety of the tenants living in its 300+ housing blocks. As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system" Daljit Gill, an Electrical Services Manager at Ealing Council commented, “When it comes to administering our multi-site housing portfolio, Ealing Council recognises the advantages that access control technology brings in terms of our ability to effectively access information, issue and configure key fobs and check occupancy status.” He adds, “As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system, which currently comprises around 1,100 doors and 500 controllers.” PAC Residential Cloud Over the last few years the cloud has proven to be a game changer in the way access control technology is designed, configured and used. The PAC Residential Cloud leads the way in allowing organisations to remotely manage and monitor their access control systems. Meanwhile, the PAC controllers, which are being used as part of the Ealing Council’s access control system, utilise the general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. Key fob management and remote diagnostics Sam Flowers, Regional Sales Manager at PAC GDX, explains “Daljit and his team can address technical issues, deal with key fob management, examine diagnostics, view system status, set and unset a system, and gain access to event logs and reports, all from a remote location.” Without the cloud, any problems and issues would need to be dealt with by office-based individuals" Sam adds, “Without the cloud, any problems and issues would need to be dealt with by office-based individuals, which is obviously restrictive and can lead to a delayed response. We provide a full online training programme to help customers get the best out of their systems and also offer full technical support.” Asked on how the PAC Residential Cloud makes his day to day working life easier, Ealing Council’s Daljit Gill responded by stating, “I can address connection issues, manage the system and troubleshoot from wherever I happen to be, using my PC, tablet or smartphone. Not only is this convenient, it also saves me a huge amount of time, as I don’t have to go into the office to log-in.” Fully auditable system He adds, “Two of my colleagues also have permission to use the system remotely, although we could share access with up to 15 administrators if required, with each person only given access to information that relates directly to their role.” Daljit further said, “One of the main features of the system is that it is fully auditable, meaning that any activity can be monitored in real time and traced directly back to a specific user via their unique password.” Adherence to GDPR and strong data protection policy Ealing Council strictly adheres to the General Data Protection Regulation (GDPR) and has implemented a strong data protection policy. PAC Residential Cloud is hosted with The Bunker, a trusted PAC partner, whose UK data centres are located in former nuclear bunkers and certified to the ISO 27001 standard for information security management. If an alert is activated, measures can then be taken to deactivate a specific key fob" PAC Residential Cloud also offers Ealing Council some less obvious benefits. Sam Flowers comments, “The data collected by the access control system can be used to issue an alert if a resident’s key fob hasn't been used during a specific period, identify patterns of behaviour that could suggest illegal activity, flag-up if someone is subletting a property or even detect if a tenant is using a cloned key fob.” Sam adds, “If an alert is activated, measures can then be taken to deactivate a specific key fob. Furthermore, the PAC Residential Cloud has also helped Ealing Council adopt a business as usual approach during the coronavirus pandemic by limiting physical interaction, while still enabling a prompt and effective response.” Fully IP-based access control system As well as enjoying the operational advantages of the PAC Residential Cloud, Ealing Council is also planning to advance its transition to a fully internet protocol (IP) based access control system by upgrading to PAC’s 512DCi digital networkable access controllers. Daljit Gill concludes by stating, “Installing the PAC 512DCi’s will allow us to maximise operational effectiveness through our investment in the PAC Residential Cloud. We will also be able to utilise PAC’s high frequency OPS MIFARE DESFire EV1 readers, which have been tested to meet Advanced Encryption Standard (AES) 128 bit compliance. This will further reduce the risk of key fob cloning and ensure that our tenants benefit from improved levels of security.”
The Very Group is the UK’s largest integrated digital retailer and financial services provider. It offers 1,900 brands to its four million customers. Due to the company’s growth, it built a new state-of-the-art fulfilment centre - close to one million square feet - to centralise operations and drive efficiency. The Very Group has historically operated from three fulfilment centres in the north of England. Due to the business’ growth, it needed a new, purpose-built and automated facility in a central, well connected location; that could accommodate all one-man fulfilment and returns operations on one site, and that provided room for continued expansion. The space offered by the new site in the East Midlands means that The Very Group can process more orders and use new technology to make the business more responsive, reducing the time it takes to get products to customers. Support business growth The site’s position in the East Midlands, adjacent to the M1 and East Midlands Airport, with its own rail freight terminal, will enable the business to increase its cut-off time for next day delivery to midnight from 7pm, and explore the introduction of same day delivery in the future. A crucial aspect of the new hub was security - with the need to not only secure the site and the stock inside, but implement solutions which would benefit the wider business too. The Very Group required a platform which could provide the business-wide value it was seeking The Very Group required a platform which could unite operations and provide the business-wide value it was seeking. The company approached Grantfen, initially on a consultancy basis, to guide the organisation on the route it should be taking and the technologies that could support its ambition. Grantfen quickly recognised the scope of The Very Group’s ambitions for a platform that was easy-to-use and that could bring together information from hundreds of different sensors and technologies. Incorporating video surveillance It put forward a comprehensive solution built on the Genetec Security Center unified platform. Incorporating video surveillance and analytics, access control, automatic number plate recognition and integration with other key business systems, this allowed The Very Group to deploy best of breed technologies from a range of vendors including HID Global, Axis Communications and SenStar. Perhaps the most important solution needed was tracking who was coming in and out of the building - with such a large workforce, combined with inbound and outbound deliveries, the facility has hundreds of people inside at any one time. Previously, security manually searched people selected at random. However, thanks to the robust Genetec software development kit, and Grantfen’s specialist development expertise, The Very Group has been able to adapt the solution and write its own code in order to use the access control system to implement truly random searches. Number plate recognition This has involved getting permission to hold employee data, but again, thanks to the new system brought together by Security Center, the data is housed safely. Moving from three fulfilment centres into one, consolidated facility meant a change in operations for The Very Group, and security needed to mirror this evolution. Therefore, with the volume of traffic coming in and out of the site increasing, The Very Group implemented automatic number plate recognition (ANPR). Heavy goods vehicles could be monitored coming in and out of the site, enabling those in the diary to enter and exit the grounds in an efficient manner. Plus, with timestamps now able to show when vehicles entered or exited the grounds, it helped with yard management and traffic flow, with Security Center able to generate reports on how traffic is moving around the yard. Employees are able to take advantage too - with the ANPR recognising them and seamlessly letting them into the car park. Health and safety standards The opening of Skygate, our new fulfilment centre, means a new era for the group" This enhanced integration has benefitted other areas of the business too. The CCTV control room is now able to monitor fulfilment centre flow, looking at movements such as trailers, to help maximise efficiencies and ensure high health and safety standards. Dean Cooper, Head of Security at The Very Group, commented: “The opening of Skygate, our new fulfilment centre, means a new era for the group. We are a digitally-led business, and the fact we are now able to enhance operations and yield more value from security functions is going to help us operationally. Genetec and Grantfen have played a huge part in accelerating our sophistication in this area, and I look forward to how we can gain increasing insights from all the technology has to offer.” Deep integration and analytics While the roll-out has been relatively recent, the positive effects are already being felt across the business. This has led to future plans about what else could be introduced - all underpinned by Genetec Security Centre. “Genetec Security Centre is helping to improve inter-departmental collaboration thanks to its reporting functions, alongside benefiting operations and ensuring the security of the facility. We are an ambitious business, and as we grow we need a system that will continue to evolve with our requirements. Genetec enables this, and alongside its deep integration and leading analytics, we look forward to continuing the partnership over years to come”, concluded Cooper.
Milton Keynes University Hospital has installed a Videx VX2200 system, one of the UK’s renowned access control manufacturer’s flagship door entry systems with 5178 hands free audio units and touch free entry points. Through opting for a touch free entry solution, the hospital has been able to reduce physical contact between people to help stop the spread of Covid-19. Four independent units were installed by ST Fire and Security in different buildings of the hospital. One was installed at The Campbell Centre, a 38-bed acute inpatient mental health unit, another system fitted at the hospital’s dental surgery, a system fitted at the entrance of urgent care and a final one at Eaglestone Health Centre which is a specialist Child and Adolescent Mental Health Service (CAMHS) facility. Audio apartment station Simon Turpin, Owner of ST Fire and Security, said: “The Videx VX2200 system with hands free audio apartment station and touch free entry points delivers huge benefits to the hospital by safeguarding patient, visitor and NHS staff safety as well providing easy and convenient access. The new system reduces waiting times as when a visitor uses it, someone in the building is immediately notified and will come to see them to complete entry.” “The Videx kit is the only one on the market currently that can offer convenient access in a touch-free way - they’re highly useful in helping the hospital ensure people stick to the designated one way system in place.” Touch free access Proximity access control can be added allowing authorised personnel to enter buildings touch free" As well as providing touch free access, the Videx system has replaced an existing system that had failed, affecting secure and convenient access to and from The Campbell Centre. The Videx solution means no patient or member of staff is waiting for access into the secure mental health unit, safeguarding patients and employees. Ben Davies, South East Sales Manager, Videx UK, said: “Our touch free access control range has proved hugely popular in recent months as minimal contact remains key to reducing the spread of the coronavirus. The range offers both exit buttons and entrance panels in a touch free format using infrared sensor technology, providing a no touch solution for businesses as they focus on creating a COVID secure environment for their employees, partners and customers.” Bespoke entry panels “Proximity access control can be added allowing authorised personnel to enter buildings touch free, which is particularly useful for hospitals and other NHS buildings such as GP surgeries and urgent care facilities. We can also provide fully customised options, offering bespoke entry panels and exit buttons that are in keeping with the surroundings of the building whether that’s a specific hospital ward, GP surgeries, or dentist practices.”


Round table discussion
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
As a subset of the larger economy, the security industry is bound to feel the effects of an economic downturn. Such was the case in 2020 when the COVID-19 pandemic undermined economic growth and presented a brand new set of challenges to business. The security industry has been able to pivot toward emerging opportunities, but that success has been offset by broader economic challenges. We asked this week’s Expert Panel Roundtable: What impact, positive or negative, has the larger economy had on the security marketplace in 2020?
Products


White papers

Boosting on-site safety and security
Download
RFID and smartphone readers in physical access control
Download
How plate reader technology increases your perimeter security
Download
3 reasons to migrate to a new access control system
Download
5 steps to finding the right access control system for you
Download
Why outdated access control systems are a big problem
Download
Convergence of physical and logical access
Download
Is your access control system as secure as you think?
Download
Do you know the weakest link of your access control system?
Download
How do you know access control in the cloud is secure?
Download
Three Reasons to Upgrade Your Access Control Technology
Download
House Of Smart Cards - How assumptions can open dangerous security gaps
Download
5 reasons to get physical with access control
Download
Security risks of ‘universal’ card readers
Download
Visitor Management: A Guide to Selecting and Employing a New Solution
Download

Videos
Access Controllers: Manufacturers & Suppliers
- Vanderbilt Access Controllers
- Bosch Access Controllers
- HID Access Controllers
- AMAG Access Controllers
- CyberLock Access Controllers
- ASSA ABLOY - Aperio® Access Controllers
- Mercury Security Access Controllers
- TDSi Access Controllers
- CLIQ - ASSA ABLOY Access Controllers
- Avigilon Access Controllers
- Hikvision Access Controllers

How to ramp up perimeter security with license plate reader technology
Download
Solve access control challenges in the healthcare sector
Download
Getting the most value from Software Subscription Agreements
Download
Shifting trends in operation centers and control rooms for 2021
Download