Electronic door locks
DNAKE, an industry-pioneering and trusted provider of IP video intercom and solutions, and Htek, an industry-pioneering unified communication equipment manufacturer and solution provider, have successfully completed compatibility testing. This achievement enables seamless interoperability between DNAKE IP video intercoms and Htek IP phones. The integration enhances communication efficiency, improves security measures, and offers a scalable solution for various modern organisational needs. How...
dormakaba announces the opening of a hub, including a new production facility in Montreal, Quebec. The new facility merges all former Access Solutions sites in Canada under one roof, supporting the growing global demand for access control solutions in the segment of hospitality. Till Reuter, CEO of dormakaba, who inaugurated the hub and production centre, says: “The opening of our new facility in Canada is part of the ongoing optimisation of our global manufacturing network, hence our gro...
Camden Door Controls is pleased to introduce to the market the CX-ED0010 Electromechanical Cabinet Lock. Representative of the impressive technological evolution in secure locking systems, it is designed for a variety of enclosures that use swinging doors, drawers, and sliding doors. This lock introduces the flexibility of operating in either field selectable fail-safe or fail-secure modes and supports both 12V and 24V power supplies. Functionality of the CX-ED0010 This flexible and affordab...
Salto proudly unveils the Glass XS Reader Series, an innovative line of products that sets a new standard in access control technology for wall readers. This range of wall reader products delivers breathtaking smart access experiences, stylish design, and ultrafine details. The Glass XS Reader Series elevates access control to unparalleled levels, blending elegance, design, and simplicity while ensuring top-tier security. The new Glass XS Reader, a part of the Salto XS wall reader product...
SARGENT, an ASSA ABLOY Group brand known for innovative door lock and hardware solutions, is excited to announce the latest evolution of its 10X Line bored locks now featuring visual status indicators. Designed to provide clear, instantaneous confirmation of a door's locked or unlocked status, these highly visible status indicators enhance users’ security and safety across a wide range of applications. New dimension of interaction "Our new SARGENT 10X Line bored locks with visual status...
Morse Watchmans, the industry pioneer in key control and asset management systems, is set to showcase its advanced solutions tailored for higher education institutions at two significant industry events this June. The company will exhibit at the ACUHO-I Conference and Expo from June 22-25, 2024 at the Baird Center in Milwaukee, and at the IACLEA Annual Conference from June 27-30, 2024 in New Orleans. Key management systems "Ensuring the security of college and university campuses is more crit...
News
Codelocks NetCode® Technology is celebrating its 10th anniversary. This innovative solution to the age-old problem of allowing the right access to the right people at the right time has been at the forefront of access control for over a decade. Functionality and versatility Ever since it launched in 2014, Codelocks NetCode® Technology has grown rapidly in both functionality and versatility. It has a global reputation for adding control and convenience to many access control applications. It works in conjunction with Codelocks and KitLock locks to provide flexible, temporary access. It lowers overhead costs for business owners while adding consumer self-service for greater customer satisfaction. Without NetCode®, some of the services and applications we take for granted daily would simply not be possible. Codelocks Netcode® Technology The algorithm-based technology allows businesses to control access by creating codes Codelocks NetCode® Technology is a smart way to generate time-sensitive codes for doors, gates, lockers, and cabinets. The algorithm-based technology allows businesses to control access by creating codes that have a specified start date, time, and duration that will automatically expire at the end of the period. Remote code generation The code is generated remotely and there is no need for anyone to programme the lock directly or even communicate with it over WiFi. The business simply sends the code to the user, a step that can be incorporated into a customer booking system or by a custom-built app through the Codelocks Connect Portal and application programming interface (API). SMS or email sharing Once generated, a NetCode® can be shared by email or SMS and will expire after its set duration. This makes it suitable for visitors, visiting service engineers, delivery people, and short to medium-term locker rental, alongside many other applications. Because if there’s one thing NetCode® enables, it is innovation. Codelocks NetCode® Technology enables innovation A potential stumbling block that stymies many business ideas is that of controlling access There is certainly no shortage of ideas when it comes to today’s entrepreneurial spirit, especially when offering a self-service option. A potential stumbling block that stymies many business ideas is that of controlling access. How do you allow only the legitimate customer to access the product or service they have ordered, and prevent others from helping themselves? Keyless, time-sensitive access control solution For many, the answer has been to engage a keyless, time-sensitive access control solution that can be set remotely and doesn’t require an internet connection or WiFi to operate. Over the ten years it has been on the market, NetCode® has lent itself to a wide range of innovative implementations. It has been adopted by several companies as the perfect time-sensitive access control solution to integrate within their broader solution. NetCode® in action From sports team changing rooms and spa lockers to hospitality and event spaces, a hugely diverse range of applications use Codelocks NetCode® Technology, proving its versatility over the years. Customers using STOREiT LOCKERS book and pay for a storage locker in advance through an online portal. Codelocks NetCode® Technology generates and transmits a six-digit NetCode® that gives the customer a specific start date, time, and duration to access the lockers to deposit or retrieve their property. STOREiT LOCKERS Because NetCode® equipped locks don’t need WiFi to operate, they can be set up anywhere even in remote locations STOREiT also uses the optional Codelocks Connect booking platform. Because NetCode® equipped locks don’t need WiFi to operate, they can be set up anywhere – even in remote locations like beaches or campsites. That’s why Mobile Locker uses them to create locker arrays for festival goers to charge their phones and store their belongings. ‘Pay as you play’ booking Tennis enthusiasts who book with Parks Tennis get a code to access the company’s public tennis courts as part of the simple ‘pay as you play’ booking system. Similarly, in Portugal and Belgium, TieSports gives its members the facility to book and pay for a court using their smartphone. Thanks to the Codelocks API, their booking programme automatically links to the court’s lights, so members can turn up for their game knowing that the court will be lit and ready for play. The company doesn’t need to have staff on hand to unlock the court, turn the lights on, and lock up afterward. It’s completely transparent to the user. They don’t see Codelocks’ hand in it. All they see is a much more convenient, simplified way to get a game in. Automate room management What works to make tennis courts more convenient also works for other leisure and hospitality applications. Tigh Na Bruaich is an Australian Ski Lodge that has integrated Codelocks API into its booking system to fully automate room management at its site. When guests make bookings, its system communicates with the API which generates a NetCode® and sends it to them a week before their stay and again on the day before they arrive. Like the tennis courts, Tigh Na Bruaich programmers created an integrated solution that used Codelocks API and its booking system to automatically save power and adjust its lighting. Online-offline retail and dining space applications Customers who make an online click-and-collect order receive an access code for their locker sent via SMS There are many applications in the new hybrid online-offline retail and dining space too. For example, Yummy Box® is perfect for people who enjoy their takeout meals at the right temperature. The diner places their takeout order with the restaurant and delivers it to the thermally insulated food locker. Codelocks NetCode® Technology sits in the background and provides the verification code that allows the customer to access their locker and order. The same happens at the architectural ironmonger SDS London. Customers who make an online click-and-collect order receive an access code for their locker sent via SMS or attached to their purchase confirmation email. Where next for Codelocks NetCode® Technology? The access control sector never sleeps. Innovation and evolution are watchwords for the industry. By listening to customers and exploring ideas together, Codelocks is dedicated to taking its keyless, digital access control solutions even further. As clients present new ideas and new challenges for the solutions, Codelocks NetCode® Technology will continue to play a key role in facilitating increasingly bespoke, integrated, and personalised access control for the modern lifestyle and beyond.
Allegion Plc, a global security products and solutions provider, through one of its subsidiaries, has acquired Krieger Specialty Products LLC. Krieger Specialty Products Based in the Los Angeles, California, area, Krieger is a U.S. manufacturer of high-performance special-purpose doors and windows for industrial, commercial, and institutional markets. Krieger’s solutions include security, radio frequency, acoustical, forced entry, bullet, blast, and thermal applications, and they’re installed in a wide range of facilities ranging from data centres, hospitals, power plants, and government offices to broadcasting stations, theaters, museums, and banks. Strengthening manufacturing presence Krieger will operate as part of the Allegion Americas segment, led by Allegion Senior Vice President, Dave Ilardi. "This acquisition broadens our portfolio while strengthening our manufacturing presence regionally and bringing together two strong workplace cultures," said Dave Ilardi. Institutional market expertise Dave Ilardi continues, "Krieger’s high-quality specialty products will add to the breadth of Allegion’s solutions, while our specification and institutional market expertise will fuel demand creation and growth for Krieger." He adds, "Our businesses will also create greater manufacturing scale, leveraging our combined talented teams to best serve customers." Krieger management team Krieger CEO - Bob McCluney will serve in an advisory capacity, supporting a smooth transition Krieger CEO - Bob McCluney will serve in an advisory capacity, supporting a smooth transition for the business as it joins Allegion. Other members of the Krieger management team and employees will become part of Allegion Americas’ non-residential business, joining pioneering doors and frames brands like Steelcraft and Republic Doors. Customer satisfaction "The alignment of Allegion’s and Krieger's cultures is striking," said Bob McCluney, adding "Krieger complements Allegion’s industry-renowned door and frame brands." He continues, "Our businesses share a commitment to technical leadership and customer satisfaction. Moreover, we prioritise investments in our personnel, reflecting numerous shared core values." Terms of the transaction were not disclosed.
Corbin Russwin, an ASSA ABLOY Group brand, introduces the newest function for the ML2000 Series mortise lock - Motorised Electric Latch Retraction (MELR). Engineered for demanding commercial, institutional, and industrial applications, these new locks set new benchmarks in security by ensuring compliance, reliability and the enduring style and security that everyone has come to expect from Corbin Russwin door hardware solutions. New ML2000 Series MELR mortise locks “Our new ML2000 Series MELR mortise locks combine the best in electronic access and mechanical lock technologies to deliver a new benchmark in security,” said Lori Brown, Senior Product Manager, ASSA ABLOY Opening Solutions. Lori Brown adds, “Their universal compatibility with any access control software platform makes them ideal for installation in virtually any commercial, institutional or industrial facility.” Designed with versatility in mind These locks are ideal for a wide range of applications fulfilling the needs of robotic door operators Corbin Russwin ML2000 Series MELR mortise locks are at the forefront of lock technology, offering fast latch bolt retraction in just half a second, ensuring immediate access in high-traffic scenarios. Designed with versatility in mind, these locks are ideal for a wide range of applications fulfilling requirements for automatic door operators and ADA compliance requirements for handicap access. Certified to ANSI/BHMA A156.13 Grade 1 and ANSI/BHMA A156.25 compliance standards for superior performance, their ML2000 Series MELR mortise locks are also UL/cUL fire-rated for three-hour doors, and UL294/UCL60839-11-1 Listed and Windstorm Certified (refer to local codes). Key accessibility features Key accessibility features include optional Request to Exit functionality, adaptable designs for both in-swing and out-swing doors, and compatibility with any access control system. Corbin Russwin ML2000 Series MELR mortise locks boast quiet, efficient operation with low power consumption, reflecting their commitment to environmental responsibility.
Codelocks (Australia) Pty Ltd, an access control company that designs and distributes innovative, standalone keyless door locks, is celebrating ten years of providing leading-edge mechanical and electronic access control solutions to the APAC market. In ten years, the Australian arm of the global company, headquartered in the UK with subsidiary offices in North America and Europe, has grown into a multi-million AUS dollar business serving over 1,500 clients across Australia, New Zealand and Asia. Doors of cabinet makers Mark Samuelson was one of the first appointments made at Codelocks Australia Codelocks’ APAC General Manager, Mark Samuelson was one of the first appointments made at Codelocks Australia and has steered the company to its tenth anniversary. Mark Samuelson said, “When we first set up the Codelocks Asia Pacific entity, we had little market share and there was very low recognition of Codelocks as a player in the market, so building brand awareness became our number one priority.” Mark and his colleagues set about bringing the Codelocks brand to the market by knocking on the doors of cabinet makers and joiners and exhibiting at trade shows including the AWISA (Australian Woodworking Industry Suppliers Association) exhibition, no vacancy, and local industry organisations like the Master Locksmiths Association of Australia and the Locksmith Guild of Australia. Holding significant stocks Codelocks’ reputation for reliable, cost-effective, and easy-to-fit and programme access control products combined with its focus on exemplary service and support has seen it become the first choice for hundreds of businesses across hospitality, mining, banking, retail, education, healthcare and government. By holding significant stocks Codelocks Australia can service customer demand, whether this be for a single unit or several thousand units. This is part of the company’s ethos to provide a level of service that is determined by the customer and is unparalleled in the industry. Network of industry and channel partners Colin Campbell, Managing Director of Codelocks puts the success of Codelocks Australia down to the firm foundation that Mark Samuelson and his fellow Director, Adrian Young built through sheer hard work and determination. Colin Campbell said, “The growth of the company has been stellar, and that’s down to Mark and Adrian having a strong strategy from the outset and the commitment to see their strategy through. We have seen their model pay off, with strong sales through a network of industry and channel partners who actively champion Codelocks’ solutions.” Easy-to-use access control products Mark Samuelson said, "Ten years ago electronic locks weren’t a big thing, and we had some work to do to convince joiners and cabinet makers of their suitability. We took care to build out from having a single level of reseller by engaging a level of expert partners who are a channel to the locksmiths, and another that works with specifiers and architects." He adds, "Now whenever you walk through an airport or go to a gym, school, hospital or large retail chain, the chances are you’ll see Codelocks’ products on doors and cabinets." Codelocks moved into larger offices in Chatswood, NSW Last year, Codelocks moved into larger offices in Chatswood, NSW. This was essential to meet the increasing demand for its range of easy-to-use access control products which are sold directly through the company’s website, by specialist trade retailers and via a network of distributors and cabinet makers.
Let’s face it, any security product fixed to a substrate in a public space is only as secure as its fixings, and key safes are no exception. The integrity of a key safe isn't solely reliant on its resistance to tampering and vandalism, although that's undeniably crucial; the quality and size of the fixings used to attach it to a wall are equally pivotal. Otherwise, it runs the risk of being easily removed from a wall in a matter of minutes, if not seconds, potentially causing a property break-in, costly key and lock replacements, and undermining end-users confidence not only in a specific product but the entire concept of keys storage at the point of entry, all due to a single underperforming key safe fixing. Size or quality? striking the balance When tested in real-world scenarios, fixings of identical size do not necessarily ensure identical performance Size indeed matters. It is common sense that when under attack, chunky, large structural bolts would hold a key safe in place far more effectively than smaller anchors or more wood screws, which some key safe brands offer as a standard securing method. However, the numerous professionally executed attack tests that Keynetics has conducted underscore that the quantity and quality of fixings are equally important. When tested in real-world scenarios, fixings of identical size do not necessarily ensure identical performance. Fixing tests within the security accreditation process Through years of product development and continuous accreditation, Keynetics has discovered that the choice of fixings can be the final deciding factor in whether a key safe passes or fails during an attack test. Keynetics’ accreditation with LPCB encompasses two critical facets of key safe robustness: attacking the key safe itself and detaching it from a substrate. The latter is significantly dependent on both the fixings used and the product’s design. Trial-and-error approach For Keynetics, this means conducting extensive research into fixings and ongoing testing, which sometimes includes a trial-and-error approach to identify the best-performing fixings for the key safe applications. Furthermore, the company provides different types of fixings sourced from meticulously selected suppliers, based on the type of substrate, such as brick, concrete, or metal. Installing it right While key-safe installation may seem straightforward and takes little time, it must be done correctly Fixings imply installation. While key-safe installation may seem straightforward and takes little time, it must be done correctly to eliminate potential security risks, especially in commercial applications. Keynetics offers a nationwide installation service for all key safes. Alternatively, full training and support materials are provided to clients’ installers to ensure that the process is executed correctly, prevent missteps that could compromise key safes’ security rating and certifications, and reassure end users that keys are stored safely. Robust security solutions When in doubt, always seek information from the key safe supplier to find out more about the most crucial elements and product components. Keynetics is always eager to help and answer any questions regarding key safe products, access management, security accreditations, and commercial applications, underscoring its commitment to ensuring robust security solutions.
dormakaba announces a ground-breaking innovation in sustainable property management: a new fire-tested battery backup for uninterrupted power supply (ED UPS) to door automation (ED 100/250). This innovation marks a significant step for the Scandinavian markets Denmark, Finland, Norway, and Sweden which are the first countries to start with the launch in April and May 2024. Integrated battery backup The outstanding innovation is the integrated battery backup for a continuous power supply in the event of a power failure. The installation kit for the rechargeable lithium iron phosphate batteries (LiFEPO4) has been specially developed for dormakaba's pioneering ED 100/250 automatic swing door system. Furthermore, it reduces installation costs and minimises the need for expensive cable runs to external units. Fire testing The tests, carried out by the Swedish state research institute RISE confirmed the safety and reliability of the solution To address potential safety concerns, dormakaba has conducted extensive scientific testing to showcase that the battery does not contribute to spreading fire. Under very demanding test conditions, the battery was integrated into an automatic door system on a fully equipped fire door and subjected to a worst-case scenario. The tests, carried out by the Swedish state research institute RISE (Research Institutes of Sweden), confirmed the safety and reliability of the solution. Security and sustainability "With the launch of the fire-tested battery backup, we have developed a competitive product that offers customers significant added value in terms of security and sustainability," says Magin Guardiola, Chief Innovation Officer of dormakaba. Magin Guardiola adds, "We are proud to offer this innovative solution and look forward to its positive reception in the global property management market."
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication? Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building unlocked during production hours. For all but the smallest shops, front-door access typically involves individual radio-frequency identification (RFID) badges that enable tracking of who is coming and going and at what times. Use of physical keys, password login It is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training But when it comes to production machinery, many manufacturers still rely on physical keys, password login on the human-machine interface (HMI), or a shared PIN to unlock machine access. In some shops, machines may not be secured at all, it is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training to use the machines responsibly. However, this is not necessarily a good assumption, especially in a larger manufacturing plant where many people can access the production floor. Valuable and sensitive equipment CNC machines, robotic welders, process equipment, and other production machinery can cost anywhere from $5,000 to half a million or more, depending on their size and function. They also have significant safety risks for untrained users and may hold valuable and sensitive IP (such as customer design specs or batch recipes). User authentication Authenticating users at the machine level closes an important security loophole and makes plants safer and more productive. Machine authentication prevents untrained or unauthorised users from accessing production machinery. The right authentication system also allows access levels to be tailored for different users based on training credentials, job roles, or even projects. Machine authentication benefits A strong machine authentication solution provides several benefits for manufacturers: Minimises unplanned downtime and expensive damage to machines caused by untrained operators. Enables tracking of production outcomes by machine operator for better quality control and troubleshooting. Protects company and client IP held on the machine by preventing unauthorised access to machine controls and memory. Enhances plant safety and compliance by limiting machine access to operators with the appropriate credentials. Reduces the risk of deliberate sabotage by unauthorised operators, including damage to machines and production facilities and data theft or corruption. Mark Merino, the Director of the Digital Factory Group for Polaris Automation, explains, “Machine authentication allows us to identify which people are logged into different pieces of equipment and make sure they are trained appropriately for the machine and have the right clearances for the data they are trying to access.” Choosing the right machine authentication solution Access control for production machinery can be accomplished by various means, including password and PIN systems, physical keys or fobs, RFID badges, or smartphone-based mobile credentialing systems. The best machine authentication system will: Be highly reliable and secure to protect the machine from unauthorised access. Enable identification of individual operators and tracking of who has used the machines, at what times, and for what projects. Allow access levels to be differentiated by the user. Be easy to implement and administer. Discourage sharing or cloning of credentials. RFID readers An RFID reader can be easily connected to or integrated with the HMI for the machine In most manufacturing environments, the simplest solution for machine authentication is the RFID badge employees already carry for building entry. An RFID reader can be easily connected to or integrated with the HMI for the machine. All users must do to authenticate themselves is swipe their badge over the reader to unlock machine controls. RFID benefits RFID provides multiple benefits for end users, IT, and managers: It leverages technology already widely used, so users do not have to carry a separate key or fob to access machine controls. It is more secure and easier to manage than a password system, as passwords are frequently forgotten, shared, or hacked. Unlike shared PINs, physical keys, or fobs, user authentication via an ID badge enables accurate identification of who is logging into the machine. Users are much less likely to share their picture ID badge (which is often also linked to HR functions such as time and attendance) than a machine password, PIN, or key. If an ID badge is lost or stolen, or an employee leaves the company, IT can easily disable access to the card. RFID credentials are very difficult to hack or clone. Transmission between the reader and card can be encrypted for added security. Unlike biometric options, RFID is highly reliable even in hot, dirty, or humid environments and does not require workers to remove gloves, safety goggles, or masks. Getting started with machine authentication Machine authentication starts with selecting the right RFID reader. A universal RFID reader supports easy implementation, integration with other building systems, and scaling. A universal reader also provides flexibility for the future in case companies want to change transponder technologies or allow for user authentication using mobile credentials on a smartphone. IIoT model User authentication must be designed within the context of the wider security ecosystem of the plant To ensure the security of production machinery, user authentication must be designed within the context of the wider security ecosystem of the plant. Modern production machines are increasingly networked and connected in an “Industrial Internet of Things” (IIoT) model. That means machines are not only vulnerable themselves but are also endpoints in the broader IT landscape of the plant. Machine authentication systems must incorporate best practices for endpoint security, such as those outlined by ISO (International Organisation for Standardisation), NIST (National Institute of Standards and Technology), and other industry organisations. Best practices: The reader installation should be tamper-proofed to prevent physical disruption of the authentication system. Use an encryption standard suitable for the security level of the application. Encryption prevents data interception or card cloning. If higher security is desired, RFID can be implemented as part of a multi-factor authentication system along with biometrics and/or a password or PIN. The authentication system should support different access levels for different users or classes of users. A role-based permission system allows for different levels of access for line operators, supervisors, IT, and maintenance, for example. For maximum safety and security, individual users should only have the minimum access required to do their jobs. With secure machine authentication, manufacturers can protect people, production equipment, and IP, while enabling smooth operations. It all starts with an authentication system that supports reliable and secure operator identification at the machine level.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
IFSEC International took place over three days at the ExCel in London, presented alongside shows covering fire safety, intelligent buildings, facilities management, and safety and health. While perhaps not on the same scale as pre-pandemic events, the atmosphere was convivial and spirits high, everyone glad to be back amongst their peers in the industry. Predictably, the trending topics were steered by issues in the wider world: sustainability, moving services to a subscription-based model, and new ways of working inspired by COVID-19 safety measures. A place for cutting-edge innovation After a challenging couple of years, companies were keen to meet customers, showcase their products and reveal the latest innovations. Integrated Design Limited displayed their new Glassgate 400 Plus turnstile, a sleek design for the corporate market. Tony Smith, Major Accounts and Marketing Manager, Entrance Control and Turnstile Security, told SourceSecurity.com, “I feel trade shows are a very important part of IDL’s marketing effort. We are more than pleased to display alongside our peers and have customers make direct comparisons with our products and theirs.” Biometric access reader Biometrics, as ever, generated a lot of interest, including the European launch of RealNetworks’ new SAFR SCAN biometric access reader, which combines facial recognition, computer vision, and image capture technologies for a range of applications. “Overall, there was a really good footfall, and we met an excellent mixture of end-customers, system integrators, distributors, and consultants from both Europe and the Middle East who are exactly the types of people we were hoping to demonstrate SAFR SCAN to,” commented Charlie Bennett, Vice President UK & Europe – SAFR, RealNetworks. Access control systems going green HID Global is one company leading the way in the move away from plastics to focus on mobile access The eco-friendly trend and the need to be more sustainable is becoming a real force in the security industry, particularly in access control where there is considerable pressure to ditch the plastic. HID Global is one company leading the way in the move away from plastics to focus on mobile access. Gerald Grattoni, Physical Access Control Solutions Regional Business Unit Vice President at HID Global (part of the ASSA ABLOY Group), explained in a press briefing, “Making buildings smarter and more eco-conscious is high on the corporate responsibility agenda of many companies as the sustainability credentials of new buildings are now very important. With digitalised mobile identities there is less plastic waste and lower emissions.” Flexible, remote, and contactless Innovation in smart buildings is also being led by changes to how we work, live, and play, inspired in part by the recent pandemic. New technology is required to meet the needs of the hybrid workspace, as employers adopt more flexible working models and demand for contactless access control increases. Now, the most technologically sophisticated buildings are controlled by an app on a mobile phone, giving ease of access and full control without the need for plastic cards. Remote monitoring Advances in remote monitoring have escalated due to COVID-19, particularly in high demand in the health and education markets. Connecting via industrial standard network protocols allows for remote communication Ian Bridgewater, Director, Technical Sales Manager, TOA Corporation (UK) Ltd, explained further, “Connecting via industrial standard network protocols allows for remote communication. Working with specialist software developers has expanded this, giving greater flexibility to monitor and maintain systems remotely from a central hub.” AI-based autonomous access solution AI also has a role to play in this new high-tech, touchless world and various companies are utilising this technology. Alcatraz AI found IFSEC the perfect opportunity to exhibit their new Rock autonomous access solution. "We now live in a time in which AI can make precise real-time decisions at the door to authenticate or deny access using your face as a credential,” said Greg Sarrail, Senior Vice President of Sales at Alcatraz AI. “IFSEC 2022 allowed Alcatraz AI to demonstrate the speed and accuracy of autonomous access control. The number of qualified partners and end-users representing a broad international scope in attendance at IFSEC was encouraging.” Meanwhile, the Eagle Eye Networks stand attracted a lot of visitors keen for a demo of their new Eagle Eye Smart Video Search, which allows users to search for people, vehicles, or objects, and immediately find the exact video across all cameras in all sites. "AI and cloud are two trends that Eagle Eye, the media, and the security business community have been talking about for a while. We were excited to showcase Eagle Eye's new AI-powered technologies at IFSEC 2022," added Rishi Lodhia, Eagle Eye Networks Vice President and Manager Director EMEA. "Our stand was buzzing with activity and AI was the main topic of discussion for all three days. All in all, a great show." Investing in a secure future Engineers of Tomorrow gave apprentice finalists the chance to show off their skills in front of thousands of peers and professionals from the security sectors live on the show floor. The winners will go on to the WorldSkills UK (WSUK) LIVE competition – the nation’s premier skills, apprenticeships, and careers event. Although the products on display at IFSEC promised a contactless, digital future, this was a good reminder of the importance of the people who install and maintain these systems and the vital role of engineering apprenticeships in the industry.
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Case studies
The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technology made it difficult or impossible to know who had been accessing sensitive areas like treatment rooms and medicine stores. Another source of insecurity was the keys and passes issued to employees and contractors. These often remain in circulation beyond their approved use period, if former employees and service providers fail to return them. Need to upgrade access control To provide proper security for staff and patients, the hospital needed to upgrade its access control system To provide proper security for staff and patients, the hospital needed to upgrade its access control system. Meeting the demands of a large and complex site requires a flexible solution that can secure interior and exterior hospital doors, as well as multiple other types of openings. Also critical for The Marin Hospital of Hendaye is the ability to trace staff and external contractor movements into and between sensitive areas. An electronic access system with inbuilt audit trail capability was essential. Hospital access is traceable and tailored to user profiles The hospital chose an eCLIQ system based on programmable electronic keys and wireless cylinders. Since 2016, their security team has gradually rolled out eCLIQ electronic access control to all care and logistics buildings, including drug stores, labs, and other sensitive or confidential areas. The wireless eCLIQ solution offers easy installation without the expense or disruption of laying dedicated cabling. Quick and wireless installation “The choice of this solution is based on reliability and simplicity of implementation for a site that covers 11 hectares,” explains Yves Bourdon, Security Director at The Marin Hospital of Hendaye. "It is the only solution that can equip more than 1,500 doors with quick and wireless installation.” Intelligent eCLIQ key An eCLIQ solution gives managers control over important aspects of hospital security An eCLIQ solution gives managers control over important aspects of hospital security. They can issue access tailored to an individual’s needs and level of authority and amend it whenever required. External service providers use an intelligent eCLIQ key which automatically expires after a pre-defined period. This is much safer than relying on a contractor to return their mechanical key every time. Security, comfort, and flexibility Employees enjoy much greater comfort and convenience: Carrying a single eCLIQ key programmed with their permissions makes bulky key bunches a distant memory. “The Marin Hospital of Hendaye has gained in security, comfort, and flexibility. Employees hold only one key compared to 5 or 6 keys before,” adds Yves Bourdon. The rollout is ongoing, with another 500 eCLIQ cylinders already ordered and ready to install. The eCLIQ programmable key solution The eCLIQ cylinder range can bring almost any opening into an electronic access control system A fully electronic extension of ASSA ABLOY’s award-winning CLIQ® access control technology, eCLIQ is built around precision-engineered locking cylinders and high-end microelectronics. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between lock, key, and system. The eCLIQ cylinder range can bring almost any opening into an electronic access control system. Robust, durable eCLIQ cylinder locks secure lifts, machines, mailboxes, cabinets, and more with the same control as sensitive doors. Programmable, wire-free access control “Like many hospitals around Europe, The Marin Hospital of Hendaye now relies on programmable, wire-free access control which is backed by decades of ASSA ABLOY investment and innovation in lock and key technologies,” says Tatiana Bezie, Sales Manager at ASSA ABLOY Opening Solutions France. “Organisations equipped with eCLIQ intelligent key-based access control can have confidence that their premises and employees are secure.”
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
With approximately 29,000 employees worldwide, Amdocs is a pioneering global software company providing services and solutions to communications and media companies. When building a new campus in Ra’anana, Israel, their large site with four office buildings and three underground floors required a door closer solution tailored to every door, considering their different size, type, and usage. Finding a single supplier to meet all their needs was a challenge, but they succeeded. Site requirements This new site required reliable, flexible door-closing solutions tailored for use at several hundred doors of multiple types: fire doors, public entrances, high and low traffic, and many more. For such a complex project, they also sought trustworthy specification support from an established, experienced manufacturer with a proven track record and a team with local knowledge. Door solutions across campus Requirements included full support for choosing, supplying, and installing solutions for doors across the campus “ASSA ABLOY has many access solutions related to openings in the building, including door closers. I am pleased that our project specification team was able to provide the right solutions for our customer’s requirements,” says Avi Kimhazi, Managing Director at ASSA ABLOY Israel. This included full support for choosing, supplying, and installing solutions for doors across the campus. ASSA ABLOY’s expertise and advice were always available. Product portfolio to meet the individual needs The vast range of available ASSA ABLOY Door Closers, Electric Strikes, Locks, Panic Exit Devices, and other products ensured every opening at the Amdocs Park campus was equipped with its ideal solution, without compromises. Certifications including fire compliance across the full range help to remove regulatory worries for specifiers and facilities managers. Cam-Motion technology Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications. With innovative Cam-Motion technology, the push-force required to open a door falls rapidly, providing barrier-free access for all plus secure closing to keep premises safe. DC700, DC840 and DC200 ASSA ABLOY’s Cam-Motion DC700 model creates comfortable, secure access to high-traffic public doors in the building. The DC840 model conceals the same technology within the door leaf itself and is deployed where minimal aesthetic impact is required. For smaller door sizes, choosing the cost-efficient DC200 rack and pinion door closer helped the project hit its budget targets. Hitting project deadlines with specification support Designers could visualise door solutions accurately and the right solution was specified for each opening The project was managed using BIM principles from the outset. ASSA ABLOY’s local specification team became a hub for coordinating and disseminating up-to-date information for every door solution as part of the BIM process. Alongside providing timely specifications, the team made sure supply and installation hit the timelines that construction managers required. Detailed specifications were supplied and updated digitally, so designers could visualise door solutions accurately and the right solution was specified for each opening. Openings Studio® software Openings Studio® software was a key tool for everyone involved in the project. This user-friendly software ensures accurate specification data is logged and, when approved, transmitted to the live Revit® design. With detailed specifications supplied and updated digitally, designers visualise door solutions accurately as soon as possible and ensure the right solution is specified for each opening. And because every stakeholder can have appropriate Openings Studio access, they work transparently and with accurate, up-to-date specifications.
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue and track around 100 mechanical keys per airline. It took time and was a distraction from other important tasks. Airport operator Finavia sought a more convenient way to manage and monitor cabinet access, replacing mechanical locking with a streamlined electronic solution. Lenel access control solution Finavia sought a neat solution that did not require them to fit a bulky locking device Cabinets are often small, hard to wire, and easily damaged. Thus, Finavia sought a neat solution that did not require them to fit a bulky locking device or a separate RFID reader. And because the airport already had a Lenel access control solution in place, seamless integration — without extra software or database installation — was another essential requirement. “Safety, functionality, durability, security of supply and usability were the reasons we chose the ASSA ABLOY solution,” explains Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport. A major upgrade to security for almost any cabinet Now, the automated log shows exactly which airline opened any cabinet, and when Helsinki’s airline check-in desks are now equipped with Aperio® KL100 electronic cabinet locks. The KL100 is small and has a minimal footprint. Wireless, battery-powered and with an inbuilt RFID reader, it is easy to fix to almost any cabinet, locker or drawer without cabling or causing damage. Different sizes and cam-lengths make the lock adaptable to securing sensitive spaces in almost any workplace. “Before KL100 cabinets were managed with mechanical keys, with no specific control over who has the key and who had opened the cabinet,” adds Kari Mäkinen. Now, the automated log shows exactly which airline opened any cabinet, and when. It’s efficient and hassle-free. KL100 Wireless Cabinet Lock The KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system For high convenience, a KL100 has an integrated reader, which may be unlocked with mobile keys (via NFC or BLE), as well as smartcards or fobs using all major RFID technologies. And because the Aperio platform is built from the ground up for compatibility, the KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system. Finavia was able to choose a best-in-class solution without having to compromise. Operations at the airport are more streamlined. No one needs to handle or track thousands of mechanical keys, saving time and costs spent on logistics. Every employee’s individual access may be revoked at any time from the Lenel control panel and it’s simple to audit all cabinet access if an incident occurs. A full suite of ASSA ABLOY access control devices After 18 months of operation, the solution for check-in desks has been a success. Airport managers have ordered additional Aperio KL100 devices for airport departure gates. Multiple connectable ASSA ABLOY solutions are already deployed alongside the digital cabinet locks, including wireless Aperio door handles; Protec2 CLIQ® electromechanical locking devices; and keyless, mobile-operated ABLOY padlocks to secure fencing and cargo. “The availability of all these solutions from a single manufacturer — easily used with their existing access control solution — has helped Finavia to tailor a unified, integrated system at Helsinki Airport,” says Lars Angelin, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.
When it comes to connecting to the community and protecting its schools, Sumter County in central Florida has implemented some pretty impressive, innovative, and thoughtful solutions. The county, located west of the Greater Orlando area, recently set out on a mission to increase security at its 14 schools district-wide by installing SARGENT IN120 Intelligent Wi-Fi locks on classroom doors and other interior openings. Digital access technology All Sumter County schools feature multiple classroom buildings. So, in addition to deploying more digital access technology indoors, the district took the extra safety measure of installing a special security fence around each campus’s group of buildings, complete with a single point-of-entry gate controlled by an IN120. Custom-made from resilient metal stock, this gate access solution provides further assurance that only students and staff are allowed to enter. For contractors, family members, and other visitors, there’s a separate controlled entrance at the main administration building of each school where they can be vetted for clearance to specific areas. A simpler, cost-effective path IN120s exchange permission data and grant access strictly by Wi-Fi and run on six AA alkaline batteries IN120s exchange permission data and grant access strictly by Wi-Fi and run on six AA alkaline batteries, virtually eliminating the need for hard wiring. This makes the solution very straightforward to install, power, and connect. IN120s are also easy to operate. Faculty and other authorised personnel simply present their issued credentials to a door’s IN120 card reader to release the lock. Fence point-of-entry For the fence point-of-entry, a scheduled staff member stationed at the opening activates the IN120 the same way, unlocking the gate to let students in as they arrive for the day. Once they’ve entered and are on their way to their assigned classroom buildings, the gate is closed and locked until the next time a student or staff member needs access. Per life safety/fire codes, of course, free egress is always possible by pushing on the exit device (panic bar) on the inside of the gate door. Cost savings The rationale for choosing SARGENT IN120 Intelligent Wi-Fi locks for the gate doors was to eliminate the expense The rationale for choosing SARGENT IN120 Intelligent Wi-Fi locks for the gate doors was to eliminate the expense of trenching and cabling between the fence entry point and a nearby building, which would have been necessary for the power and communication requirements of a traditional hard-wired system. That option was out of budget. IN120s, on the other hand, offered a significant cost-saving alternative, which allowed for a better use of available funds. The Power of Wi-Fi Fortunately, high-speed internet and Wi-Fi are plentiful at all the district’s school buildings both indoors and out, the result of Sumter County’s initiative to boost and extend service to campus parking lots after recognising that many people in the somewhat rural area didn’t have access to such an important necessity. This allows students to come to the parking area and easily connect to online resources that help complete schoolwork, an essential amenity especially during off-hours and over weekends. Alternative standalone power source Strong Wi-Fi reach, of course, also fills the connectivity requirements of the IN120 locks Strong Wi-Fi reach, of course, also fills the connectivity requirements of the IN120 locks, including those at exterior gate locations. Batteries outdoors, however, are another matter. The extreme heat and wintertime cold that Sumter County experiences can shorten battery life and high humidity tends to cause corrosion. That meant finding an alternative standalone power source for each of the single-point entries. Securitron BPSS-20 solar power supply Thankfully, the ASSA ABLOY team had a bright idea. They proposed bypassing the batteries altogether and installing the external power 91-prefix version of the IN120 driven by a Securitron BPSS-20 solar power supply. With a 12V, 20W panel, and 18Ah battery mounted nearby, they were able to turn the intelligent Wi-Fi gate lock into a complete IN120 solar energy solution for Sumter County. Proof again that their schools provide valuable learning experiences and great opportunities for creative problem-solving.
Protecting booths at trade shows is a challenge. After all, exhibitors want a constant stream of high traffic, especially from people they are meeting for the first time. It’s why they attend such large-scale fairs. Relying on exhibition-provided security is sadly not enough. Individual stands need their protection for areas where valuable equipment, product samples, or confidential commercial documents are kept. Innovative, modern solution Barcelona-based ExpoFactory specialises in the design and building of award-winning exhibition stands for the MICE, retail, and habitats/architecture sectors. They understand that booth security is integral to customers’ needs and that keeping booths safe is not easy. They hoped to identify an innovative, modern solution that would be more flexible and convenient than mechanical lock-and-key security. Factors to consider Firstly, easy installation, to ensure that fitting locks did not slow down their build process Two more factors were critical in their choice. Firstly, easy installation, to ensure that fitting locks did not slow down their build process. Secondly, and equally important: The ability to easily reset and reuse devices. ExpoFactory needs locks that can be trusted to last. Everyone has their PIN — no one carries keys To replace manual, mechanical keys and cylinders, they chose Code Handle Door, a digital PIN door lock housed within an elegant handle. So far, 60 devices have been equipped. With a Code Handle, all that’s needed to unlock is a secure 4- to 6-digit PIN. There’s no key to use, lose, or track, and no worries that it’s been copied. Code Handle “Code Handle has a stylish design, easy installation, and eliminates the need for physical keys,” says Adelfio Marino, Logistics Centre Manager at ExpoFactory. Installation is fast: the Code Handle fits over a standard cylinder and is fixed in place by two screws. Batteries slot inside for a minimal footprint. There’s no wiring or software to worry about. When the event is finished, it’s simple to reset the device ready to incorporate in another trade show stand. Upgrades booth security With Code Handle, the team leader chooses up to 9 different PINs for authorised staff Code Handle instantly upgrades booth security. It makes sure only the right people have access, not just anyone who happens upon the key. With no keys to track, organising stand security is easier, too. Everyone on the stand works faster because they don’t wait for a keyholder to appear. With Code Handle, the team leader chooses up to 9 different PINs for authorised staff (and cancels them anytime). Tailor-made digital solution It’s also a convenient digital solution tailor-made for busy trade shows: “Everything was easy and effective,” said Adelfio Marino, adding “And it makes our final product of higher quality. The customer prefers it.” With its unique combination of durability, stylish design, and ease of use, the Code Handle digital lock has already been deployed to separate public and private spaces in all kinds of settings from clinics and pharmacies to shops and home offices.
Round table discussion
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance with regulations, prevents accidental misuse, and streamlines workflows. We asked this week’s Expert Panel Roundtable: What safeguards are in place to avoid unauthorised retrieval of access control data?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
White papers
School security checklist
DownloadUnderstanding key control systems and best practices
DownloadCreating a secure and positive healthcare experience
DownloadEffective access control for museums and public spaces
DownloadNetwork Security Redefined: IP-Enabled Access Control
DownloadSecurity risks of ‘universal’ card readers
DownloadHigh-Security Electromechanical Locking Solutions For Critical Infrastructure
DownloadVideos
Electronic door locks: Manufacturers & Suppliers
- CyberLock Electronic door locks
- ASSA ABLOY Electronic door locks
- Software House Electronic door locks
- Vanderbilt Electronic door locks
- ASSA ABLOY - Aperio® Electronic door locks
- Alpro Electronic door locks
- CLIQ - ASSA ABLOY Electronic door locks
- Bosch Electronic door locks
- Paxton Access Electronic door locks
- AMAG Electronic door locks
- Codelocks Electronic door locks
- HID Electronic door locks
- Aiphone Electronic door locks
- Hikvision Electronic door locks
- Honeywell Security Electronic door locks
- CIVINTEC Electronic door locks
- Dahua Technology Electronic door locks
- SALTO Electronic door locks
- Brivo Systems Electronic door locks
- DSC Electronic door locks
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download