Kwikset, a brand of Spectrum Brands, Inc. – Hardware and Home Improvement Division, global residential security solutions provider, announced the availability of a new Control4 version of its Signature Series Deadbolt with Home Connect. Utilising the popular Kwikset single-cylinder deadbolt as its foundation, this keypad-less lock is ideal for homeowners seeking the safety and peace of mind of a Home Connect solution who are already using or are considering a Control4 Smart Home.
Remote locking and unlocking
As a Connects with Control4 certified partner, the new version for Control4 enables true remote locking and unlocking, allowing homeowners to access and control the lock from anywhere in the world, using the Control4 OS or Control4 App on a smartphone, tablet or internet connected device. As a result, they can lock a door while traveling for work or vacation and can also remotely provide access to their home to service providers, guests or other family members. Users can also receive notifications of the lock’s activity, as well as creating customised scenes within the home.
A new, discreet way to connect to the home, the Control4-ready Kwikset Signature Series Deadbolt is ideal for consumers uncomfortable with keypad entry or who prefer the aesthetics of a traditional deadbolt. Besides its use as a highly secure front-door lock, it can also be a great solution for extending connectivity to side and back doors.
Control4-ready Kwikset Signature Series Deadbolt Users can change out both the interior and exterior of their current door lock to gain a smart lock
A unique feature of the Control4-ready is the two installation possibilities available to homeowners:
Replace the Entire Deadbolt: Users can change out both the interior and exterior of their current door lock to gain a smart lock. In this mode, the lock provides Kwikset’s patented SmartKey Security, which protects against advanced break-in techniques. It also allows homeowners to re-key the lock themselves in seconds. Traditional key functionality as a backup is also available.
Convert Installation Application: Users can replace just the interior of the current door lock to convert it into a smart lock, maintaining the aesthetics of the current lock exterior. In this mode it is compatible with select, single-cylinder deadbolts including Kwikset, Weiser, Schlage, and Baldwin.
Keith Brandon, Kwikset’s Divisional Vice President – Residential Access Solutions (RAS) Sales and Marketing, noted that this new version for Control4 is a natural extension of one of the company’s most popular locks.
Signature Series Deadbolt with Home Connect The Signature Series Deadbolt has become an extremely popular, affordable lock that brings homeowners the convenience of remote locking and unlocking"
“The Signature Series Deadbolt has become an extremely popular, affordable lock that brings homeowners the convenience of remote locking and unlocking from anywhere in the world,” he said. “It made perfect sense to bring this convenience and security to the users of Control4, a well-established smart home platform that is experiencing its own level of significant growth.”
The Signature Series Deadbolt with Home Connect also features: BHMA Grade 2 Certification, ensuring top quality durability; UL Certification with a 20-minute fire rating; and full 128-bit encryption security. In addition, the lock’s revolutionary tapered deadbolt design enables misaligned doors to lock without pulling and pushing a door shut.
Remarkably easy to install, the new deadbolts require just a screwdriver, need no hard wiring, and operate on 4 AA batteries that will last for approximately one year.
LifeSafety Power Inc. heads to the Global Security Exchange (formerly ASIS International Conference and Exhibits), September 24- September 27 in Las Vegas, riding the coattails of recent product awards and groundbreaking innovation in power, security and access control.
With continued advancements created by LifeSafety Power in intelligent networking, users can now get a real-time look at the health of power-connected solutions across an enterprise or single location. This data, helps them proactively predict and preempt component failure (such as a failing electronic lock), assess overall solution integrity and perform managed power services.
MSM-Enterprise and ProWire Unified Power
Booth 2765 will feature Multi-Site Manager-Enterprise (MSM-Enterprise), named a Security Today 2018 New Product of the Year. MSM-Enterprise is PC-software driven and has the ability to manage hundreds of power-connected systems, extracting critical information on the well-being of components. MSM-Enterprise provides detailed data on operability and viability through information gathered on power variances or voltage events. As a result, users can monitor, assess, maintain and troubleshoot proactively for greater system uptime.
MSM-Enterprise provides detailed data on operability and viability through information gathered on power variances or voltage eventsAlso, at GSX18, LifeSafety Power will showcase a new standard in power—ProWire Unified Power access management systems. ProWire makes it simple to create a connected power campus, eliminating installation variability for consistent, repeatable and professional results. UL/ULC certified, ProWire’s precision wiring design shaves off hours of internal panel wiring. Network-connected ProWire systems can also interface directly into Mercury Security or Software House C●Cure 9000 platforms, allowing users to receive, manage and control alerts and notifications.
FlexPower Unified Power and DCLASS
LifeSafety Power will also feature its flagship, modular FlexPower Unified Power and new integration with Digital Monitoring Products (DCLASS). DCLASS features mechanical and electrical integration of power, access control hardware and lock power in a single, certified enclosure supporting two to 18 doors of access control. DCLASS is designed to easily add networking capabilities for intelligent data collection, battery management and monitored power services.
Additional products on display during the show include Vantage, a best-in-class pricing, performance and value in a ready-to-install power system; and Gemini, the award-winning rackmount configuration that solves small space dilemmas with a sleek footprint integrating power and access control. New integrations with technology partners Integrated Control Technology (ICT) and Identiv Inc. will also be featured at the booth.
ABP Technology, global specialty distributor for IP technology solutions, is now distributing end-to-end environmental monitoring and access control solutions from Kentix, the manufacturer of innovative smart building security products.
Kentix Access Control solutions Kentix products available from ABP Tech include the Kentix MultiSensor and Kentix Access Control solutions
Kentix products available from ABP Tech include the Kentix MultiSensor and Kentix Access Control solutions. ABP Tech serves as the Master Distributor of Kentix products across the Americas.
“Half of all IT outages have a physical cause like fire or water damage and environmental damage downtimes are much longer – and more expensive – to fix”, said ABP Tech CEO & President, Robert Messer.
“Just like a firewall protects data, the Kentix MultiSensor protects a network’s physical infrastructure in a compact, and very powerful, device,” he said.
Kentix MultiSensor monitoring solution
The Kentix MultiSensor is an end-to-end environmental monitoring solution that protects critical assets, valuable storage areas, technical systems, and IT and communication equipment by detecting 37 types of physical threats that can lead to catastrophic events. It can replace multiple individual solutions like temperature and humidity control, alarm, intrusion or presence detection, smoke, gases and/or early fire detection – saving about two-thirds of the typical cost – while channeling these alarms in a more targeted way. The Kentix MultiSensor is completely IP-based and is scalable up to 500 units.
Impressively, the Kentix MultiSensor, an all-in-one environmental monitoring solution has received renowned ISO27001 certification. ISO27001 is the European gold standard in protection requirements for Information Security Management Systems (ISMS).
“Moving toward stringent standards like ISO27001 – even though they aren’t yet a requirement in the United States – can help security providers enact the end-to-end protection that is so critical to comprehensive security operations,” said Messer.
Kentix DoorLock Kentix Access Control solutions including the Kentix DoorLock are as equally as impressive as the MultiSensor"
“Kentix Access Control solutions including the Kentix DoorLock are as equally as impressive as the MultiSensor,” said Messer.
“Kentix offers less expensive access control than competing systems, requires less equipment and takes less installation time – with no software fees and no servers,” he said.
PoE and dual-door controller
Kentix Access Control includes PoE to the dual-door controller smart edge-device and door card-reader/keypad units running an embedded, license-free, zero-cost software solution with Active Directory that can scale up to hundreds of locks.
The minimalistic design of Kentix’s Access Control solution makes installation fast and simple and serves an aesthetic purpose; it’s a slick, small cube that is made to operate efficiently. It’s also designed to secure the physical IP network since the PoE connection stays inside and does not go to the door reader. This eliminates the threat of vandals or attempts to infiltrate a network via tapping into an RJ45.
Software and system integration
Kentix’s MultiSensor and Access Control products can be used separately or together since the Kentix Access Control system interfaces directly into the Kentix MultiSensor environmental monitoring system. All doors controlled by Kentix can also be linked to nearby Mobotix or Axis IP video surveillance cameras and programmed to record video of all access control events for easy auditing and referencing.
“We’re excited to be able to bring environmental monitoring and access control products and support to system integrators and dealers seeking innovative and comprehensive security solutions from quality manufacturers like Kentix,” said Messer.
Ping Identity, global provider of identity defined security, has announced that it has been honored with the API World 2018 Award in the “Best in API Security” category. Its AI-driven cybersecurity solution, PingIntelligence for APIs, brings an increased level of security and intelligence into how APIs are accessed and used.
PingIntelligence for APIs The 2018 API Awards celebrate technical innovation, adoption and reception in the API and microservices industry. To support judging process, the program leverages an advisory board made up of seven industry veterans. Out of hundreds of nominations, these expert judges selected PingIntelligence for APIs based on three criteria: reputation among the developer and engineering community, recent visibility and awareness, and product innovation.
“APIs are increasingly used by hackers to breach organisations and steal data. API infrastructures need strong cyber protection now,” said Bernard Harguindeguy, SVP, Identity Intelligence, Ping Identity. “With our PingIntelligence for APIs solution, organisations of all sizes have the ability to track the use of their APIs and automatically block identified API threats.”
Artificial Intelligence and Cybersecurity
PingIntelligence for APIs uses artificial intelligence to deliver a high level of visibility and cyber protectionPingIntelligence for APIs uses artificial intelligence to deliver a high level of visibility and cyber protection to any API infrastructure. This applies to internal- and external-facing APIs and for environments with or without API gateways. The solution helps:
Autodiscover all active APIs and associated URLs so that none are forgotten or overlooked.
Deliver deep visibility into all API activity at scale for forensic or compliance reporting, all actions on APIs are captured and consolidated for easy access.
Identify and automatically blocks cyber-attacks that use APIs to compromise data or gain control, with no predefined rules or attack signatures, unlike today’s analytical tools with no API awareness.
Prevent hackers from reconnecting after termination when attackers are identified, enforcement nodes automatically block access across all sites and clouds.
"Developers and engineers are becoming key influencers in their companies, because the technologies they use continue to matter more to their operations. Ping Identity is empowering developers to have a greater impact on security of products and IT,” said Geoff Domoracki, founder of DevNetwork, producer of API World and the 2018 API Awards.
The University of Nottingham is renowned for its research innovations. Its system to control access and to secure the facilities no longer reflected its commitment to excellence in the advancement of technology. Over the years, the University acquired several systems for access control, each with their own card technology.
Additionally, it had various platforms for its daily operations. Not only was maintaining all these different systems and technologies time-consuming, expensive and complex, it also limited a possible system expansion. Most of all, there was no clear overview of who was authorised to enter the premises and who was not. Time for change!
Single card access control system
AEOS can operate different locations from one central point and the system’s open architecture allows the use of both existing and new technologies
The University decided that it needed to do two things: switch to one single access control platform, upgrade the card system and revert to using one single card in the whole University. The reason to go for Nedap’s security system AEOS was that it provides all the functionalities that the University was looking for. It can operate different locations from one central point and the system’s open architecture allows the use of both existing and new technologies.
The existing cabling, for instance, could be utilised. After due consideration, all the access control systems were replaced by Nedap’s security platform AEOS. With 400 access points and 108 processing units (AEpus) attached to the existing IT infrastructure, the University was able to go back to one single security system to control the access and exit of its staff and students in the University’s buildings or parts thereof.
Unified card for different services
The replacement of 40,000 cards was logistically a challenge, but with the cooperation of the University this was also achieved. All students and staff now use a unified card for an array of services, i.e. proximity access, sports centre membership, photocopier authorisation, bus payment card and cashless catering. The decision to keep barcode and magnetic strip technologies was to maintain legacy systems, until such point as it is possible to move them to proximity technology.
People and vehicle access control specialist Nortech has recently seen St James’ Market in central London update and improve access to its site using Nedap’s uPASS Target system. Supplied by Nortech, Nedap’s uPASS Target was installed by leading supplier of integrated security systems Total Support Services (Security) Ltd, which was selected to supply the robust solution for long-range identification to its recently installed security gates at the market.
Total Support Services (Security) Ltd, TSS, which designs and engineers its own brand of security products and equipment, was able to use its 26 years of experience in specialised security products and services to provide the ideal security and access system that fitted the client’s needs. TSS selected the uPASS Target as it is easy to integrate with any existing access control system so users don’t need to get out of their vehicles to get into the development.
Reliable and easy to install system
Guy Bulmer, Director at Total Security Services commented, “We use Nortech as they are our ‘go-to’ provider for access control and vehicle identification systems. We have had a great relationship with them for nearly 20 years, ever since we were asked to install a Norpass system for some clients, and it just went from there.”
The uPASS Target is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots
He continued, “We certainly recommend Nortech products to others and we are very happy with the end result achieved for the client. We have our core products that we use because they are easy to install and they just work. Any issues are dealt with in a helpful and friendly way by the tech guys and we always get a reliable system at the end of it.”
Ideal for access control and monitoring activities
The uPASS Target is a robust solution for long-range identification of vehicles, people and rolling stock. It is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots. Its plug-and-play features enable it to be installed in just a few simple steps, and its variety of industry-standard communication interfaces support seamless integration into any existing or new third-party systems for access control, logistic operations, security and parking.
Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
As prime targets for criminals, banks have always faced major security challenges. But today, when banks are pressed to increase revenues, improve operational efficiency, and mitigate risk, defending against security threats is increasingly expensive. Two key drivers in the banking sector are customer trust and operational efficiency. Both are significantly strengthened by a quality integrated ‘smart’ banking security solution.
Smart banking security solution
A robust security strategy is of the highest priority and is usually embedded within the bank’s Risk Management Plan. This enables banks to manage operational risk and compliance demands. The modern approach to bank security design incorporates IT, Channel Management and Identity and Access Management systems into one solution.
At the heart of Vanderbilt, systems are compliance with some of the highest industry and regulatory standards. These systems impact all bank functions and help deliver greater trust, operational efficiencies, and excellent customer experience.
Vanderbilt video surveillance Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated
In the bank’s self-service area, Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated.
Meanwhile, Vanderbilt’s Seismic detectors protect ATM's 24/7. These detectors give immediate and reliable alerts of attacks on the enclosure, but unlike other detectors, do not register false alarms triggered by passing traffic or the vibrations of the ATM itself.
Seismic detectors and interlocking
Electronic security measures are also used in other banking situations – for example, when a customer claims he tried to withdraw cash from an ATM and was issued a receipt, but no cash – the bank can check with a specialised data department to ascertain whether the money was deducted from the customer’s account.
When a staff member unlocks the vault, the door to the secured area simultaneously locks
Unique codes grant workers who fill ATMs access to secured areas and the ability to unlock ATM's. The worker's code over-rides any ‘delayed unlock function,' so he can immediately access the ATM and fill it. There are set time limits for the work to be done. The ATM buzzes for a pre-determined time before the machine is due to auto-lock. If the worker needs more time, he can delay this. Once the job is done – the ATM automatically locks.
Another example of bank security involves interlocking. When a staff member unlocks the vault, the door to the secured area simultaneously locks. This prevents anyone else from gaining entry until the vault is once again locked. This ensures the safety of staff members and the security of vault contents.
There are many layers of electronic security protecting the bank. If the manager arrives early, he uses his card to gain access to the branch office and a PIN to disarm the alarm. His code disables the office and secure area, but the ATM's, vaults and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager on live video as he executes a pre-determined security procedure and until he hits an ‘All is OK' button. If there is a problem – the manager can send a silent ‘Duress Alarm' rather than the ‘All is OK.' The Monitoring Station can listen in – and if necessary can call the police.
Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt's solutions respond to these expectations and enable active safeguarding foundations to be laid.
It began with a desire to help students fit in. Officials in Maine School Administrative District (MSAD) 58 introduced uniform bar-coded plastic ID cards to replace their existing colour-coded punch cards so that students eligible for free lunches would not easily be identified by their friends. “In the past, students used punch cards to buy their lunches,” said Angel Allen, Technology Director for both MSAD 58 and neighboring district, MSAD 9. “The different colors identified their economic status for other students to see. It was not a good thing.” Some students chose not to eat rather than be embarrassed by the color of their card.
The issue is a significant one. Between 40 and 60 percent of students in MSAD 58 qualify for a reduced lunch program, according to Allen. The district, which sits in a rural area of Franklin County, Maine, covers 500 square miles and serves 1,000 students through five schools. Using ID cards was not new to the Maine school administrators. Sister district, MSAD 9, had been using ID cards as visual identity for its staff for a long time, according to Allen, but “the old system was a beast.”
MSAD 58 began using ID cards printed on a new Fargo DTC300 Direct-to-Card Printer/Encoder for the hot lunch program in the fall of 2005, with the lunch director printing the cards. A second printer was purchased in 2006 and is operating out of the superintendent’s office to create staff ID and lunch cards.
MSAD 58 continues to expand its use of ID cards:
It created a debit system in which parents can apply money to the card so their children can charge against it rather than carrying money to school.
ID cards without photos are used for substitute teachers, volunteers and parents who enter the schools.
Students and faculty can check out library materials using their ID cards.
Students without drivers’ licenses have even used their school ID cards for identification on school trips.
In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9
Building access solutions
“We also use the ID cards as medical emergency cards,” said Allen. “They are particularly useful on field trips to identify students with allergies, diabetes or asthma and to provide emergency contact numbers.”
In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9. The district is printing RFID cards for staff ID and building access. There is also a DTC300 for the student lunch program. “My experience in MSAD 58 introduced me to Fargo,” said Allen. MSAD 9 includes nine schools and serves 2,500 students. Here, the ability to print on two sides of a card was important, as administrators wanted a bar code on the back to work with the district’s time card system and door access program. In addition, the district is initiating a new lunch program, and a library program is in the works.
“In MSAD 58, we began printing small, key chain ID cards from perforated card stock,” said Allen. “Each includes the student’s name and a bar code. Being able to carry their ID card on a key chain helps prevent students from losing their cards.” Nevertheless, a $1 replacement fee is charged each lost card, although the fee was never meant to build revenue. “It’s just enough to aggravate the students,” Allen said.
TAll students carry the same plastic ID card. Information on their lunch status is contained in a bar code on the back of the card. “Now, everyone has the same card,” said Allen. “The bar code number is scanned into the cafeteria software, and only the computer can distinguish who is eligible for a reduced lunch from those who are not.”
Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners
Student ID cards
“The big thing with schools is technology,” said Jennifer Clancy, ID Wholesaler Marketing Manager (www.idwholesaler.com), who sold Allen the printers. “In Angel’s case, she is creating a system where the student ID is a stored-value card for the lunch program using a bar code. Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners. Schools nationwide are instituting policies where a visible ID is required of students, faculty and staff at all times. With a visible ID, there is no excuse for a person to be somewhere he or she is not supposed to be. Individuals can be better identified and dealt with by the existing school protocols.”
Requirements for the ID cards differ between high school and elementary school students. High school students are required to carry their ID cards at all times. In the elementary schools, students grab their ID cards from a rack on the wall outside the lunch room each day before lunch. Cards are scanned by the cashier and put back in a basket, so someone can replace them in the rack after lunch. “Younger kids can’t be responsible for remembering to bring their card every day,” Allen said.
School security system
Employees, especially those with multi-school assignments, such as administrators, supervisors, plant operations, maintenance, food service and transportation personnel are required to display their identification card at all times when performing duties for the school system. “Schools that have a student photo ID program in place are starting to expand the use of the cards to applications such as library checkout, lunch program management, equipment checkout, access to computers, student activity passes and bus access,” said Clancy. “More advanced schools are moving to cashless vending, lunchroom use or activity attendance.”
Allen, who is responsible for the technology in both MSAD 58 and MSAD 9, envisions expansion of the ID card program, especially the RFID technology component for access control. “We try things in one place and then take them beyond,” she said. “That’s the cooperative nature of our districts.” But for now, simply using ID cards to help students fit in during lunch is a huge step forward.
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?