Door access control
DHF has announced the launch of its Best Practice Guide entitled: How to obtain Key Copy Protection: security and protection advice regarding copying of keys which offers information on minimising the risk of a security breach by preventing the unauthorised copying of keys. To copy a key, it is necessary to obtain a suitable key “blank” onto which the individual key code can be copied. Many generic key blanks are readily available to UK locksmiths and key cutters, making obtai...
The ASSA ABLOY Door Hardware & Access Control Group has unveiled Openow, a new mobile solution for users of its SMARTair wireless access control system. Openow allows SMARTair users to open doors with their mobile phone and the Openow app, meaning access credentials can be granted, revoked and updated instantly, from wherever the user may be. Eliminating physical credentials By eliminating physical credentials, Openow helps ensure facilities managers, security administrators and business...
For applications requiring an extra layer of protection against moisture, vehicle exhaust, pool chemicals or extreme temperatures, Enhanced Weather Protection gives you the durability you need for years of service. Enhanced Weather Protection “A customer down in his Florida beach home just took out one of our analog EWP entry phones because he is changing to a VoIP service provider. The Viking unit was still fully functional even after 10+ years of service in that salty air.” &ndas...
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...
Controlsoft, global developer, manufacturer and distributor of access control solutions, has fully integrated its latest Identity Access platform with the Aperio wireless locking technology from the ASSA ABLOY Door Hardware & Access Control Group. Identity Access platform upgraded By updating and upgrading its Identity Access platform to fully integrate with the Aperio AH30 1-to-8 communication hub, Controlsoft’s customers can easily add mechanical doors to their existing access cont...
Transforming the way security teams monitor, manage and control multiple systems, Maxxess is launching its new, open-architecture InSite solution at IFSEC International, (London ExCel 18-20 June, stand IF2120). Maxxess InSite is a cyber-secure, cloud-based service that has been developed to give organisations impressive new levels of situational awareness and allow the most rapid, coordinated response to wide range of incidents, both emergency and non-emergency. InSite can pull data from a wid...
The ASSA ABLOY Door Hardware & Access Control Group has launched an innovative new door closer that offers unrivalled performance for user flexibility and fire safety for buildings in the healthcare, education and hospitality sectors. Unlike any other door closer in its class, the new DC300G-HF is a responsive solution, satisfying multiple door control issues for healthcare professionals, students, customers and staff. This includes flexible operation and use, while also maintaining full certification in all three modes and fitting configurations. The DC300G-HF is fully certified in all three modes: standard, free-swing and hold-open and all three fitting configurations– offering peace of mind and convenience for building owners, managers and installers, that they are legally covered. Meets fire safety requirements The new door closer is CE Marked to EN 1154 and EN 1155 in all three configurationsThere are hundreds of door-closing devices available but, when analysing their capabilities, it becomes apparent that not all are created equal. This not only applies to their adherence to fire safety laws, but also accessibility regulations. Simply put, in light of the Equality Act (2010) and Approved Document M, a building should be accessible to all – without restriction or the need for assistance. The DC300G-HF helps meet and surpass both fire safety and accessibility requirements. In the event of a fire, it reverts to a mechanical mode, either free-swing or hold-open mode. Uniquely, and for the very first time, the DC300G-HF has all the features and certification required to meet these demands, across all three modes and configurations. The new door closer is CE Marked (a legal requirement under the Construction Products Regulation) to EN 1154 and EN 1155 in all three configurations. Furthermore, soft-motion release (from 130-75 degrees) means the door is progressively shut, preventing damage to the door set and injury to users. BS 8300-2:2018 compliant door closer The DC300G-HF is also BS 8300-2:2018 compliant. Its safety credentials and performance (free-swing or hold-open mode with variable power EN 3-6) retains low opening forces, making it the ideal product for environments with high volumes of traffic, such as schools or hotels, and where users experience movement difficulty or strength issues, like care homes. The DC300G-HF offers a step-change in functionality, with all three modes in one product The DC300G-HF is also incredibly flexible and cost-effective. Switching between modes on other electro-mechanical door closers can be difficult and time consuming. Often, two separate products or additional parts are required. The DC300G-HF offers a step-change in functionality, with all three modes in one product. Users can switch within seconds by simply adjusting three small bolts. High-quality, tested door closer Developed, designed and tested in the UK for the UK market, the closer is also easy to retrofit and upgrade with no re-drilling required, so fire certification is not compromised. Wiring on the hinge side and a non-polarity sensitive connection also makes wiring easy. David Hindle, Head of Door Closer Sales at ASSA ABLOY Opening Solutions UK & Ireland, said: “A unique combination of flexibility and full certification makes the DC300G-HF the best-in-class, electro-mechanical rack and pinion door closer, for changing door use in busy environments. Each unit is individually tested and inspected and bears the high quality, award-winning design and guaranteed durability you come to expect from an ASSA ABLOY door closer. “Our new DC300G-HF door closer is also part of a full suite of products, ensuring we can satisfy any requirements for high-performing and reliable door controls.”
Meesons, one of the UK’s leading specialists in entrance control, has strengthened its commercial team as part of its ongoing business expansion. Ciprian (Cip) Cioclei, joins as Business Development Manager for London and the South East and has a wealth of experience in the access solutions industry gained over the past 10 years. At Meesons, he will be responsible for developing new business opportunities for the company’s renowned products, including Speed Gates and Security Portals for the new build and refurbishment markets. Physical entrance control solutions expert Cip has extensive knowledge of working with system integrators looking for a robust physical entrance control solution Cip has extensive knowledge of working with architects, contractors and system integrators looking for a robust physical entrance control solution, which means Meesons customers will gain from his extensive understanding of this specialist area. Prior to joining Meesons, Cip worked at a global security and entrance systems company. Recent installations and the development of innovative new products at Meesons was a strong signal to Cip that the company was moving forward and was a key player in the entrance control market. Meesons has grown significantly in this market over the last few years with a large number of high profile installations, many in iconic buildings throughout the UK. Construction and engineering major The Meesons team has been strengthened further with the appointment of Nic Cowley as Project Manager for London and the South East. He will work alongside Meesons’ existing team of Project Managers. Nic brings with him extensive experience of managing construction projects from call off, scheduling, installation, commissioning and hand over. Meesons customers will benefit from his extensive experience in the construction industry and his proven track record of delivering projects efficiently, on time and within budget. Speed Gate and Security Portal solutions The appointment of these two industry specialists mean that Meesons' customers will continue to receive a joined up approach from the first point of contact, through to handing the completed Speed Gate or Security Portal solution over to the client. “We have strengthened our team in the South due to continued business growth and our pipeline of projects to deliver”, said Michael Clark, Chief Operating Officer at Meesons. “We feel it is important to offer our customers an end-to-end solution from first enquiry through to completion on site. Both Cip and Nic bring a wealth of experience with them. Security specifiers that choose Meesons can be assured that they are partnering with the UK’s trusted entry control innovator.” Entry control solutions Meesons has supplied and installed its Speed Gates and Security Portals into a number of landmark buildings With over 30 years’ worth of experience delivering secure entry control solutions, Meesons has supplied and installed its Speed Gates and Security Portals into a number of landmark buildings. This has included recent projects such as 10 South Colonnade, St James Market, Southbank Place, The Scalpel, 1 Canada Square and 2 London Wall Place, all located in the city, along with many other sites across a wide range of sectors throughout the UK. Meesons has recently introduced a number of innovative, first to market products including its C3 and C190-S1 to S3 Security Portals, the first in the world to gain approval to Loss Prevention Standard (LPS) 1175: Issue 7 Security Ratings 1 to 3 and Secured by Design. FPJ140 2SF Security Portals More recent innovations include its FPJ140 2SF Security Portals achieving fire protection and smoke control on both sides of the flat side doors as per the European Fire Resistance norm: EN 13501-2 & EN 1634-1: 2014. Meesons is committed to developing innovative new products where there is a market need, in line with its mission to ‘help you keep your premises and staff safe and secure from unauthorised personnel’. Meesons is on target to deliver significant growth during 2019, with strategic plans in place to continue this throughout 2020 and beyond.
Videx, a manufacturer and supplier in access control and door entry kits, has added new features and functionality to its GSMPRO intercom system that provides users with much greater freedom and security. The GSMPRO, which is now expandable to an eight-door access control system, enables people to answer calls to their front door or gate from their mobile phone or landline, so they never have to miss that important visitor and are made aware of who has visited even when they are not there. The GSMPRO is now available with an integrated back lit coded keypad, with up to 400 access codes and 32 temporary codes, which can be programmed to expire after a number of hours, to meet all your access control needs. Codes can also be programmed via PC software and remotely via SMS, enabling greater flexibility. A new app is also available for both Android and iOS which simplifies the process of sending SMS messages. Optimum access control for organisations It's an eight-door access control system, with the ability to add up to seven extra keypad or proximity access entrances"Commenting on the new features, Neil Thomas, National Sales Manager at Videx UK, said: “Our new generation GSMPRO now boasts many more features which makes it an ideal access control choice for a greater range of businesses and organisations. “For example, it now has free access time bands enabling users to set up to 10 time periods where the entrance is held open, for specific hours of the day and on specific days of the week, which makes it perfect for housing associations, warehouses and offices. It’s also now an eight-door access control system, with the ability to add up to seven extra keypad or proximity access entrances. Additional entrances connect back to the GSMPRO via an RS485 bus using standard CAT5 cable.” Many of the new features have been the result of special requests from customers which have been found to be good additions to the system and have allowed the GSM range to be used on installations with complex requirements. Viewing events in real time What’s also useful is that alerts can be programmed, where an email will be sent should that alert be triggered"Neil continued: “A great new feature is that the system now carries a new remote event log that can be accessed online, allowing events to be viewed in real time, on the move via a phone, tablet/laptop. It's a great security feature because it’s where a record is kept of calls, gate/door openings and much more. “What’s also useful is that alerts can be programmed, where an email will be sent should that alert be triggered. For example, if the gate or door is opened out of normal hours – any unusual activity is flagged.” There are several new programming commands too, included to make the system very easy to set up and simple to use. For example, it is now possible to program all telephone numbers (primary and divert numbers) of an apartment in a single SMS message and program up to five dial to open numbers in a single SMS.
Partitioned systems and a new evidence vault with cryptographic fingerprinting are among a cluster of improvements for Inner Range’s intelligent access control and intruder detection system, Integriti. Version 19 system update The Version 19 system update is expected to be available to all new and existing Integriti customers in June. The update introduces ‘partitioned sites’, which allows security managers to create users and other global entities that only exist within the partition they were created in. This is particularly useful for multi-tenanted buildings because the partitions are completely isolated and invisible to users in other partitions. The evidence vault allows files to be stored securely without taking up space in database back-ups The evidence vault allows files to be stored securely without taking up space in database back-ups. Users can add MD5 and SHA-256 cryptographic hashes to ensure files are not tampered with, while CCTV footage and snapshots associated with certain alerts can be automatically saved to the vault. Fine grain permissions allow the operator high levels of control over who can store or retrieve evidence items. Enhancements in the Version 19 update: An overhaul of Integriti’s CCTV interface so it now supports multiple standard layout configurations and is more user-friendly. Operators can now synchronise users and access events with Kone’s next-generation ACI HLI lift platform. Anew ModBus TCP Slave allows third parties to use the Modbus protocol to monitor and control doors, areas and other inputs. High-level camera and alarm integration is now possible. Integrated devices, such as cameras and intercoms, can trigger inputs in Integriti’s intruder detection system. Tim Northwood, General Manager at Inner Range, said: “The ability to automatically save images and film to a secure place without bloating back-up files - and adding cryptographic hashes for extra security - is a great addition to Integriti’s offer. As is the ability to separate system users into isolated partitions. These features – and all our latest enhancements - offer genuine improvements for access and security.” Integriti intelligent access control system Integriti is our flagship intelligent integrated access control and intruder detection system" “Integriti is our flagship intelligent integrated access control and intruder detection system and it continues to evolve to ensure clients get robust safety and security from an intuitive system that security managers want to use.” Inner Range will be showcasing these enhancements for Integriti as well as new capabilities for its flexible yet budget-friendly Inception access control system at IFSEC International on June 18-20 at ExCel London at Stand IF1030. The Inner Range stand will include eight large screens to demonstrate the manufacturer’s access control systems and software in action. Inner Range will also be taking part in the event’s ‘Show Me How’ series of demonstrations, with an Inception challenge for installers and integrators. Intelligent security solutions expert Inner Range has been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies, government and critical national infrastructure.
Craig Birch, Product Category Manager at UNION, outlines what the new grade 5 for BS 8607 includes, why it has been introduced and the benefits that it can help deliver. At present, mechanically operated push button locksets are not typically security products, but rather access control ones. For example, think about the last time you went to your local doctor’s surgery. No doubt there will have been a lock on the door behind the receptionist, protecting the sensitive information they hold – a demand that has become only more critical with the introduction of the new General Data Protection Regulation (GDPR). However, the truth is that the lock protecting the restricted area in question is probably little more than a tubular latch. Essentially, it’s not a security device, but rather one that is used for convenience to simply meet the access control needs of a site. BS 8607 standard for push button lockets BS 8607 offers a series of grades that the push button locks can meet for strength and robustness However, BS 8607 – a standard for mechanically operated push button locksets – offers a series of grades that these locks can meet for strength and robustness. Introduced only recently, grade 5 is the newest and most stringent level for delivering assured security and access control. But what does it offer that grade 4 does not? The British Standards Institution (BSI) states that BS 8607:2014 specifies the requirements and test methods for durability, strength and function for mechanically operated push button locksets and their locking plates for use on doors, windows doors and entrance doors in buildings. Grade 4 and 5 of BS 8607 Both grade 4 and grade 5 of BS 8607 stipulate that products meeting these standards must be suitable for ‘applications where security, abuse and usage levels are expected to be equivalent to BS 3621’, which relates to thief-resistant locks. But if the security, abuse and usage levels are the same, what then is the difference between the two grades? Significance of integral locking units Put simply, those rated as grade 4 can only achieve this standard with the help of an integral additional locking unit. So, with a grade 4 product, users must lock and unlock the solution from the inside with a key, and then operate the push button from the outside to unlock a door. In contrast, a mechanically operated push button lockset that meets grade 5 standards provides a ‘one-stop’ security and access control solution; one that does not require a separate locking unit. In short, with a grade 5 product the latch and lock are integrated and tested together, without the need for an additional key. The result is a solution that offers keyless egress. This means that, when it shuts, a grade 5 solution automatically locks. Then, should you need to exit a room, it’s simply a one handle operation to unlock the door. Automatic locking solutions With a grade 5 solution, security is assured as the door will lock automatically While it’s intended that both grade 4 and 5 devices offer the same resistance to attack and it’s simply the way it is locked that is different, the fact that a user has to physically lock a door themselves with a grade 4 product means the technology is reliant on key holders to secure the premises themselves. Ultimately, users have to take responsibility and ownership for the security of a site. But with a grade 5 solution, security is assured as the door will lock automatically. Essentially, grade 5 has been introduced because it provides a BSI Kitemark approved certification. This means any mechanically operated push button locksets advertised as meeting grade 5 standards will be fully tested and inspected to this certification, offering complete peace of mind to users, installers and specifiers. Grade 5 electronic locking solutions As a result, there is no question that a grade 5 product will meet the security and access control needs that so many commercial environments demand. A grade 4 product is reliant on an additional locking unit that meets BS 3621 being used too, whereas a grade 5 solution delivers assured protection and access control in a single package. Finally, the BSI Kitemark for a grade 5 solution is an official stamp of approval for the quality of the service offered. To date, it is this combination of security and convenience that has not yet been seen in mechanically operated push button devices. Grade 5 of BS 8607 looks set to change all that.
EVVA has upgraded its electronic access control system Xesar. "The EVVA developers have given Xesar 3.0 a total upgrade and equipped it with Service Pack 1,” said Erich Gärtner, Head of the Xesar Product Management department. With Service Pack 1, it is now even easier for EVVA partners and Xesar users to manage their facilities. It equips Xesar with a huge range of new features, while also making the system considerably more intuitive to use. User-friendly features "The new upgrades are all based on our principle of simple and intuitive operation. Our main objective was to make the new features as simple as possible for the user," according to Gärtner. One of the most important new features is, for example, that software updates can be run while the system is being serviced, saving time.Filter settings that need to be used repeatedly can be saved as presets in the user data The help messages are also new. They are displayed by clicking on question marks that are highlighted in yellow and can be hidden again with a click, without completing disappearing. They can answer questions about operating the device and explain particular input boxes, lists or fields. It is also now even easier to manage lists in the system: "For me, the filter preset function is one of the most user-friendly innovations," Gärtner said. Filter settings that need to be used repeatedly can be saved as presets in the user data. The number of presets is unlimited and they can be changed at any time. Automatic backups "There will now be automatic backups when you start and stop the system in the installation manager," Gärtner explained. You can specify a time for a backup to be performed every dayYou can, however, also specify a time for a backup to be performed every day or you can still run a backup manually. An automatic backup is performed before every update, which makes data loss almost impossible. It is especially easy to organise user groups. With Xesar 3.0, user groups can now be organised easily and can be customised according to your requirements. Existing user groups can be copied, altered and assigned either only read permission or full write permission. "All in all, top-notch service! The more than 25 other functions, which I could not list here, are proof of this," said Gärtner.
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase in revenue for dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, connected smart locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio of home automation products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages of professional installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realise they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realise that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling additional home automation products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labour warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces connection instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realise over time. On the other hand, one issue DIYers may recognise right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognisable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not everyone is a DIY customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing complete and custom solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
Among the cloud’s many impacts on the physical security market is a democratisation of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annual licensing previously made a typical electronic card access system cost-prohibitive. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The benefit for the integrator is recurring revenue that increases their profitability The benefit for the integrator is recurring revenue. While helping clients save money on server, software and IT infrastructure costs, integrators secure recurring revenue that increases their profitability. Building recurring revenue not only provides cash flow but also keeps a manufacturer’s name on the top of the minds of customers and leads to additional sales. Mobile access Continued investment in mobile access and cloud technology is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. Managing access control for end users in different verticals is challenging, thus it’s necessary to deploy wireless, technologically-advanced solutions While the security industry has traditionally been slow to adopt IT technologies, the cloud is the exception. Large IT industry cloud players such as Amazon Web Services, Microsoft, and Google are being used by security industry professionals to provide systems that are easier to install, maintain, and administer and are far more secure and less expensive than a customer can provide on their own. Advancing cloud technology Cloud technologies give people access through their mobile phones and other devices Enterprise customers increasingly want to be able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. They seek to create trusted environments within which they can deliver valuable new user experiences; in effect, there is a demand for “digital cohesion.” Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Application programming interfaces Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. Cloud-based platforms, APIs will help bridge biometrics and access control in the enterprise “A big growth driver for the cloud is demand from enterprises that no longer look at access control simply for securing doors, data and other assets,” says Hilding Arrehed, Vice President of Cloud Services, HID Global, one of our Expert Panelists. “They want to create trusted environments within which they can deliver valuable new experiences to users. Cloud technologies make this possible by enabling people to use mobile devices for new applications and capabilities.”Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise Cloud-based platforms For example, cloud-based platforms will provide the backbone for quickly adding complementary applications like biometrics, secure print, virtual photo IDs, and vending as well as other access control use cases and emerging permission-based capabilities yet to be developed. “Cloud-based platforms facilitate new managed service models for mobile IDs and secure issuance and will fuel simplified development environments and easy integration into vertical solutions,” says Arrehed. “They have the potential to give organisations greater flexibility to upgrade and scale security infrastructure, improve maintenance and efficiency, and accelerate ROI.”
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing key cards and fobs with app Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognises which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable access control systems for SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. The Nexkey controller costs $999, and the core is $499. Monthly fees start at $15 to $29 per month per door, but the prices go down as additional doors are added. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favour simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving security dealers and integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalising that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS to measure product quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analysing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the biggest news is perhaps the possible long-term impact of first-time exhibitor Security and Safety Things (SAST), a Bosch startup. SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for integrators. SOCs (system-on-chips inside cameras) are becoming much more capable" Their 1,800-square-foot booth was big for a first-time exhibitor, and the American football theme was well received, as was the substance of the company’s effort to drive innovation in a highly fragmented industry. Seeing actual cameras and apps on display at the ISC West booth is “more real than PowerPoint,” says Hartmut Schaper, CEO of Security and Safety Things (SAST). “For us, seeing is believing,” says Schaper. “It was important for us to show cameras and apps for the first time. People are surprised at how far down the road we are.” “This dynamic will change in the industry,” says Schaper. “SOCs (system-on-chips inside cameras) are becoming much more capable. Soon there will be more processing power on the edge. People will find a way to use the extra processing power.” “Seeing is believing” at the SAST booth at ISC West 2019, where CEO Hartmut Schaper showed several manufacturers’ cameras whose functionality can be expanded using Android apps Developing more apps Several large manufacturers are already involved in the initiative, but there are some holdouts. “We are having ongoing talks with everyone to convince them to join,” Schaper says. “Some of the bigger ones will come around. We are not a camera manufacturer, and not a threat. We are owned by Bosch but are managed completely separately. There will be more and more apps developed, and momentum will increase.” “A year from now we will have successful customers we can talk about, and more camera manufacturers on board,” he says. “This year we are taxiing on the runway, but next year we will have cleared the tarmac and be climbing.” If the approach succeeds, their first appearance at ISC West will be remembered as historic. Future of surveillance cameras Off the show floor, in a nearby meeting room, chip maker Ambarella demonstrated technologies that will be driving the future of video surveillance cameras, including more intelligence at the edge. “People have been using more traditional video analytics approaches, though most of them have been disappointing,” says Chris Day, Ambarella VP of Marketing and Business Development. “What is ground-breaking now is the use of neural networks and real artificial intelligence, which has increased capabilities 100x. "You will see camera products coming out over the next year that are massively better than before. It’s not just incrementally getting better. Cameras will be coming out later this year with analytics that are absolutely amazing based on [the new chips.]” Larry Anderson, editor-in-chief of SecurityInformed.com, talks about Ambarella HDR and Low Light Solutions with Jerome Gigot, Senior Director of Marketing for Ambarella. (Source: Ambarella) New systems-on-chips Ambarella has introduced four new systems-on-chips (SoCs) in the last year, with emphasis on computer vision (video analytics). The newest is the S6LM Camera SoC with 4K imaging technology, unveiled at ISC West. The S6LM includes Ambarella's latest high dynamic range (HDR) and low-light processing technology, highly efficient 4K H.264 and H.265 encoding, multi-streaming, on-chip 360-degree de-warping, cyber-security features, and a quad-core CPU. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff" “With so much focus on AI and computer vision, I’m concerned the industry has taken focus away from low light imaging, wide dynamic range and image quality,” says Day. “You have to see the details in an image. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff, it’s all included in one chip.” From products to systems With a new general manager on board (Daniel Gundlach, formerly of Bosch), FLIR Systems Security Division is continuing its transition from a product company to a solutions provider, removing internal silos to clear the path. FLIR offers a strong end-to-end portfolio for Smart Cities applications, including the TruWITNESS line of body worn cameras and newly acquired Aeryon drones. FLIR’s historical strength as the top thermal imaging provider continues, but today they are much more than a thermal imaging company, offering visible day/night cameras, infrared pan-tilt-zoom cameras, video management systems and other technologies to provide a broader platform. FLIR's Saros security cameras combine multiple security technologies, including thermal sensors, high-resolution visible imaging, IR and visible LED illuminators, onboard analytics and two-way audio and digital input/outputs. Products in critical infrastructure applications In addition to Safe Cities, FLIR installs a range of products in critical infrastructure applications, such as oil and gas and electric utilities. Ports also tend to combine traditional security with an emphasis on perimeter protection, a FLIR strength. Existing perimeter protection applications can open opportunities for the broader platform. For example, installing a complete system in an airport that already uses FLIR’s thermal technology represents “low-hanging fruit” for the company, says Fredrik Wallberg, FLIR Director of Marketing – Security and Intelligent Transportation Systems. Ambarella demonstrates its latest imaging technology for video security during ISC West 2019 (Source: Ambarella) Integrated solutions Bosch's focus At the Bosch booth, there was an emphasis on integrated solutions and the customer experience. A mock retail store setup demonstrated systems such as overhead cameras for people counting and alarm communication to provide an alert if a refrigerator door is left ajar. A wireless panic button generates a silent alarm, communicates with a 2-way radio, and triggers a camera to focus on the area. An AVIOTEK IP camera alarms if there is a fire, based on observing actual flames rather than smoke. A new Bosch fixed dome camera series offers wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. Set-up only takes three steps: install the mounting bracket, connect the cables, and attach the camera module. Commissioning can be done wirelessly or remotely with no need for ladders or lifts. Dahua marks five years in the U.S. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view Time flies in the security industry, and it has already been five years since the Dahua brand entered the U.S. market. Today the company offers products through ADI and some 20 distributors, and has more than 30 technical consultants and technical support employees and 50 or 60 sales people in the field (including independent rep firms). “We are growing,” says Tim Shen, Director of Marketing at Dahua Technology USA. “It’s exciting for the company.” At ISC West, Dahua introduced a line of Multi-Flex panoramic cameras with lens modules that can be repositioned along an internal track for 180-, 270- or 360-degree views, providing flexibility for integrators. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view. Cost savings come from ease of installation (one camera instead of four) and only one VMS license (instead of four). AI and night colour cameras Dahua is also emphasising its Night Colour cameras that remain in full colour mode regardless of how dark it gets. There is no IR illumination or IR cut filter – the camera stays in color mode and displays any visible image in colour with as little as 1 lux of illumination. The 2 megapixel version is on display at ISC West, and a 4 megapixel version will come in the fall. A year ago at ISC West, Dahua emphasised its initiatives in artificial intelligence (AI) in order to position the company as a technology leader. This year, the message was more general – ‘Power Through Technology.’ The range of Dahua technologies includes AI, Night Colour, Starlight low-light imaging, fifth-generation HDCVI, and e-POE (Enhanced Power over Ethernet). Dahua USA's Director of Marketing says "the market itself likes AI", and expects more AI applications to follow (Source: Dahua USA's LinkedIn) “When we present AI to customers, they are happy, but when it comes to the budget they don’t have it,” says Shen. “The market itself likes AI, and it’s very much a buzzword. But we still need a proof of concept that it can do something good for end users. We need time to develop broader applications. The ‘smart retail’ market and education are good places to start.” he says. “AI is for project business,” adds Jennifer Hackenburg, Dahua’s Senior Product Marketing Manager. “Projects that are looking at AI haven’t come to fruition yet; they are still in the pipeline. It’s not for your everyday business. They are implementing it, but not as fast.” Access control beyond doors Access control should extend beyond doors. That’s the message I heard at the ASSA ABLOY booth, which displayed a variety of physical locks and intelligent access systems. An example is traffic cabinets, those metal boxes in public locations that could potentially be accessed to invade an internal network. ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces throughout an enterprise. The company’s ‘security continuum’ message draws attention to the need for the right level of security for the right opening, using existing infrastructure as well as new electronic technologies. “Customers face a combination of non-traditional access control and questions on how they can secure things that are not doors,” says David Corbin, ASSA ABLOY Director of Access Control Accessories. The security message is resonating beyond the traditional security department to involve other stakeholders in an enterprise, including IT directors. There is new awareness of vulnerabilities that have been there forever, such as traffic cabinets that can be opened with a key purchased on eBay.
CoreRFID supplies the UK's largest outsourcing company Serco with 100,000 RFID access cards for its Caledonian Sleeper railway service. The cards will provide passengers with access to rooms and will improve security on routes between London and Scotland. The cards are completely re-usable and replace paper-based RFID tickets, which were judged to not be as cost effective in the long-term. Specialist locks Serco had specialist locks provided by a Spanish company and needed cards which were compatible" Munzi Ali, technical director of CoreRFID comments: “Our knowledge and experience on similar work in the hotel industry helped us to meet the challenges of this project. Serco had specialist locks provided by a Spanish company and needed cards which were compatible. Consultancy is a big part of the larger projects we undertake and we were able to solve the issue with Serco.” The Caledonian Sleeper service, which is operated by Serco as a standalone franchise, can trace its origins back to 1873. It serves a number of destinations in Scotland - including Inverness, Aberdeen, Fort William, Glasgow and Edinburgh - on route to and from Euston Station. RFID solutions Graham Kelly, guest experience director at Serco Caledonian Sleeper, said: "Our new trains are designed to improve every aspect of the guest experience. We strive to deliver a hotel experience and a major part of that is having keycard entry for rooms. We've only been running our new trains for a few weeks but the feedback from guests on the keycard has been excellent, with CoreRFID's solution proving extremely effective." Ali added: “RFID solutions can provide real benefits in efficiency, costs and in this case significantly cutting down on waste.” CoreRFID's clients include ICL, London Underground and Thomas Cook.
Zayed University is the newest of three government sponsored higher education institutes in the United Arab Emirates. The campus is located on the mainland of the Emirate of Abu Dhabi, near the Abu Dhabi International Airport and Masdar. The 229,000m campus houses six colleges across 28 separate buildings, including faculty and administration buildings, a childcare facility, residence halls, classrooms, science and computer labs, cafeterias and a sports complex, all equipped with the latest technology. Future development plans will see the student population increase to 7,500 and the campus grow to cover a net area of 269,000m. Access to and from the campus is an important concern for Zayed University and is carefully managed around the clock to keep the 6,000 strong student body safe. Managing gate barriers and doors Banner sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowedThe university employs Serco to implement and manage their security requirements. Serco partnered with Gallagher, selecting the Command Centre security platform to manage gate barriers and access controlled doors with just under 650 MIFARE readers and 130 controllers across the site. Zayed University implements a policy to provide students with a secure campus environment. This includes managing the entry and exit of the students based on their scheduled classes. To achieve this, Zayed University runs an interface between Command Centre and its Banner system. Banner is a comprehensive computer information system that contains information on courses, students, faculty, staff and alumni, including financial aid, finance and human resource components. Entry and exit requests for students to pass through the campus gates are sent from Command Centre to the Banner system for approval, using the Command Centre OPC Alarms and Events interface. Based on the time of the entry or exit and the student’s schedule, the Banner system decides whether the request is accepted or denied. Banner then sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowed. Safe and secure environment for students Its intuitive user interface provides flexibility and easy management of operations"Gallagher security solutions provide the assurance and the knowledge that movement throughout campus is managed simply and efficiently to ensure a safe, secure environment. “Keeping students safe is of utmost importance to us,” says Mukesh Karsan, Serco IT Manager at Zayed University. “The Gallagher system helps us honour this commitment. Its intuitive user interface provides flexibility and easy management of operations.” He adds that he’s been “impressed with the reliability and robustness the system offers; it’s powerful, versatile and allows security personnel to carry out their day-to-day responsibilities with efficiency.” Gallagher solutions are trusted by education providers worldwide to: issue student and faculty access cards manage individual access rights control campus and dormitory access secure computer labs, science labs and other high-value assets integrate with scheduling and resource booking systems evacuate or lock down sites in case of an emergency Time and money saving solutions From intelligent integration with building management systems, to people and time efficiencies gained through automation and smart use of resources, Gallagher designs solutions that save time and money. Whether it’s across multiple zones within a single campus, or over multiple campuses, Gallagher solutions offer an intelligent, powerful way to ensure business continuity, protection of assets and keeping people safe.
As a major transportation hub in Northeastern China, Changchun Longjia International Airport processes a huge amount of passengers every year. In response to massive economic growth in the region, the airport – with a total volume of almost 13 million passengers in 2018 – needed an additional terminal. Built over the course of three years, the state-of-the-art Terminal 2 building covers a total area of 55,600 square meters. Since its opening in October 2018, the expansive Terminal 2 building has been serving all domestic flights from 22 airlines including Air China, Shenzhen Airlines and Shandong Airlines while international flights are now concentrated in Terminal 1. Meeting airport security guidelines Bosch received the contract based on a proven track record of large-scale airport security installationsLooking to safeguard this vital new infrastructure, the airport security managers wanted to integrate video security, intrusion detection, public address and access control for staff within one platform while meeting current government security guidelines for airports. Since 2017, these laws include mandatory storage of all video data for a 90-day period, which puts a premium on adequate data storage in a space covered by over 1,000 cameras around the clock. Given the project’s massive scale, managers wanted to work with a one-stop provider to ensure seamless integration of all solutions and delivery according to stringent timelines with end-to-end security intact on opening day. After diligent market research, Bosch received the contract based on a proven track record of large-scale airport security installations and the ability to connect all components – video security, intrusion alarms, access control and public address systems – on the Building Integration System (BIS). Installation of IP dome cameras Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh wintersFor video security, Bosch experts installed nearly 1,500 cameras inside and outside Terminal 2, including moving cameras such as the AUTODOME IP 4000i and IP 5000i and FLEXIDOME IP 6000 VR series. All IP-based cameras are centrally managed on the Bosch Video Management System (BVMS) and support security personnel by detecting threats and triggering automated alerts via built-in Essential Video Analytics. Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh winters. And to maintain a small data footprint while meeting the legal obligation for 90-day data storage, the cameras use efficient H.265 compression technology, thereby reducing bandwidth to a low 2 Mbps and storage space by up to 50 percent compared to other cameras. As a direct result, security managers in Changchun have been able to achieve savings in the number of networked storage units as well as energy consumption and cooling cost for the server room. Unified management of access control “The reduced bandwidth leading to a fewer number of storage cabinets in the server room was a major reason why our client opted for the Bosch solution,” said Mustaine Hu, Technical Support Manager at Bosch Building Technologies. The Building Integration System supports unified management of access control for airport personnel at 350 doorsMeeting another key customer requirement, the Building Integration System (BIS) from Bosch supports unified management of access control for airport personnel at nearly 350 doors. A combination of card reader and video security eliminates the risk of non-employees accessing critical areas with a stolen card and creates a seamless passage for authorised staff without additional screening. Bringing security full circle, the installed public address system allows security personnel to broadcast real-time announcements via more than 1,200 ceiling loudspeakers. The system ensures controlled evacuation in emergency situations and also sounds alarms triggered by connected intrusion sensors to alert personnel. Security for travellers and personnel Fully operative since the grand opening of Terminal 2, the Bosch system now provides end-to-end security for travellers, personnel and property at Changchun Longjia International Airport. As a scalable and IP-based system, it is future-proof to accommodate further expansions and has delivered cost savings on video storage and power consumption since day one. In face of China’s rapid economic growth, about 200 of the country’s 497 airports will require similar expansions over the coming years, making Changchun an important reference for Bosch Building Technologies in the region.
A boiler business subjected to hundreds of thousands of pounds of theft has installed Palisade fencing, electric doors and barriers to combat the threat. Perimeter security specialists Fieg Access Systems (FAS Ltd) of Madeley have beefed up protection at the victimised business on recommendations made by security consultant John Bracewell. He recommended Palisade fencing from Wolverhampton steel fencing manufacturer Zaun Ltd, the first panels of which were delivered within a week. Bracewell said: “Their service was excellent; their product is always top quality; and their lead times and delivery were great – and the combination of measures should drive the thieves away.” Uncompromised site security Zaun’s Palisade fencing comes with either ‘D’ or ‘W’ and with three different pale head options – triple point, round and notched and single point – in heights from 1.2m to 3.6m. Palisade fencing panels can be easily raked to follow the undulations of the site without compromising the rigidity of the system or the security of the site. Zaun is the sole remaining manufacturer of Palisade, welded and woven mesh fencing systems that manufactures the entire system in the UK. FAS Ltd was initially set up to provide the end user with a repair and service provider of perimeter security and access control equipment. The business now fabricates its own gates and supplementary equipment from a factory in Madeley, Telford.
PotashCorp is the world’s largest fertilizer company by volume. They have facilities and business interests in seven countries and are dedicated to the challenges of feeding the world’s growing population. PotashCorp produces three primary crop nutrients – potash, phosphate, and nitrogen. Recognised as the world’s leading potash producer, they are responsible for 20 percent of the global capacity. Their facility in Lima, Ohio is one of four locations whose primary function is to create a range of products including ammonia, urea, nitric acid, and nitrogen solutions. Safety is PotashCorp’s number one priority, and this is evident in the number of awards they’ve received. Management are committed to providing a healthy work environment where employees have a strong personal safety ethic, rooted in awareness and focussed on incident prevention. Implementing a cost-effective solution We found that no other product could compare to Gallagher – its feature set, open API, competencies, and price"Security concerns and the need to implement a more cost-effective solution led PotashCorp to discover Gallagher. “We were looking for a system that would allow for seamless integration. After thorough research, we found that no other product could compare to Gallagher – its feature set, open Application Programming Interfaced (API), competencies, and price. The choice was easy,” says Jeff Johnston, Network Administrator for PotashCorp. “The cost of the product along with its capabilities is incomparable in the market.” It made sense for PotashCorp to replace their entire security system rather than updating an outdated and deteriorating system. Safe and secure working environment Driven to providing a best-in-class, safe, and secure working environment, PotashCorp partnered with the Digital C.O.P.S. Division of Perry proTECH, a business technology solutions company, and Gallagher, to develop a customised security solution. The system needed to be fully integrated, scalable and expandable, digitally based, and user-friendly. Benefits of PotashCorp’s new security solution include: Video integration, for safety precautions and oversight Wireless lock integration, utilising Salto locks out in the field on network cabinets User-friendly report generation, creating cost and time savings PotashCorp will soon implement Gallagher Mobile Connect, a secure and convenient access solution that allows people to use their smart phone in place of an access card. Greater efficiency in plant turnaround Gallagher Command Centre provides the flexibility to easily add cardholders to the existing databasePotashCorp is required to undertake a plant turnaround every four to five years. A turnaround, or shutdown, is a scheduled period of non-production, during which day-to-day plant operations cease. All focus shifts to maintenance, cleaning, inspection, and repair, with employees and contractors working around the clock preparing the plant to resume its regular operations. Turnarounds are one of the most crucial events in the routine operation of a chemical industrial plant and are extremely costly, due to production time lost, increased labour costs and equipment expenses. Speed and efficiency is vital as the turnaround process has the ability to strongly affect a company’s bottom line. PotashCorp can have an additional one thousand contractors and staff onsite during a turnaround. Gallagher Command Centre provides the flexibility to easily add cardholders to the existing database, while enabling management and video operators to monitor cardholder movement throughout the plant. Executing a timely turnaround that stays within budget makes a huge contribution to the plant’s efficiency and drives the company’s future success. Immediate headcount in event of emergency Mike Resar, PotashCorp’s Safety, Health and Environmental Manager at the Lima site noted, “The safety of our employees and contractors is of the highest concern for us. We are now able to generate muster reports that provide an immediate headcount in the event of an onsite emergency. We can also produce time reports easily and without the need for external programming help.” By upgrading legacy system and performing the interface with Gallagher, PotashCorp realised a $20,000 savingOne of the world’s largest chemical companies and a leading manufacturer of petrochemicals resides on the PotashCorp site and shares several turnstiles. Both companies selected Gallagher, and a system-to-system integration was developed, allowing control of the turnstiles and several doors to be shared between the two companies. Tangible cost savings By upgrading their legacy system and performing the interface with Gallagher, PotashCorp realised an immediate $20,000 saving. As the system expands, the savings have continued. After thoroughly vetting their options, PotashCorp has found that the cost per door will be one-quarter less than that of their previous system. They are still witnessing a substantial return on their investment. With the recent addition of four controllers and twelve readers, selecting Gallagher has saved PotashCorp nearly $70,000. “The open integration, cost savings, and ease of reporting is truly remarkable. The difference and quality of the system is undeniable in comparison to what we had prior to Gallagher Command Centre,” says Jeff.
Boon Edam Inc., globally renowned security entrances and architectural revolving doors manufacturer, has announced that a multi-story office building in London was recently refurbished to upgrade its existing Boon Edam revolving doors and optical turnstiles. Now adorning the entrance are two all-glass Crystal TQ revolving doors, accompanied by an array of slim Lifeline Speedlane Swing optical turnstiles in the lobby. Revolving doors, optical turnstiles Originally opened in 1980, Riverscape is a 63,000 square foot, multi-story office space located at 10 Queen Street Place. The modern development sits on the sought-after area of the River Thames, just minutes from the bustling area of Cannon Street Station. Recently, the building owners decided to upgrade the look and feel of Riverscape, incorporating the current trends of open atriums, flexible floor space and usable rooftop space. Project also included the replacement of legacy Boon Edam revolving doors and optical turnstiles with updated solutions The refurbishment project also included the replacement of legacy Boon Edam revolving doors and optical turnstiles with updated solutions. Leading the design of the renovation were architect Aukett Swanke; interior designer Barr Gazetas; and Overbury as main contractors. High-tech security entrances As is common with older entrance installations, Riverscape decided to renew its revolving doors and optical turnstiles to achieve a more modern look and feel, and to upgrade the associated technology. The client returned to Boon Edam when selecting their new entrance solutions. At the main entrance to the office space, the existing TQM manual doors were replaced with two, tall Crystal TQ revolving doors. Constructed virtually completely from glass with minimal stainless steel accents, the Crystal TQ accentuates Riverscape’s all-glass façade, providing an elegant and timeless entry experience for all employees and guests. Lifeline Speedlane Swing In the main atrium space, the original Speedlane 900 optical turnstiles were upgraded to the new Lifeline Speedlane Swings. The Speedlane Swing combines security with aesthetics and is particularly popular because it features the slimmest cabinets in the industry – only four inches wide. To enhance security at the facility, Riverscape wanted a solution for monitoring and managing visitors to the office space. To enhance security at the facility, Riverscape wanted a solution for monitoring and managing visitors to the office space To achieve this, they decided to integrate the Lifeline Boost access control pedestal with their Speedlane Swing optical turnstiles. The Boost attaches to the end of the Swing and allows for integration with a variety of access control technologies, such as biometric devices, card collectors and barcode scanners. Integrated technology Employees enter the work area by scanning their credentials at the turnstile itself, while guests are issued a temporary access card with a special barcode that is scanned at the Boost pedestal. The Boost retains the card, enabling the reception staff to eventually reuse that card for future guests. “Using our barcode scanners, visitors can book in with reception, receive an entrance card and badge in and out conveniently through the lanes,” says Boon Edam Limited’s Field service Sales Executive, Graham Coulter.
Round table discussion
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?