Fingerprint Locks
Codelocks has introduced the CL5000 NetCode® range which adds Codelocks’ time-sensitive code functionality, NetCode®, to its best-selling, heavy-duty electronic CL5000 access control solution for high-traffic areas. Launched in 2004, the original CL5000 has stood the test of time over the last 20 years. The addition of NetCode® technology takes the CL5000’s solid build, ease of installation and operation, and low maintenance features to the next level with the added bene...
Verkada, a pioneer in cloud-based physical security solutions, announced it will offer customers a new AI-powered search in Beta. Leveraging a large language and large vision model, Verkada’s AI-powered search will enable customers to use everyday language to search their video security camera footage for people and vehicles, making their investigations even more intuitive and efficient. “Our new AI-powered search is an exciting expansion of the way that Verkada leverages the l...
Codelocks has introduced the CL5000 NetCode® which adds Codelocks’ time-sensitive code functionality, NetCode®, to its best-selling, heavy-duty CL5000 access control solution for high-traffic areas. Added benefits Launched in 2004, the original CL5000 has stood the test of time over the last 20 years. The addition of NetCode® technology takes the CL5000’s solid build, ease of installation and operation, and low maintenance features to the next level with the added bene...
dormakaba announces the opening of a hub, including a new production facility in Montreal, Quebec. The new facility merges all former Access Solutions sites in Canada under one roof, supporting the growing global demand for access control solutions in the segment of hospitality. Till Reuter, CEO of dormakaba, who inaugurated the hub and production centre, says: “The opening of our new facility in Canada is part of the ongoing optimisation of our global manufacturing network, hence our gro...
Bank security is one of the key topics of Security Essen 2024. On September 19, the “Day of Banks and Savings Banks” showcases practical solutions for financial institutions. Recent events have underlined the urgent need for action in this area. Julia Jacob, Project Manager at Security Essen, states, "With the right measures, the number of explosive attacks in some regions of Germany has been reduced by up to 80 percent. Our experts will showcase the most promising options, pro...
Ajax Systems, Europe’s largest security systems manufacturer, and Yale, the smart home security solutions provider, are expanding their partnership to 30 additional countries. This announcement builds on the initial partnership revealed earlier in 2024, which has already seen successful implementations in several countries. Originally rolled out in five European countries, the integration is currently available to users and businesses in many more markets. Countries that support the inte...
News
Centrios, a new brand created within ASSA ABLOY to serve the small business market, announces their first shipment of hardware products to SECLOCK. Centrios is a cloud-based access control solution developed to radically simplify the needs of small and growing businesses. By connecting the Centrios mobile app with Centrios smart readers and locks, owners and managers can quickly and easily manage access for all employees and visitors in one place. Small and growing businesses The first shipment of Centrios product left Centrios HQ in Berlin, Connecticut on June 18th and is now available for ordering through SECLOCK. End-users that are looking to purchase or have Centrios product installed at their business can find local support on the Centrios Where to Buy Finder on centrios.com. Their channel partners also benefit from a solution that is easy to sell, is well supported Bryan Lieberman, General Manager for Centrios, shared that this shipment marks an important step forward in digital transformation for small and growing businesses. It offers small business owners improved connectivity, ease of access, quality, and versatility, enabling them to control access for employees or visitors across multiple physical sites with their phone, tablet or PC. Their channel partners also benefit from a solution that is easy to sell, is well supported, and helps them grow their business. Managing access schedules Echoing this sentiment, Justin Wormell, Executive Director of Strategic Accounts, SECLOCK, said, "Centrios offers a fresh approach to access control systems, providing new functionality and operating practices for the owners and managers of small businesses – something we get asked for all the time. We are honored to be the first to stock Centrios products and look forward to the opportunities it brings." The Centrios mobile app is designed to seamlessly integrate with Centrios smart readers and locks. The simple-to-use mobile app allows owners and managers to grant access to employees and trusted vendors, manage access schedules, view access history reports, and users can unlock openings with a touch of their phone. Users can find the Centrios mobile app on the Apple App Store or Google Play. Access control solution The new Centrios Smart Reader is IP65 weather resistant, FCC/IC certified, ADA compliant The Centrios Smart Reader enables users to unlock virtually any door with electrified hardware from the perimeter to the core of a small business. The Smart Reader is an optimal access control solution for storefronts, employee entrances, storerooms, gates, offices, automatic doors, and access control retrofits. The Smart Reader can be paired with other electronic access control systems, features Bluetooth mobile access and PIN code management which can be managed with the Centrios mobile app, and is easily installed and operated. The new Centrios Smart Reader is IP65 weather resistant, FCC/IC certified, ADA compliant, and operates in temperatures ranging from -40º to 140º F (-40º to 60º C). Access control components Centrios offers bundled kits to make purchasing convenient and hassle-free for small business owners. Each bundle includes a Smart Reader and various access control components depending on the type of hardware required. Examples of what can be selected include electric strikes from HES and Adams Rite, power supply from Securitron, no touch request to exit switch from Alarm Controls, and Securitron DPS. With technology from several new patents, the Centrios cylindrical lock is high performing, easy to install, and simple to use. It facilitates access via an optional mechanical key or Bluetooth mobile access, features privacy mode with an included door position sensor, and an LED for lock events and alarms. Configurable auto relock The Centrios cylindrical lock typically operates for an entire year on four AA batteries and includes exterior emergency 9VDC power backup and a configurable auto relock. Small businesses can choose from one of four lever designs and five finishes, including the very popular black suede, satin chrome, bronze, bright brass, and satin nickel. The Centrios cylindrical lock is ANSI/BHMA A156.2 Grade 1 compliant, features UL10C 3-hour fire rating, is IP57 weather resistant, FCC/IC certified, ADA compliant, and operates in temperatures ranging from -40º to 140º F (-40º to 60º C).
SARGENT, an ASSA ABLOY Group brand known for innovative door lock and hardware solutions, is excited to announce the latest evolution of its 10X Line bored locks now featuring visual status indicators. Designed to provide clear, instantaneous confirmation of a door's locked or unlocked status, these highly visible status indicators enhance users’ security and safety across a wide range of applications. New dimension of interaction "Our new SARGENT 10X Line bored locks with visual status indicators add a new dimension of interaction further enhancing the user experience,” said Lori Brown, Senior Product Manager at ASSA ABLOY Opening Solutions. “The large window displays incorporated in these products deliver greater privacy and convenience, providing users with added peace of mind, whether securing a classroom, restroom, or any entryway where security and privacy are critical concerns." Key Features of the SARGENT 10X Line Key Features of the SARGENT 10X Line with Status Indicators: Instant Status Recognition: Highly visible indicators provide immediate confirmation of a door's status (locked/unlocked, occupied, etc.), improving security and peace of mind. Versatile Installation: Ideal for both new construction and retrofit projects, these bored locks fit various door types to meet diverse security requirements. Proven Durability: SARGENT 10X Line locks exceed industry standards for strength and longevity, ensuring reliable performance over time. Optimal Visibility: Multiple indicator window placements available on the inside, outside, or both sides of the door to meet diverse security needs guarantee clear visibility from any angle. Sleek, Modern Design: The elegant design seamlessly integrates with any architectural style. The newly enhanced line of SARGENT 10X Line bored locks with visual status indicators combine the highest levels of personal privacy, safety and security that stand the test of time.
Morse Watchmans, the industry pioneer in key control and asset management systems, is set to showcase its advanced solutions tailored for higher education institutions at two significant industry events this June. The company will exhibit at the ACUHO-I Conference and Expo from June 22-25, 2024 at the Baird Center in Milwaukee, and at the IACLEA Annual Conference from June 27-30, 2024 in New Orleans. Key management systems "Ensuring the security of college and university campuses is more critical than ever," said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. He adds, "Our comprehensive key management systems provide higher education facilities and law enforcement with robust, scalable solutions to manage and safeguard their keys and assets effectively. By integrating our systems into campus operations, universities can enhance their security protocols, ensuring a safer environment for students, faculty, and staff." Morse Watchman’s key control systems Morse Watchman’s key control systems are designed to securely store keys in electronic cabinets Morse Watchmans’ key control systems are designed to securely store keys in electronic cabinets, releasing them only to authorised users based on pre-determined criteria. These systems are crucial in managing campus security, providing a high level of integration and control across the broad range of university departments. From campus security and police to facilities management, and across campus housing, transportation, and the student union, these solutions provide dynamic key security for complex applications. Facility management teams often face challenges with managing hundreds to thousands of physical keys across campus. Morse Watchmans’ key control systems allow for easy access to specific keys, limiting master key use to authorised individuals. Three core solutions The Morse Watchman's team will highlight three core solutions at these events: The Emergency Key Grab (EKG) Kit ensures that first responders can quickly access facility keys during a lockdown. Central to the kit is the KeyWatcher Touch System, which securely stores keys and allows authorised emergency personnel to retrieve them swiftly using a PIN code or credential. The kit includes colour-coded SmartKeys and KeyRings, both designed for easy identification and enhanced security. The KeyBank® Touch system offers a secure and convenient way to manage keys with a user-friendly 7-inch touchscreen interface. The system features KeyAnywhere, allowing keys to be returned to any key storage system within the enterprise, and KeyFind, which helps locate specific keys or identify who has them. With the patented SmartKey system, modular design, and full scalability, the KeyBank Touch can manage up to 18,000 keys and 10,000 users per site, all within a common database. The KeyWatcher Fleet system is an advanced key control solution tailored for managing higher education fleets. It offers comprehensive control over vehicle distribution, utilisation, and fleet right-sizing with an intuitive dashboard displaying vehicle use, bookings, status, and detailed charts. The system allows for the creation of automated vehicle allocation policies and ensures secure key access through unique pin codes or optional card and fingerprint readers. Built on the reliable KeyWatcher Touch hardware, it supports thousands of keys and users, network integration, and API support, making it ideal for efficient fleet management on university campuses. Join Morse Watchmans at ACUHO-I (booth 209) and IACLEA (booth 406) to explore how their key management solutions can transform campus security.
Codelocks NetCode® Technology is celebrating its 10th anniversary. This innovative solution to the age-old problem of allowing the right access to the right people at the right time has been at the forefront of access control for over a decade. Functionality and versatility Ever since it launched in 2014, Codelocks NetCode® Technology has grown rapidly in both functionality and versatility. It has a global reputation for adding control and convenience to many access control applications. It works in conjunction with Codelocks and KitLock locks to provide flexible, temporary access. It lowers overhead costs for business owners while adding consumer self-service for greater customer satisfaction. Without NetCode®, some of the services and applications we take for granted daily would simply not be possible. Codelocks Netcode® Technology The algorithm-based technology allows businesses to control access by creating codes Codelocks NetCode® Technology is a smart way to generate time-sensitive codes for doors, gates, lockers, and cabinets. The algorithm-based technology allows businesses to control access by creating codes that have a specified start date, time, and duration that will automatically expire at the end of the period. Remote code generation The code is generated remotely and there is no need for anyone to programme the lock directly or even communicate with it over WiFi. The business simply sends the code to the user, a step that can be incorporated into a customer booking system or by a custom-built app through the Codelocks Connect Portal and application programming interface (API). SMS or email sharing Once generated, a NetCode® can be shared by email or SMS and will expire after its set duration. This makes it suitable for visitors, visiting service engineers, delivery people, and short to medium-term locker rental, alongside many other applications. Because if there’s one thing NetCode® enables, it is innovation. Codelocks NetCode® Technology enables innovation A potential stumbling block that stymies many business ideas is that of controlling access There is certainly no shortage of ideas when it comes to today’s entrepreneurial spirit, especially when offering a self-service option. A potential stumbling block that stymies many business ideas is that of controlling access. How do you allow only the legitimate customer to access the product or service they have ordered, and prevent others from helping themselves? Keyless, time-sensitive access control solution For many, the answer has been to engage a keyless, time-sensitive access control solution that can be set remotely and doesn’t require an internet connection or WiFi to operate. Over the ten years it has been on the market, NetCode® has lent itself to a wide range of innovative implementations. It has been adopted by several companies as the perfect time-sensitive access control solution to integrate within their broader solution. NetCode® in action From sports team changing rooms and spa lockers to hospitality and event spaces, a hugely diverse range of applications use Codelocks NetCode® Technology, proving its versatility over the years. Customers using STOREiT LOCKERS book and pay for a storage locker in advance through an online portal. Codelocks NetCode® Technology generates and transmits a six-digit NetCode® that gives the customer a specific start date, time, and duration to access the lockers to deposit or retrieve their property. STOREiT LOCKERS Because NetCode® equipped locks don’t need WiFi to operate, they can be set up anywhere even in remote locations STOREiT also uses the optional Codelocks Connect booking platform. Because NetCode® equipped locks don’t need WiFi to operate, they can be set up anywhere – even in remote locations like beaches or campsites. That’s why Mobile Locker uses them to create locker arrays for festival goers to charge their phones and store their belongings. ‘Pay as you play’ booking Tennis enthusiasts who book with Parks Tennis get a code to access the company’s public tennis courts as part of the simple ‘pay as you play’ booking system. Similarly, in Portugal and Belgium, TieSports gives its members the facility to book and pay for a court using their smartphone. Thanks to the Codelocks API, their booking programme automatically links to the court’s lights, so members can turn up for their game knowing that the court will be lit and ready for play. The company doesn’t need to have staff on hand to unlock the court, turn the lights on, and lock up afterward. It’s completely transparent to the user. They don’t see Codelocks’ hand in it. All they see is a much more convenient, simplified way to get a game in. Automate room management What works to make tennis courts more convenient also works for other leisure and hospitality applications. Tigh Na Bruaich is an Australian Ski Lodge that has integrated Codelocks API into its booking system to fully automate room management at its site. When guests make bookings, its system communicates with the API which generates a NetCode® and sends it to them a week before their stay and again on the day before they arrive. Like the tennis courts, Tigh Na Bruaich programmers created an integrated solution that used Codelocks API and its booking system to automatically save power and adjust its lighting. Online-offline retail and dining space applications Customers who make an online click-and-collect order receive an access code for their locker sent via SMS There are many applications in the new hybrid online-offline retail and dining space too. For example, Yummy Box® is perfect for people who enjoy their takeout meals at the right temperature. The diner places their takeout order with the restaurant and delivers it to the thermally insulated food locker. Codelocks NetCode® Technology sits in the background and provides the verification code that allows the customer to access their locker and order. The same happens at the architectural ironmonger SDS London. Customers who make an online click-and-collect order receive an access code for their locker sent via SMS or attached to their purchase confirmation email. Where next for Codelocks NetCode® Technology? The access control sector never sleeps. Innovation and evolution are watchwords for the industry. By listening to customers and exploring ideas together, Codelocks is dedicated to taking its keyless, digital access control solutions even further. As clients present new ideas and new challenges for the solutions, Codelocks NetCode® Technology will continue to play a key role in facilitating increasingly bespoke, integrated, and personalised access control for the modern lifestyle and beyond.
Organisations equipped with CLIQ intelligent key-based access management have confidence that their premises and employees are safe and secure. With CLIQ employees can flexibly manage access, to secure almost any opening with electronic cylinders or padlocks and programmable smart keys. A new upgrade in the programming device family simultaneously enhances this security and convenience. Credential updates Requiring regular credential updates is the simplest, most effective method for keeping premises secure. ASSA ABLOY’s new CLIQ Wall Programming Device (PD) helps to update keys’ access rights faster without involving the system administrator. This cuts the risk of unauthorised keys circulating. CLIQ Wall Programming Device Robust, durable CLIQ cylinder locks secure lifts, machines, mailboxes, cabinets, and more CLIQ is built around precision-engineered locking cylinders and high-end microelectronics. A standard battery, lasting approximately 10 years with typical use, inside each programmable smart key powers the cylinder or padlock and encrypts the data transfer between lock, key, and system. Robust, durable CLIQ cylinder locks secure lifts, machines, mailboxes, cabinets, and more with the same control as sensitive doors. A range of programming devices transfer and update access rights for keys. Fast, reliable CLIQ key updating for enhanced security The CLIQ Wall PD, available as an indoor and outdoor variant, has now been redesigned to make this updating process faster and easier than ever. “Facility managers can have the peace of mind that every user key in circulation is easy to load with the latest approved access rights and validity,” explains Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEIA. “The Wall PD can also collect audit trails directly from keys. Life is just easier when you CLIQ!” Weather and vandalism protection The upgraded CLIQ Wall PD protects users against missteps, confusion, or false positives during key programming: Intuitive LED lighting instantly confirms when their key is updated in both the indoor and outdoor product variants. The CLIQ Outdoor Wall PD is the ideal solution for demanding environments as it is protected against weather and vandalism. Enhanced encryption Enhanced encryption via Ethernet ensures every issued CLIQ key is protected with robust security With the new CLIQ Wall PDs, keyholders and facility managers don’t need to worry about data privacy. Enhanced encryption via Ethernet ensures every issued CLIQ key is protected with robust security. The upgraded device supports the 802.1x protocol for enhanced security. Rapid installation With rapid installation, using the existing wiring and backplate, it is simple to switch existing wall programmers for new devices to keep a site and staff safer. Total compatibility with existing and future CLIQ keys ensures that replacing old programmers with the new CLIQ Wall PD is hassle-free and future-proof.
Digitalisation is reshaping the way individuals live and work. Buildings should be at the centre of this change, streamlining daily interactions with homes, offices, and other workplaces, moving into and around them seamlessly. Everyone who uses a site also needs confidence in its security and safety, not just its efficiency and usability. Connected digital access In addition, connected digital access is a fundamental block in constructing more intelligent buildings. As analysts Omdia note, “access control equipment continues to play a crucial role in leading end users to consider a transition to interconnected smart building system architectures.” Future-oriented strategy Switching mechanical for digital access can help organisations of every size and type to work smarter, collaborate better Switching mechanical for digital access, then, can be essential to a future-oriented strategy. It can help organisations of every size and type to work smarter, collaborate better, and maximise the productivity of their existing assets. “The building has an increasingly digital future,” says David Moser, SVP and Head of Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA. ”So it’s crucial for all kinds of organisations to make their access ready for what’s ahead.” 5 strategic factors impacting the switch to digital access But which major factors should be incorporated into the decision-making process for a switch to digital? The following five are critical to ensure an organisation lands on the best solution for them: Security Security is sometimes considered a given. But in a world of emerging and evolving physical security threats, it should never be taken for granted. Building users and managers need the reassurance of a secure access system to go about their working day productively and with peace of mind. As security converges, moving beyond traditional physical access and cyber ‘siloes’, the right digital access solution enables building management teams to define exactly who goes where, and when, across their site or sites. Reliability The reliability of any digital solution has both financial and security implications. Robust hardware and secure software ensure that access solutions require minimal maintenance, for example. At the specification stage, purchasers should also inquire about third-party certifications, including for green building schemes, whether for digital locks, electronic door closing solutions, or access provision compliance at sensitive locations where additional national and supra-national regulations may apply. Innovation Systems should embrace digital openness and customisability which in turn provide the flexibility Innovation in the choice of solution does not simply mean picking the access system with the widest range of features and functions. Choosing a digital solution manufacturer with a track record of innovation, however, gives organisations the confidence that their solution will always prepare them for what’s ahead – not just the ‘now’. Systems should embrace digital openness and customisability which in turn provide the flexibility that genuinely future-proofs access management. Convenience Convenience is about much more than just small-scale savings in time and effort. When employees, contractors, and temporary visitors can come-and-go with ease, operations for building and security managers are streamlined. Digitalising access provides a concrete ROI that a business can turn into a competitive advantage. For this reason, the most recent Wireless Access Control Report found the #1 factor driving the switch to mobile digital access was convenience. Sustainability Sustainability as an ethos should be embedded within any future-proof digital solution. Motives go beyond just altruism and corporate responsibility – though, of course, these are important. Incorporating sustainability into an access strategy can also directly benefit the bottom line. Both the business and the environment benefit from reducing power consumption by using innovations such as energy-harvesting technology, for example. The benefits of a digital access solution “At a new corporate headquarters for Canal+ near Paris, midsized Clockwise co-working spaces in the UK and northern Europe, and medical facilities in Dubai and Turkey, digitalisation of access has brought tangible everyday benefits,” adds David Moser. “There’s a proven digital solution suited to historic buildings, brand-new hotels, and education facilities of every size and type. Digital access comes with a real operations management ROI.” Cloud infrastructure Cloud infrastructure enables remote management of users and access from one convenient location “At one Danish school, Vejle Friskole, digitalising access management reduced the time they were spending on it every week from 5 hours to just 5 minutes. The results can be instant… and quite dramatic!” Digitalising access instantly puts powerful tools in the hands of a building manager: Cloud infrastructure enables remote management of users and access from one convenient location; integrating intelligent sensors can help manage energy more effectively; credentials stored on a smartphone simplify and accelerate the process of issuing, amending and revoking access. Digital access for offices, universities, hospitals, and much more A vast range of digital functionality can be tailored to all kinds of applications. With real-time management, facility managers create audit trails or instantly change access rights for any door or user. In schools, real-time, online control enables rapid lockdown in an emergency. In hospitals, digital access shows who had access to drug stores or equipment. Self-service kiosks At the Flint Hotel in Austria, digital access software integrates with self-service kiosks: Guests check in from home, enter the reception with a PIN, and receive their keycard at the kiosk. At Munich’s historic Hofbräuhaus, digital devices work out of sight, securing doors and managing access without damaging the heritage interior. Wireless locks and mobile management Multi-residential housing in Barcelona, access apartments and common areas with a key stored securely Tenants at Becorp, multi-residential housing in Barcelona, access apartments and common areas with a key stored securely on their smartphone. “Physical key management for any large development puts severe pressure on operational costs,” explains Becorp’s project engineer, Xavier Casals. “Choosing wireless locks and mobile management helps us to minimise them.” Digital transition “ASSA ABLOY can help you digitalise and truly future-proof access at almost any kind of site or building,” adds David Moser. “Our vast range of innovative, reliable, convenient solutions showcase the value of the digital transition and can be tailored to meet individual business needs and goals.” “We urge anyone thinking of making the switch from mechanical to digital access to speak to us first. We are happy to share our expertise to help you continue to thrive in a changing, digitalising world.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Case studies
The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technology made it difficult or impossible to know who had been accessing sensitive areas like treatment rooms and medicine stores. Another source of insecurity was the keys and passes issued to employees and contractors. These often remain in circulation beyond their approved use period, if former employees and service providers fail to return them. Need to upgrade access control To provide proper security for staff and patients, the hospital needed to upgrade its access control system To provide proper security for staff and patients, the hospital needed to upgrade its access control system. Meeting the demands of a large and complex site requires a flexible solution that can secure interior and exterior hospital doors, as well as multiple other types of openings. Also critical for The Marin Hospital of Hendaye is the ability to trace staff and external contractor movements into and between sensitive areas. An electronic access system with inbuilt audit trail capability was essential. Hospital access is traceable and tailored to user profiles The hospital chose an eCLIQ system based on programmable electronic keys and wireless cylinders. Since 2016, their security team has gradually rolled out eCLIQ electronic access control to all care and logistics buildings, including drug stores, labs, and other sensitive or confidential areas. The wireless eCLIQ solution offers easy installation without the expense or disruption of laying dedicated cabling. Quick and wireless installation “The choice of this solution is based on reliability and simplicity of implementation for a site that covers 11 hectares,” explains Yves Bourdon, Security Director at The Marin Hospital of Hendaye. "It is the only solution that can equip more than 1,500 doors with quick and wireless installation.” Intelligent eCLIQ key An eCLIQ solution gives managers control over important aspects of hospital security An eCLIQ solution gives managers control over important aspects of hospital security. They can issue access tailored to an individual’s needs and level of authority and amend it whenever required. External service providers use an intelligent eCLIQ key which automatically expires after a pre-defined period. This is much safer than relying on a contractor to return their mechanical key every time. Security, comfort, and flexibility Employees enjoy much greater comfort and convenience: Carrying a single eCLIQ key programmed with their permissions makes bulky key bunches a distant memory. “The Marin Hospital of Hendaye has gained in security, comfort, and flexibility. Employees hold only one key compared to 5 or 6 keys before,” adds Yves Bourdon. The rollout is ongoing, with another 500 eCLIQ cylinders already ordered and ready to install. The eCLIQ programmable key solution The eCLIQ cylinder range can bring almost any opening into an electronic access control system A fully electronic extension of ASSA ABLOY’s award-winning CLIQ® access control technology, eCLIQ is built around precision-engineered locking cylinders and high-end microelectronics. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between lock, key, and system. The eCLIQ cylinder range can bring almost any opening into an electronic access control system. Robust, durable eCLIQ cylinder locks secure lifts, machines, mailboxes, cabinets, and more with the same control as sensitive doors. Programmable, wire-free access control “Like many hospitals around Europe, The Marin Hospital of Hendaye now relies on programmable, wire-free access control which is backed by decades of ASSA ABLOY investment and innovation in lock and key technologies,” says Tatiana Bezie, Sales Manager at ASSA ABLOY Opening Solutions France. “Organisations equipped with eCLIQ intelligent key-based access control can have confidence that their premises and employees are secure.”
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and large groups, presentations, and individual work. Access to these spaces required a flexible and modern locking solution ideally with as few keys as possible. Employees and students must feel welcome and safe. Need for an easily integrated system Dependable security was needed for all kinds of valuable learning materials and sensitive information Dependable security was needed for all kinds of valuable learning materials and sensitive information. “Easy integration with the existing access control system without additional software,” was the goal, according to Alex te Pas, functional manager of facilities management information systems. Keyless access for improved security and management “Within our organisation, we want to phase out the use of keys,” he says. “Because when employees left, we noticed that people often forgot to turn in keys or tokens. In the event of an audit, we then have a problem." Wireless Aperio locks The college chose Aperio locks which are easy to integrate wirelessly with their existing Nedap AEOS access control system. No additional software is needed: wireless Aperio locks communicate via Aperio Hubs which handle secure, real-time communication between locks and the AEOS system. This way, college security staff have full control over access and can quickly revoke anyone’s access rights. Saves time and costs The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks Because Aperio devices run on batteries, rather than mains power, there was no need to make any major adjustments to the doors. This saves both time and cost during installation. The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks, which require an ‘always on’ connection to the power grid to maintain secure status. Aperio E100 Escutcheon The college chose the Aperio E100 Escutcheon to secure doors throughout the building. The E100 offers a convenient combination of free exit from the inside with automatic locking on closure from the outside. It comes in a variety of specifications to fit different door security levels or everyday usage, including a version with PINpad which adds another level of control. 2-factor authentication With the additional PIN code, the risk of unauthorised access via a found or stolen pass is minimised. “We wanted to provide our technical rooms with 2-factor authentication. So here we chose Aperio locks with PIN code capability,” adds te Pas. Extending an AEOS system with Aperio wireless devices Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio devices. End-users can get even more out of an existing Nedap AEOS system by integrating Aperio cylinders, escutcheons, handles, and more, online and/or offline, giving security managers control over traffic to and through more areas at their premises. Multiple device support Nedap integration supports multiple devices from the Aperio range, including the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100), and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden and glass doors, as well as fire doors. Online integration with AEOS can use different interfaces (RS485 / IP), connecting lock and system via hubs that control up to 16 locks. AEOS software A full set of powerful functions and events is made available for any Aperio device within the AEOS interface, including door or battery status and tamper detection. AEOS software manages everything, eliminating unproductive tasks including any need to duplicate data entry saving time, and extending control without hassle for building users or administrators.
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. ALCEA is the brand formerly known as ASSA ABLOY Global Solutions - Critical Infrastructure. The ALCEA Traffic Cabinet Locking Solution has gained traction with transportation infrastructure departments in major cities across the United States. It was developed by Jerry Burhans, managing director for North America, and Michael Woody, manager of the ALCEA Competence Centre in Irving, which shares a border with Grand Prairie. Now this access management solution is beginning to impact medium-sized communities like them. Proactive cybersecurity measures Perez said this skill project will save all city signal cabinets from tampering and unauthorised key Raul Perez, a 13-year transportation industry veteran who has served as Grand Prairie’s ITS Specialist for 2-1/2 years, said this installation project will protect all city signal cabinets from tampering and unauthorised access. Involving 240 smart locks, 210 high-security mechanical locks and padlocks on all city traffic cabinets plus 10 message boards, 191 mechanical locks for all school flashing sign cabinets, and 20 Bluetooth keys is in step with the city’s policy of adopting proactive cybersecurity measures. “Having control over who has access and when to our traffic cabinets was a major driver for this project,” he acknowledged. “We have not had people trying to force their entry into our cabinets, but we did have several occasions where contractors were gaining access to them without permission or notice. ALCEA was the clear choice for our smart lock needs, offering a solution that aligns with our requirements.” Substantial growth and the need to safeguard assets Grand Prairie has a long history associated with technology. Located in the Dallas-Fort Worth metroplex, it is the sixteenth largest city in Texas with a population of more than 207,000 people. During World War I and since, it began an association with the defence and aviation industries and served as an aircraft production site. The city sits 12 miles west of downtown Dallas and is only 10 minutes south of the Dallas-Fort Worth International Airport. With rail lines and major interstates 20 and 30 running through it, Grand Prairie has become a well-established distribution centre. The majority of the Great Southwest Industrial District’s approximately 80 million square-feet of space is in the city. State’s transportation infrastructure Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states Combine major attractions like the Lone Star Park horse racetrack and Epic Waters, one of the largest indoor waterparks in Texas, and the city’s 81 square miles of road experience heavy traffic activity all day long. Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states. After an unprecedented boom, the U.S. Census Bureau declared it is now home to more than 30 million residents following a 43% increase from 2020 to 2022. That development in part led to the Texas Department of Transportation announcing a $142 billion investment in the state’s transportation infrastructure last August as part of a 10-year state roadways plan. About the same time the announcement was made is when the city of Grand Prairie began researching options for a separately funded project to increase cybersecurity preparedness. Flexibility of a Hybrid Locking Solution “I started looking for smart locks and found ALCEA’s mechanical lock with a high security key during an online search. I was intrigued so I contacted them, inquired about their product and arranged a visit to their office for a presentation,” said Perez, who also evaluated the offerings of three other vendors. “It was then I learned about the capability of unlocking both the electronic and mechanical locks – including padlocks – and the versatility of their keys. I was very impressed by the user-friendly design of their Bluetooth smart key,” he said in reference to the ABLOY PROTEC2 CLIQÔ system. Mechanical and electromechanical locks Remote access control system mixes the parts of robotic and electromechanical locks The remote access management system combines the best characteristics of mechanical and electromechanical locks. After the initial meeting with ALCEA, Perez said he was convinced of the value of this hybrid solution but had to secure buy-in from his supervisor and department director. “Working with the ALCEA team, we tailored a price quote aimed at convincing our department director to allocate funds for this investment. The initiative was successfully integrated into our budget by the end of 2023, and the purchase order was placed in mid-January.” Demonstrated by the ALCEA team The city of Grand Prairie chose ALCEA for several key reasons. “Their product offered the advantage of securing all our enclosures with a single key, with efficiency and convenience,” said Perez. “The versatility of giving us the capability to integrate both mechanical and electronic locks, as well as padlocks, contributed to a more cost effective final solution. The user-friendly key system, coupled with the security features, ensures ease of use without compromising safety." “The expertise, customer service, and professionalism demonstrated by the ALCEA team added confidence in our decision-making process,” added Perez. “Being a local company, they are able to provide localised support.” Common problems with #2 keys protecting roadside equipment The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder. The electromechanical locks support electronic access control, key tracking, and audit trails with CLIQ Web Manager software. Perez says it instantly solves a problem that existed with their old system. “The challenges we encountered before are widespread in the transportation industry. Many traffic enclosures are accessible with a #2 key, which is impossible to track and makes unauthorised access a potential risk,” he explained. “Anyone can buy that type of key for a couple of dollars. This lack of accountability is a significant security concern, particularly with the increasing prevalence of cyber threats targeting government agencies.” Open cabinet locks and padlocks Perez says the ALCEA solution gives Grand Prairie continuity for its program. “Given the critical nature of our infrastructure and the investment in our high-tech signal control devices, protecting our assets is a top priority,” he acknowledged. “We now have versatility where the same key will open cabinet locks and padlocks, and it can be updated by using the CLIQ app, which is convenient for everyone on our team. Technicians and supervisors wiil be using most of the keys, and the others are for the contractors who need access to the traffic cabinets on an occasional basis.”
With approximately 29,000 employees worldwide, Amdocs is a pioneering global software company providing services and solutions to communications and media companies. When building a new campus in Ra’anana, Israel, their large site with four office buildings and three underground floors required a door closer solution tailored to every door, considering their different size, type, and usage. Finding a single supplier to meet all their needs was a challenge, but they succeeded. Site requirements This new site required reliable, flexible door-closing solutions tailored for use at several hundred doors of multiple types: fire doors, public entrances, high and low traffic, and many more. For such a complex project, they also sought trustworthy specification support from an established, experienced manufacturer with a proven track record and a team with local knowledge. Door solutions across campus Requirements included full support for choosing, supplying, and installing solutions for doors across the campus “ASSA ABLOY has many access solutions related to openings in the building, including door closers. I am pleased that our project specification team was able to provide the right solutions for our customer’s requirements,” says Avi Kimhazi, Managing Director at ASSA ABLOY Israel. This included full support for choosing, supplying, and installing solutions for doors across the campus. ASSA ABLOY’s expertise and advice were always available. Product portfolio to meet the individual needs The vast range of available ASSA ABLOY Door Closers, Electric Strikes, Locks, Panic Exit Devices, and other products ensured every opening at the Amdocs Park campus was equipped with its ideal solution, without compromises. Certifications including fire compliance across the full range help to remove regulatory worries for specifiers and facilities managers. Cam-Motion technology Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications. With innovative Cam-Motion technology, the push-force required to open a door falls rapidly, providing barrier-free access for all plus secure closing to keep premises safe. DC700, DC840 and DC200 ASSA ABLOY’s Cam-Motion DC700 model creates comfortable, secure access to high-traffic public doors in the building. The DC840 model conceals the same technology within the door leaf itself and is deployed where minimal aesthetic impact is required. For smaller door sizes, choosing the cost-efficient DC200 rack and pinion door closer helped the project hit its budget targets. Hitting project deadlines with specification support Designers could visualise door solutions accurately and the right solution was specified for each opening The project was managed using BIM principles from the outset. ASSA ABLOY’s local specification team became a hub for coordinating and disseminating up-to-date information for every door solution as part of the BIM process. Alongside providing timely specifications, the team made sure supply and installation hit the timelines that construction managers required. Detailed specifications were supplied and updated digitally, so designers could visualise door solutions accurately and the right solution was specified for each opening. Openings Studio® software Openings Studio® software was a key tool for everyone involved in the project. This user-friendly software ensures accurate specification data is logged and, when approved, transmitted to the live Revit® design. With detailed specifications supplied and updated digitally, designers visualise door solutions accurately as soon as possible and ensure the right solution is specified for each opening. And because every stakeholder can have appropriate Openings Studio access, they work transparently and with accurate, up-to-date specifications.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Fingerprint Locks: Manufacturers & Suppliers
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download