Door access control
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the bigges...
Winner of the coveted iF award for its superior design, DOOR FOT is a versatile device designed for reliability, modularity and performance. COSEC DOOR FOT, a well-engineered door controller, can be used for applications like time-attendance and cafeteria management. It records exact time of a user using fingerprint, RF card or PIN as credential in less than one second. Features of DOOR FOT: 128*64 Dot Matrix display with touch sense keypad Identification in less than one second 5,00,000 e...
In the past, biometrics solutions for access control were often deployed with reduced security thresholds because their imaging technology, which routinely yielded false fingerprint rejections, resulted in long authentication lines at the door. HID Global, a global provider of trusted identity solutions, announced its new fingerprint reader that merges credential excellence with HID’s globally-patented multispectral imaging technology to address this issue and fuel broad adoption of biome...
Matrix, a manufacturer and provider of telecom and security solutions, is conducting Matrix Insight 2019 Jeddah and Riyadh on 18th and 22nd April respectively from 09:00 AM to 12:30 PM. Matrix welcomes everyone in the telecom and security industry from new prospects, strategic partners to existing customers and suppliers. At the event, Matrix will highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migr...
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
3xLOGIC, the provider of integrated and intelligent security solutions, has announced the availability of its pioneering VIGIL video management system (VMS) in Europe. Already enormously popular in the USA, 3xLOGIC aims to replicate this success and is targeting VIGIL at those who want all the power of integrated video and access control, without the stress and cost of a complex set-up. VIGIL’s enterprise grade VMS is the driving force behind the VIGIL range of network video recorders (NV...
Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland has appointed a new Business Development Manager to help steer and support the business’ service and maintenance offering. In his new role as Business Development Manager, Lee Cook will be responsible for developing and implementing strategies for Door Group’s Repair, Service and Maintenance department. Valuable asset Having worked his way up through British Steel; Lee went on to work for Kone, managing an extensive maintenance portfolio worth £1.5 million before securing his new role with Door Group. With his sights set on growing the team and developing Door Group’s service offering, Lee’s extensive history working in the mechanical and construction industry will bring a wealth of experience to his new position. Kevin Campbell, Sales Director at Door Group, comments: “We are delighted to have Lee join the team. His extensive knowledge of the service and maintenance industry will be a valuable asset to our business moving forward.” Develop new opportunities “The additional investment in our Repair, Service and Maintenance department is part of our commitment to further enhancing this offering to our customers, as well as enabling us to work proactively with our existing clients and develop new opportunities.” Lee adds: “I am really looking forward to sharing my expertise with the business, using my past learnings to bring my very best to Door Group in order to help customers get the most out of their doorsets.” Door Group is one of the few organisations to offer a complete doorset solution, as well as service and maintenance packages for end users and major contractors.
Openpath, a pioneer in workplace technology and security, unveils at ISC West 2019 its new Elevator Board and Partner Portal to provide channel partners, property managers and tenants with even more comprehensive and convenient office security systems. Elevator Board enables Openpath to connect commercial spaces under a single, streamlined and secure mobile access system. And now, with Partner Portal, integrators can access best-in-class training and education online, enabling them to easily implement the best possible solutions for customers. Top-notch technology for system integrators While many mobile access systems rely on only Wi-Fi, Bluetooth or LTE, Openpath’s proprietary Triple Unlock technology utilises all three methodsAlex Kazerani, Openpath’s co-founder and CEO, said: “We are excited to provide our partners with the elevator solution they have been asking for. By bringing Openpath’s signature convenience and ease of use to the elevator, we ensure every single interaction tenants have with an Openpath-equipped building is frictionless, from the parking garage to their desk. “The tandem release of Elevator Board and Partner Portal highlights our continued dedication to providing system integrators with both the top-notch technology that their customers want and the resources they need to easily and efficiently install our solutions.” The market demand for highly reliable, convenient and secure access control solutions continues to expand as integrators and customers seek mobile access solutions that actually work. While many mobile access systems rely on only Wi-Fi, Bluetooth or LTE, Openpath’s proprietary Triple Unlock technology utilises all three methods, exclusively guaranteeing the system remains online at all times and providing users with the most reliable, seamless experience every time they use the Openpath solution. Ability to handle mobile credentials Openpath’s unique ability to handle smartphone-based credentials, and the Elevator Board’s offerings, are especially exciting"Tully Zipkin, President at Global Integrated Technologies, Inc. said: “We recently showed the Openpath system, including its Elevator Board, to one of our long-term clients. Prior to completing the demonstration, the client noted that Openpath’s offerings were ‘exactly what they’d been looking for,’ and decided they would purchase the solution.” Regarding Openpath’s solutions, Mr. Zipkin states, “Over the past 30 years working in the access control industry, I have witnessed the market evolve and customers’ needs change. The Openpath product provides exciting features which, in today’s IT-centric environment, are desirable. In particular, Openpath’s unique ability to handle smartphone-based credentials, and the Elevator Board’s offerings, are especially exciting. “Having now installed multiple systems, Global’s technician’s integrators and clients are very impressed with Openpath’s technical support, training, and overall willingness to assist to ensure a smooth delivery. The speed and ease with which both Global and our clients have been able to implement the Openpath solution is impressive.” Openpath Elevator Board Elevator Board’s features include touch access for fast and convenient, hands-free, keyless entryElevator Board brings Openpath’s award-winning mobile access technology to the elevator. With the addition of Elevator Board to the Openpath product lineup, a single credential - a smartphone - can be used to access an office’s parking garage, building entrance, elevator and office door. Elevator Board’s features include: Smaller form factor with and easier installation process resulting in less downtime Easy wiring with removable connector blocks USB ports for streamlined product updates Touch access for fast and convenient, hands-free, keyless entry More efficient performance with customisable user permissions and the ability to place elevators on a schedule Proprietary Triple Unlock Technology Support for up to 16 floors and two Openpath Smart Readers Partner Portal learning platform Partner Portal is an online learning platform that enables system integrators to complete technical and sales training, as well as earn, manage and maintain their Openpath Certified Integrator certifications virtually and at their own pace. Some of the valuable features system integrators can access via Partner Portal include: Lead distribution Co-branded digital sales collateral Exclusive online training and certification Resource library Certified Installer Assets Opportunity registration Openpath will be displaying its new Elevator Board at ISC West April 10 - 12 at the Sands Expo Center, booth #23051.
Allegion, a provider of security products and solutions, announced its ENGAGE IP Gateway integrated with the latest version of RS2 Technologies’ Access It! Universal.Net software. RS2 Technologies released Version 7 of its software on March 11, which enables it to support Schlage Control, Schlage LE and Schlage NDE wireless locks as well as the Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options via the ENGAGE IP Gateway. “Allegion is excited to grow our offering with RS2 Technologies and provide end users more flexibility when it comes to electronic access control,” said Robert Lydic, VP of PACS/ OEM Business at Allegion. “This IP-based integration gives our customers the scalable and cost-effective options they need. By completing this integration and incorporating our new Von Duprin RU and RM kits, the opportunities for the RS2 community have been expanded significantly.” Real-time access control Ethernet connectivity to the network enables real-time access control directly from an in- or out-of-network host to an edge deviceThe RS2 Technologies’ integration with the ENGAGE IP Gateway eliminates the need of an access control panel, which enables customers to grow the number of access control secured doors while maintaining their budgets. The ENGAGE Gateway provides the ability to leverage existing IP-based infrastructure for maximum efficiency. Ethernet connectivity to the network enables real-time access control directly from an in- or out-of-network host to an edge device. To further simplify installation, the Gateway can be powered over Ethernet (PoE), removing the need for separate power supplies or wiring. The ENGAGE Gateway performs regular, frequent communication between the Gateway and linked ENGAGE enabled devices. The Gateway is able to send commands such as lock and unlock from an IP host in real-time. Commands are executed in less than five seconds. As an Internet of Things (IoT) device, the Gateway leverages network security practices, including AES-256 bit and TLS encryption, to provide customers with secure, dependable experiences. Solutions for housing and education markets The ENGAGE IP Gateway integration allows us to deepen our support for specific verticals"RS2 customers were already able to utilise its Access It! Universal.Net with the Schlage NDE, LE and AD Series locks. This integration of the new software with the ENGAGE IP Gateway will further support the Schlage LE and NDE locks, and it adds the Schlage Control and Von Duprin perimeter security solutions to the offering. “In addition to expanding our scalable, flexible solutions for our integrators and end users, the ENGAGE IP Gateway integration allows us to deepen our support for specific verticals,” said Jeff Bransfield, national sales manager at RS2 Technologies. “We’ve seen demand from the multifamily housing market for the Schlage Control locks. And the Von Duprin RU and RM options are an excellent fit for the education market and larger venues. Adding these to our portfolio through the IP-based integration will help us better serve our customer bases.” Schlage Control Smart Deadbolts The Von Duprin RU and RM options expand the reach of the access control system to perimeter openings beyond main entrancesThe Schlage Control Smart Deadbolts offer highly scalable, efficiency-boosting capabilities so that multifamily properties can focus on operating more profitably—and with greater appeal for residents. Property managers can configure and manage access from virtually anywhere and moving to smart credentials eliminate the costs and hassles of managing keys. The Von Duprin RU and RM options expand the reach of the access control system to perimeter openings beyond main entrances. The Von Duprin RU option retrofit kit for exit devices is a cost-effective solution that enables remote locking (undogging) for centralised lock down and door status monitoring. The RM option is a sensor-only configuration for exit only or fire rate doors that require monitoring. Version 7.0 of Access It! Universal.NET, an industry-leading access control solution, continues to deliver a complete access control solution at an unsurpassed value. Access It! Universal.NET Version 7.0 is built with a focus on interoperability, security and scalability. New features include expanded support for leading hardware solutions, destination dispatch, expanded reporting and filtering, QR codes for badging and operating modes for enhanced system control and flexibility.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, has announced the introduction of “touch io”, a new Bluetooth reader and credentialing option for smartphones designed for use with the company’s cloud-based access control solution, pdk io. Touch io Bluetooth reader touch io does not require the user to unlock the phone in order to gain access through a protected door Touch io brings new levels of convenience and security for the communication between smart phones and access control door readers, eliminating the need for cards or fobs. Unlike other systems, touch io does not require the user to unlock the phone, or to even remove it from pocket or purse, in order to gain access through a protected door. The individual’s identity is validated through communication directly between his/her credentialed device and the reader, via Bluetooth, bypassing the need for internet or cellular connectivity. This can occur from distances as far as 30 feet away, as defined by the customer. By the time the user reaches the door and indicates an intent to enter, by simply touching or tapping a hand to the reader, door activation is immediate and seamless. A combination of machine-learning algorithms that learn door opening patterns, combined with directional antennae placed on each side of controlled doorways, ensure that credentials are not inadvertently validated when employees pass in proximity to the doors from the unlocked side. Superior security Compared to traditional RFID proximity cards, as well as to more high-tech 13MHz contactless smart cards, PDK’s mobile credentials offer superior security on many fronts. Touch io credentials are impossible to clone, each possessing a randomly-generated, unique ID, are authenticated by the Bluetooth reader at each use, and employ a session-unique encryption key for communication with the reader. Furthermore, if a phone is lost or stolen, its owner can immediately deactivate the credential by remotely wiping the phone with a tool like “Find My Phone,” a precaution he or she is likely to take out of concern for other personal data also stored on the device. By contrast, if a wallet or keys are lost that contain a card or fob, the credential remains active until the company’s system administrator is notified of the loss – which may sometimes take days. Cloud-based access control We are making the use of smartphones both more convenient and more secure than traditional methods" The touch io reader is compatible with legacy systems, capable of reading traditional proximity cards. Mobile credentialing is available as part of the pdk io affordable system licensing plan, offering users an unlimited number of credentials for a low, per reader, annual subscription. System administrator can easily generate and assign these to employees with just a few clicks from within the pdk io software management interface. Josh Perry, Chief Technology Officer at PDK, explains, “Until now, the access control market has been filled with Bluetooth mobile credentialing options that offer an inferior customer experience to traditional RFID cards which are, quite frankly, reliable and convenient. With PDK’s touch io, we are redefining the category, making the use of smartphones both more convenient and more secure than traditional methods. It’s the latest example of how our corporate commitment to innovation is bringing a litany of tangible benefits to the security professionals, system administrators and the employees who use our systems every day.”
Matrix, global manufacturer and provider of telecom and security solutions, is participating in the Secutech India 2019, to be held at the Bombay Convention & Exhibition Centre (BEC) in Mumbai from the 25th to the 27th of April 2019. Matrix will be showcasing its high-tech range of IP video surveillance and access control solutions at the event. IP cameras with SONY STARVIS series sensors The entire solution focuses on automating processes and enhancing efficiency Matrix will be showcasing an enterprise-grade video management solution (VMS) designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. We will also be showcasing a new range of Audio compatible and compact Professional Series IP cameras powered by SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. Furthermore, we will be showcasing our new Extreme series of network video recorders (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. COSEC ARGO door controller Matrix is known for offering technology driven, innovative, futuristic solutions catering to diverse and complex deployments especially for the SMB, SME and large enterprises. At this event, Matrix Comsec is going to unveil COSEC ARGO – the next generation door controller with a blend of performance and aesthetics. The door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistance (IK08). Our solution experts will be demonstrating the standalone access control solution and exhibiting the Aadhaar-enabled biometric attendance system. Or solution experts will also showcase some extraordinary biometric door controllers useful for applications in time-attendance, access control, visitor management, cafeteria management and more. PARISAT MS100 video conferencing solution Matrix Telecom domain will be showcasing its enterprise meeting server – PARISAT. An enterprise-grade video conferencing solution, PARISAT MS100 can conduct meetings between people spread across multiple locations and time zones. It brings all the participants face-to-face in a virtual conference. This makes their presence, communication and information sharing as good and as easy as if they all were physically present in a real conference room. With 12-party HD video conferencing, PARISAT brings meetings to life. At the event, Matrix will also highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP, for such applications, Matrix ETERNITY NENX is a perfect fit.
Identiv, Inc. announces that it will present its recently expanded Internet of Things (IoT) product portfolio at ISC West 2019, encompassing a wide range of physical and logical access control, video and data analytics, door readers, identity cards, visitor management, mobile security, telephone entry, and radio-frequency identification (RFID) and near-field communication (NFC) solutions for physical and IT-secured businesses. Identiv will be showcasing demos of its complete portfolio of high-performance IoT solutions for government, banking, healthcare, critical infrastructure, retail, and other industries at ISC West 2019, booth L13. Newly acquired and developed solutions The company will have some of its newly acquired and developed solutions on display, including: Enterphone integrates with Freedom and Liberty and will be introduced to the U.S. market for the first time at ISC West Web/Cloud and IoT-Based Architecture - Newly acquired Freedom and Liberty Access Control product lines provide cloud-based, frictionless, cyber-secure access control. Freedom’s software-defined platform and new mobile app enable IoT-driven access control for enterprises and governments. Liberty provides an entry-level, web-based scalable solution for small-to-medium businesses (SMBs). Video and Data Analytics - 3VR by Identiv’s video intelligence solutions provide a single platform for real-time security, analytics, and consumer insights, allowing organisations to protect their employees, customers, and assets, as well as enhance store operations and shopping experiences. 3VR is now fully integrated with Hirsch Velocity. Mobile Security - Thursby by Identiv software solutions provide strong government-grade security for government agency, enterprise, and personal mobility, supporting bring-your-own-device (BYOD) and two-factor authentication (2FA) on mobile devices. Access Control - Identiv’s new Hirsch Mx-1-ME (Metal Enclosure) Controller manages a single fully supervised door for controlled entry and exit at the edge and is protected by a metal enclosure with battery backup and power supply. Phone Entry - Over two million tenants in 35,000 installations within residential and mixed-use properties depend on the Enterphone by Identiv telephone entry system for secure visitor access. Enterphone integrates with Freedom and Liberty and will be introduced to the U.S. market for the first time at ISC West. Secure IoT Tags - Identiv’s high-frequency (HF) and ultra high-frequency (UHF) transponders bring smart identities and security to the IoT, digitising and enabling high-growth applications, like medical devices, athletic apparel, and pharmaceuticals. Identiv’s new Tamper Detection NTAG 424 DNA Tag strengthens IoT security for anti-counterfeiting, document authentication, supply chain traceability, data access, and customer engagement. Physical security industry This year, join Mark Allen, General Manager, Physical Access Systems at Identiv, Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions (DSS), and Joe White, President at A-1 Lock, as they present “In Between the Lock and Controller: Why Wireless Locks Are Changing the Game in Access Control” during ISC West on 11th April, 2019, 11:00 AM – 12 PM (IST). The International Security Conference and Exposition — also known as ISC West — is the largest event in the U.S. for the physical security industry, covering access control, alarms and monitoring, biometrics, IP security, video surveillance/CCTV, networked security products, and more.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Delivering on high expectations, the first day of ISC West 2019 kicked off with a crowded Sands Expo Center and exhibitors putting forward their best new technologies. Developments seemed more evolutionary than revolutionary, but attendees quickly found plenty of interest. Thermal cameras Hanwha Techwin also showed off a new Android camera that can deploy new apps The largest booth at ISC West, Hanwha Techwin, remained crowded throughout the first day as attendees checked out the company’s eight new thermal cameras offering features such as pan-tilt-zoom, H.265 encoding to minimise storage needs, VGA resolution and detection of temperature changes, all built on Hanwha Techwin’s Wisenet chip. There is also a new 5-megapixel version of Hanwha’s popular 2-megapixel multi-sensor camera, and a new panoramic camera; multi-sensor panoramic cameras ‘stitch’ the images together rather than just aligning them. Hanwha Techwin also showed off a new Android camera that can deploy new apps developed as part of the Korean company’s role as a founding member of Open Security & Safety Alliance (OSSA). Avigilon's H5 series Avigilon is introducing a new line of cameras — the H5 series — with improved imaging and designed to provide deep learning/neural network processing at the edge. Improvements to video analytics will enable the cameras to track multiple moving objects simultaneously in a field of view and to track objects more accurately. More granularity enables better differentiation among types of vehicles, and the cameras enable more detailed data to be pulled from video. The improved analytics engine will also support better face detection and recognition. Operators can view the dashboard and react to information provided in a more digestible format The new version of Avigilon Control Center 7 (ACC7) software will apply principles of AI to enhance an operator’s ‘Focus of Attention’ when monitoring live video. Video is fed into an AI engine that determines which events in the live footage are most worthy of an operator’s attention. Monitoring live video can be a challenge for human operators, whose short attention spans undermine the best surveillance systems. Automation helps to direct that limited attention span to events most worthy of attention. A ‘dashboard’ displays clusters of cameras that are colour-coded to reflect the types of activity that are detected. Rather than watching video, operators can view the dashboard and react to information provided in a more digestible format. Clicking brings up the live video. Quantum Cloud Storage Platform Video storage is another area of innovation at ISC West. The Quantum Cloud Storage Platform is flexible for video surveillance and industrial IoT applications. The architecture is built from the ground up for video surveillance applications and can scale from five cameras to millions of cameras in a simple deployment model — no settings or configurations needed. Products range from a small ‘mini-tower’ configuration for a retail store or gas station up to rack-mount servers that can accommodate thousands of cameras. We make the storage piece so simple that you don’t have to think about it" Quantum introduced the VS-Series in a range of server choices at ISC West. The hyperconverged and software-defined environment will support a combination of video management systems (VMS), along with access control, HVAC and lighting controls. Quantum worked with Johnson Controls to develop the products. “It’s designed for an installer, not for an IT guru,” says Jamie Lerner, Quantum’s CEO, President and Chairman of the Board. “We make the storage piece so simple that you don’t have to think about it.” Quantum is showing its VS-Series publicly for the risk time at ISC West. S2’s Magic Monitor LenelS2 is a newly coined name in the industry — resulting from a recent acquisition. The combination of Lenel and the acquired S2 is playing out to the benefit of both product lines. For example, Lenel’s Blue Diamond mobile credentialing system can now be used along with the S2 Netbox hardware. Lenel’s OnGuard is being combined into S2’s Magic Monitor unified solution that combines video, access control, and digital messaging. OnGuard is also benefitting from Magic Monitor’s graphics maps. The S2 Cumulus cloud-based service, focused on system health monitoring, is being applied to OnGuard. LenelS2 is also developing a full commercial access control as a service (ACaaS) offering The combined LenelS2 is stepping up with new solutions for frictionless access control, too. A ‘phone as a badge’ approach enables a door to be unlocked by a smart phone, even if it is in a pocket, locked and/or the app has not been opened. Another alternative is a ‘shake to open’ action that sends the credential to the nearest reader. LenelS2 is also developing a full commercial access control as a service (ACaaS) offering, which is being previewed at ISC Show and will be released commercially later in the year. Video surveillance product line Mobotix is expanding its MOVE video surveillance product line with six new models announced at the show and broadening its reach into new vertical markets. A solutions approach offers both end-to-end Mobotix systems and other systems offered in conjunction with technology partnerships displayed in the Mobotix booth. Top of the list of new verticals is education, and Mobotix’s edge-based approach includes programmable logic built in so that ‘technology can take over when the human element is the weakest.’ Automated response is faster and ‘seconds equal lives’ during an emergency. In an education scenario, the Mobotix system acts as an Internet of Things (IoT) device that offers more functionality than other manufacturers’ ‘cameras.’ There are 22 steps involved to ensure the cybersecurity of Mobotix products, reflecting a higher level of cybersecurity commitment Mobotix has thermal products that are also finding uses in a variety of verticals, from oil and gas to manufacturing process control. Mobotix systems that can detect defects in products in the manufacturing process are expanding usage in applications beyond the traditional ‘security’ industry. Cybersecurity Commitment Mobotix is looking at the market in a completely different way, redefining how their products can fit into a variety of scenarios, and with a focus on cybersecurity. There are 22 steps involved to ensure the cybersecurity of Mobotix products, reflecting a higher level of cybersecurity commitment than some other manufacturers. “There are so many features within our solutions, and we want to get the word out to the end users, so they understand the features,” says Thomas Lausten, Mobotix CEO. “There is untapped potential.”
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System helps in tailgating mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy enrolment and deployment Enrolment in the system is easy. Companies can deploy a separate enrolment station, or any reader can be used for enrolment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrolment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting intent from positioning of eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces that its SmartCode 888 Deadbolt Lock was chosen to become part of the new Home is Connected smart home system from D.R. Horton, Inc. The inclusion of Kwikset’s SmartCode 888 in the system was based on its value (great functionality at an entry-level price), reliability, and high degree of security. Incorporating the latest Z-Wave 500 chipset, the SmartCode 888 offers keyless entry through a convenient, easy-to-use touchpad. Kwikset’s patented Home Connect technology enables the lock to wirelessly communicate with other devices in the home through a third-party smart home controller, as well as to remotely check the door lock status, lock or unlock the door and receive notifications. Innovative program D.R. Horton’s Home Is Connected system is included in the base price of each new home from the company’s family of brands D.R. Horton’s 'Home Is Connected' system is included in the base price of each new home from the company’s family of brands. The system includes a robust central hub by Qolsys that controls the smart home features, including a home alarm and automation platform by Alarm.com, Honeywell Home thermostat from Resideo, smart switches by Eaton Corporation, video doorbell by SkyBell and hands-free, voice-first experiences with Amazon Alexa. “We are pleased to be part of such an innovative program created by the nation’s largest volume homebuilder,” said Dave Seeman, Director of National Builder Accounts, Kwikset and Baldwin, Spectrum Brands, Inc. – Hardware & Home Improvement Division. Convenience of keyless entry “We are confident that buyers of D.R. Horton homes will not only appreciate the security and convenience of keyless entry that our SmartCode 888 provides, but also the endless benefits of whole home automation. To be a part of a system that includes such well-known, reputable brands indicates to us the high level of trust D.R. Horton puts in our products.” Brad Conlon, Vice President of National Accounts for D.R. Horton, said, “We are pleased to work with Kwikset to provide this essential component to D.R. Horton’s new Home is Connected smart home system. We know our customers will appreciate the peace of mind that comes from Kwikset’s SmartCode 888 lock and the Home is Connected system overall.”
LOCKEN has been selected to modernise access management for half of all substations in Enedis’ national network. Following a test phase it has opted for the latest-generation intelligent key by Iseo, which uses contactless induction technology to guarantee instant access. The EDF subsidiary supplies electricity to consumer meters, through extremely high-voltage lines, located at its many substations. The solution is currently being introduced and full deployment across 1,100 substations will take place throughout 2019. Effective solution The construction principles for this type of structure require wide open spaces to keep people and equipment safe Substations transform the power from very high-voltage lines (90,000 V or 225,000 V) to high-voltage (20,000 V most often) and through to private homes (230V). Some sites may be located in urban settings. In this case, the substations are installed in underground infrastructure, like in Paris and its inner suburbs. But most are found in rural or semi-urban areas, covering a half or full hectare. The construction principles for this type of structure require wide open spaces to keep people and equipment safe. With perimeter security accessible through an outside gate, substations comprise a technical room and a number of transformers, which may be outside or under shelter. These facilities have many access points which must be secured. Without an effective solution, key management is complex and operational efficiency is reduced. Centralised management software Substations are sensitive sites with strictly controlled access. Given the exposure to electrical risk, intrusions present potentially lethal consequences. This is where the LOCKEN solution comes in: a single key with associated rights allows employees to open any area they require (and are authorised to access) as part of their job. A lost key is easily disabled within the centralised management software. The solution is particularly appropriate given the number of maintenance officers required by substations. Users are not all Enedis employees, explains Maxime Leboeuf, Project Manager at Enedis. “Although site workers are mostly Enedis employees, the sites must also be accessible to subcontractors for extension and renewal work and a number of maintenance operations, by employees of RTE, the electricity transmission system operator responsible for the very high-voltage lines which end at substations.” Electronic access management “Electronic access management drastically reduces the risk of intrusion associated with mechanical keys. With the Locken system, we can now authorise subcontractor access for a specified period and location. In the Enedis setup, the access rights memorised by the electronic keys must be updated daily by the key's user using the dedicated devices.” Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software" “Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software. This also provides a reliable crisis management tool.” At Enedis, LOCKEN has fitted outdoor access points in often isolated, rural areas. The key supplies the energy to open the cylinder so no wires are needed for doors. Extending electronic key The cylinder is approved to resist extreme weather conditions, especially the effects of water. Contactless technology also shields it from dust and oxidation. Enedis is considering the possibility of extending electronic key use to the most sensitive parts of its technical rooms, especially access to control and command rooms, the nerve centres of the substations. Enedis also plans to replace all substation cylinders to minimise the risks associated with joint activity, meaning a number of operations carried out by different engineers can take place simultaneously at the same substation.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces that the Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias CLOUD access control system throughout the redevelopment project. HTML Global, an IT Managed Services Provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals and boasts a wide array of features and amenities. Controlling common areas Both organisations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC-managed doors and those for a tenant company, Compass Health Center. The two organisations manage their own access separately but use some of the same network and PoE switches. BBC doors managed are mainly those controlling common areas and shared amenities— parking, fitness facility, rooftop terrace, and others—but also data rooms and other sensitive areas within the office space. Both organisations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global. Cloud-based system “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses—that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers—we can add one door or hundreds of doors upon request,” said Hunt. “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” Access control system Such high-level control and ease of use is accomplished with minimal hardware on site BBC controls access by zone and/or amenity for each credential holder, administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all-areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Fix things remotely Hunt again, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck—that’s very cost-effective.”
Comelit Door Entry has been specified as the stylish system of choice at the much anticipated, Renaissance Retirement’s new luxury independent living, Fleur-de-Lis site in Marlborough. The development of 28 superior one and two bedroom apartments, built on the former Old Yard is the first new build site of its kind in the town for over 10 years. Designed in part by ex-England Heritage consultants, it adopts an ‘arts and crafts style’ consisting of sweeping, sprocketed roofs, Voysey dormers and large chimneys. Door entry panels With Orestone Controls Limited being the preferred and specialist installer for Renaissance Retirement Limited With Orestone Controls Limited being the preferred and specialist installer for Renaissance Retirement Limited, the complete specification for the Fleur de Lis development right through to Comelit’s bespoke door entry panels, had to work with the ambition to present an independent lifestyle in a contemporary setting, and a modern and stylish environment. Says Paul Williams, Construction Director for Renaissance Retirement: “Fleur de Lis stands as one of our major new home launches. Not only does it look aspirational from the outside, but each apartment presents a real opportunity for those seeking to maintain a quality standard of independent living and uphold a luxury style of life.” Fully integrated solution “Throughout the project, from initial design through to specification and works completion, we have relied upon our trusted suppliers to advise on how to deliver on our vision. From a security perspective, it was integral that each of the properties connected to emergency call systems and 24-hour response, as well as an on-site concierge who is on hand to assist owners and oversee the development’s daily operation.” Orestone Controls worked with Renaissance Retirement right from the initial design and specification of security and fire systems on site, to installation, ensuring a fully integrated solution. For smart door entry, Comelit’s 2-wire SimpleBus system with mini handsfree monitors were selected to operate with KMS Access Control and FAAC gate control kit, installed to control the front gates and main entrance to the site. Seamless security experience And Fleur-de-Lis even takes this to the next level; to provide an exceptional standard of independent living"Richard Chadd, Orestone Controls’ Engineering Manager added: “We have worked with Renaissance Retirement Limited long enough to understand their requirements and high expectations to deliver luxury as standard. And Fleur-de-Lis even takes this to the next level; to provide an exceptional standard of independent living.” “Here, we had to consider each aspect of its specification in considerable detail, to ensure an impeccable finish. Comelit Group is globally renowned as a stylish door entry manufacturer and high specification solution. Its ability to integrate with selected gate and access control systems ensured we can create a seamless security experience.” At the Fleur-de-Lis development, warden and nurse call systems, operated through a specialist PA system presents residents with complete peace of mind that necessary services can be called in case of emergency. Independent retirement lifestyle Gareth Goodall, Comelit Business Development Manager concluded: “Renaissance Retirements’ exceptional Fleur-de-Lis development, in its provision of age-exclusive apartment living close to all the local amenities, is the ultimate choice for those desiring a peaceful and independent retirement lifestyle.” “To ensure success, security right from the perimeter through to apartment door entry, incorporating all community facilities, must be carefully balanced between ease of use for downsizers, integrated technology and with no compromise to quality or style. It’s something Comelit worked closely with Orestone to create a bespoke door entry solution.”
As increasing digital engagement powers forward in the hospitality industry, SALTO Systems has joined forces with the KeezApp technology platform to offer hotels an unrivalled guest experience. Property management systems The KeezApp platform provides a range of solutions for any property that hosts guests and is able to integrate with most PMS (Property Management Systems) on the market. Guests can check in from anywhere, receiving a virtual key straight to their smart phone and getting an alert when their room is ready for occupation. The front desk is then alerted when the guest has used the mobile key to enter their room even for doors equipped with offline electronic locks. The virtual app provides for access to all permitted areas of the hotel during their stay and when the time comes to check out, guests can again use KeezApp removing the need to queue at reception. KeezApp – SALTO software integration KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE Additional tools include live chat with the front desk. This provides a better, more efficient way for guests to talk and interact with the front desk whether they are in the hotel or out and about. Guests can also choose different departments to contact such as reception, concierge, housekeeping or room service depending on their needs. KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE. SALTO Hospitality add-ons include functionalities such as mobile keys (BLE), group check-in; real-time re-rooming and real-time extended stay. These plus other key hotel features make it easy to control all the offline and online rooms and back-of-house doors from different front desk guest workstations. SALTO electronic locks Both companies are driven by the opportunity for hotels to provide a superior guest experience to their clients, whether by offering mobile functionalities or superior management standards like quick check-in and check-out, online billing, live chat with reception, housekeeping and concierge or auto Wi-Fi connection for guests. SALTO welcomes new partnerships with industry leaders like KeezApp that will result in improved hospitality management and the guest experience. SALTO also continuously adds integrations with other technology providers so that those in the hospitality industry have a choice when it comes to which platform, they use to control SALTO’s robust line of electronic locks and supporting products.
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that a recently renovated office space in Glasgow, Scotland, 191 West George Street, has installed Lifeline Speedlane Swing optical turnstiles for increased physical security and uncompromising aesthetics. A rising trend in the United Kingdom is the renovation of older office spaces. With a continuously growing workforce, cities across the country are transforming corporate offices into multi-level spaces with increased aesthetics. In keeping with this trend, the office space at 191 West George Street recently underwent a renovation. Revamped with space and simplicity in mind, the building’s atrium stands out due to its high-quality materials, including the sleek, Lifeline Speedlane Swing optical turnstiles used to control access to all occupants and visitors. Optical turnstiles integrated with access control The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitorsThe lead architect renovating 191 West George Street was Michael Laird Associates – a firm that flourishes in adaptable yet luxurious designs. Working directly with the architects, owners of the office space underwent a simple product selection process regarding security. The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitors. 191 West George Street is the home of a 6-level building with 87,000 sq. ft. of usable office space. The architects wanted to keep the look and feel of the entire building, open and clean, without any columns or other impeding structures. The designers chose a stainless-steel finish for the modern and sleek cabinets of the Speedlane Swing optical turnstiles to provide a perfect accent for the neutral white and mushroom colours of the lobby. Their minimal footprint allows them to integrate seamlessly into any location without being obtrusive to user access or aesthetic design. Lobby security solution All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time191 was designed to be a bustling, flexible workspace for hundreds of daily users, and as space is rented and the building starts to experience higher traffic, the four lanes of optical turnstiles will be able to handle the load. Working in collaboration with Boon Edam’s sales and specification managers, the architect had a clear idea of what they were looking for in a lobby security solution. By reviewing a number of key elements related to security, throughput, aesthetics, safety, and technology, Boon Edam was able to map out all aspects of the entry requirements prior to selection and installation. The four-lane array of Speedlane Swing optical turnstiles includes a single, wide lane at the end. Wide lanes allow large groups to pass through as well as wheelchairs, dollies and luggage. All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time.
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?