Electronic access control - Expert commentary
In early 2016, dialogue between ASIS International in Europe and HID Global around access technology identified the need to take a closer look at why sometimes cutting-edge technology is not as effective as it should be in real world applications. Central to the issue were security gaps caused when elements are combined that do not match the same level of sophistication. This resulted in ASIS conducting a study amongst its European members with HID Global providing support o...
The global market for card-based electronic access control (EAC) is projected to reach $10.1 billion by 2020 according to Global Industry Analysts. However, as credential technologies have evolved over the years, so have the ways users interact with them. Mobile credentials One of the bigger developments over the past few years has been the increased adoption of mobile credentials, which allows users to access facilities via their mobile device. To m...
Customers are increasingly requesting both mechanical and electronic services for their doors In most buildings, security is a hybrid solution of both mechanical and electronic security products. Locksmiths take care of the mechanical door hardware and the integrators focus on the electronic security technology. However, for consumers, this traditional division of labour means they must deal with two different companies for the same door - one to design, install and service a...
At the end of last year, we anticipated that data gathering and analysis would continue to be a strong trend, and that certainly proved to be the case in 2016. More and more organisations are seeing the value of the intelligence provided by diverse systems’ data. The number and variety of networked systems and devices – both security and non-security – continued to grow steadily in the last year, and the data these disparate sources create has proven highly...
Again in 2016, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2016 that generated the most page views. They are listed in order here with the author&r...
The shift from wired to wireless access control was expected to gather pace in 2016—and that has happened. This year we at Assa Abloy surveyed a large cross-section of security professionals, seeking their insight into the changing market. Comparing our data with research we did in 2014 showed a clear trend towards wireless access control. Wireless access data Our 2014 survey found 23% of commercial properties using a wireless or hybrid wired/wireless access control s...
New construction has continued to grow as a result of low interest rates in 2016 and that has positively impacted the security marketplace. Yet the limited availability of skilled labour is becoming a large issue as it leads to higher cost of labour. This also creates a challenge in recruiting, training, and retraining a capable staff in building construction and maintenance activities. As a result, there is a continued desire to improve our efficiency in production, commissioning and the manage...
This executive brief explores the security risks associated with using CSN instead of reading the data protected by security mechanisms. When contactless smart cards are implemented and deployed properly, they represent one of the most secure identification technologies available. However, some manufacturers, in an attempt to sell a ‘universal’ reader capable of reading almost any contactless smart card technology, actually disable the built-in security...
Part 11 of our Security in Healthcare series The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders Compliance with Joint Commission accreditation can impact hospital and healthcare safety and security decisions, and can even drive security system improvements at healthcare facilities. An independent, not-for-profit organisation, The Joint Commission accredits and certifies nearly 21...
Summary Date: Tuesday, September 20, 2016 Time: 10:00am PT / 1:00pm ET / 5:00pm UTC Duration: 45 minutes + Q&A What's the webinar about? Mobile credentials are one of the most exciting areas of the access control market. The transformation caused by the development of various mobile solutions in payment, banking, ticketing and automation is poised to deliver similar changes in the access control industry. Mobile credentials are now entering the market...
What's the White Paper about? The mobile industry is known as one of the most innovative and fast-paced and what we have seen in recent years has been nothing short of remarkable. This rapid growth is affecting the underlying technologies and standards in mobile devices as more people use their devices in their daily life and new applications are developed. This white paper from HID Global explores the essential elements in successfully implementing mobile access, fr...
The security industry as a whole is migrating from the historical mechanical lock to the newest technology of electronic locks Mechanical locks and keys date back thousands of years and have undergone many changes, but the industry’s transition to electronic locks might be the most important, lasting, and surprisingly affordable security and safety change of all. The objective behind the creation of locks so long ago remains: to control a value on the other side...
Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situat...
Part 7 of our healthcare series Integrators can sell a breadth of possible equipment into the healthcare market One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in s...
Revolving doors have been around for well over 100 years since their invention by Theophilus Van Kannel in 1888. As the story goes, Van Kannel, working in a lobby during a cold winter in Philadelphia, complained about the unpleasant effects of the swing door at the main entrance: “Every person passing through [the exterior door] first brings a chilling gust of wind with its snow or rain, and the noise of the street; then comes the unwelcome bang!” Van Kannel decided to do something...
Angela White was sworn in as President-elect of ESA at the ESX show in June and will take office July 1 The Electronic Security Association (ESA) wrapped up its annual ESX conference June 8-10 at a new location in Fort Worth, Texas, with keynote speakers, educational sessions, networking events, exhibitions, awards and the installation of new officers. Logging its ninth year, ESX is jointly owned and sponsored by ESA and the Central Station Alarm Association (CSAA). This year&...
There is a contrast between high levels of security inside Westminster and little to no security outside the safe environment The fatal attack on 41-year-old Jo Cox, a Labour member of the British Parliament, on the street in her district in West Yorkshire in Northern England, is increasing calls for greater security of Members of Parliament (MPs). Cox was stabbed and shot to death June 16th outside a library in Birstall, where she was meeting with constituents. There have be...
ONVIF's 1.0 Core Specification debuted in 2008 at Security Essen The adoption of the ONVIF protocol by manufacturers continues to grow. Last year, the number of member companies in the ONVIF forum exceeded 500 and more than 5,000 products are currently certified on the ONVIF website. How did ONVIF achieve this amazing result and experience this wild adoption? More than a decade ago, every manufacturer was defining their own protocols and pushing for Video Management Software...
Awareness against fake fingerprints prevent fingerprint from becomingthe choice of biometrics despite their benefits Apple’s refusal to the US government’s request to unlock Syed Rizwan Farook’s iPhone has triggered public interests in personal and information security. Ever since the introduction of Touch ID by Apple, fingerprint technology has been implemented into more and more mobile devices by different manufacturers. It is being adopted as the authentic...
Access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical sec...
ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...
Organisations need to protect their properties and people by securing entranceswith security systems and policies Most criminals gain access to a business or organisation the same way honest people do – they walk through a door. That door may be left unlocked. It may be propped open. Poor locks may be easily defeated or the door may be inadequately constructed and offer little resistance when attacked. Focus on multiple-layered security It seems obvious the path to...
The established security distribution channel is being disrupted by a new trend towardsspecialist distributors – who offer more a more focused range of products andsupport services In the last 10 years a lot has changed within UK security distribution, but on the surface everything would appear to be the same. The top two distributors remain the same, despite creditors at one and talk of a looming sale at another. However, they’re operating with a slightly reduced...
Important biometric capabilities include multispectral imaging, superior liveness detection, and tamper resistance Technology developments are enabling a range of new functionality for biometrics in the security market. Early biometrics solutions had poor performance (high failures during enrolment or acquisition that meant significant percentages of users could not use biometrics), says Phil Scarfo, VP worldwide marketing, biometrics, HID Global. Early solutions were not able...
A biometrics-embedded tablet can tag a guard upon entering the building & feed videoof what’s happening beyond secure doors as he/she moves through the facility The best way to make the case for biometrics is to consider a physical and logical access control scenario, according to biometrics vendor SRI Identity, a program from SRI International, one biometrics company. With advances in security technology, access control systems have come to play a bigger role in org...
Led by European nations, there is a global shift to e-passports, with over 100 countries using these technologies With the number of global international tourist arrivals standing at over 1 billion and increasing migration in Europe, good border and passport security means having a layered approach and plenty of co-ordination among countries, says David Belchick, VP of Government Solutions at Entrust Datacard. Ever-growing border security challenges “More than one bil...
Proving ROI, setting proper customer expectations and training is imperative tothe success of biometric implementation End user customers increasingly expect their security systems to provide measurable benefits beyond protection of people, facilities and assets. The biometrics sector is undergoing a similar shift in mindset: The benefits of using biometrics to drive business operations and other corporate functions are becoming part of the return on investment (ROI) “e...
More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...
The universe of biometric authentication applications is expanding rapidly invertical markets such as healthcare and retail Once used mostly to secure high-value government facilities, biometrics are now a basic tool used in a variety of vertical markets. This article will look at some of those opportunities. For healthcare organisations, for example, biometric authentication is being used for secure medical dispensing to streamline workflow and control drug diversion, and f...
Strong electronic access control (EAC) investments by the healthcare and education verticals were a highlight of a very strong 2015 for Allegion. The company saw double-digit growth in multiple categories for its electronics as well as continued strong growth in commercial markets, with further expansion of software provider integration of Allegion-connected devices. Mobile connectivity & system integration nurture positive trends Demand for mobile connectivity and inte...