Incedo access management from ASSA ABLOY Opening Solutions is created for businesses on the move, who need a flexible security solution which grows with them. Now security managers managing an Incedo Business solution can work remotely, too — while maintaining complete control over their building’s access points. Incedo connects security software and hardware within a single, seamless platform. To accommodate the restless change and disruption of modern business life, Incedo enables...
Following the outbreak of COVID-19 and the pandemic everyone is living through, the uptake in touchless access control which was previously gaining in popularity has been accelerated driving digital transformation across many industries and technologies. Among these is the rapid growth of mobile and cloud-based systems that make access control a simple and secure solution for businesses to manage keys, users, and doors across multiple locations, simply and conveniently. SALTO Systems, which has...
Ping Identity, the Intelligent Identity solution for the enterprise, announced Project COVID Freedom which leverages its recent acquisition of ShoCard personal identity to allow healthcare providers, businesses, and individuals to easily share proof of COVID test results and vaccinations. Project COVID Freedom creates a secure and privacy enabled way for healthcare providers, businesses, and individuals to verify test and vaccination results, while keeping users up to date on vaccination status...
Mobile credentials are set to become the mainstream choice for access control in office buildings as a new generation of workers are forcing employers and landlords to prioritise fast, secure and convenient access via their smartphones. Omdia predicts annual downloads of mobile credentials worldwide rising from 20 million in 2020 to 120 million by 2023 and 150 million in 2024. It is particularly bullish about Bluetooth, which it predicts to grow by more than three times the speed of the next hi...
Workforce management specialist, Synel Industries UK (Synel UK), has introduced the latest version of Synergy Access, a cloud-based access control solution which provides a scalable and cost-effective way to manage who is allowed access to restricted areas. Available as a stand-alone solution or as part of a wider suite of software from Synel that includes Time and Attendance and other workforce management modules, Synergy Access is designed to provide a future-proof solution for access control...
Honeywell, a global provider of connected buildings, and IDEMIA, a global provider of Augmented Identity, announced a strategic alliance to create and cultivate an intelligent building ecosystem that provides a more seamless and enhanced experience for operators and occupants alike. The alliance will integrate Honeywell’s security and building management systems with IDEMIA’s biometric-based access control systems to create frictionless, safer and more efficient buildings. The Honey...
Alcatraz, the developer of secure frictionless access control products, has added Three Factor Authentication (3FA) to the Rock facial authentication platform to deliver the ultimate in protection for high security areas and zero trust environments. “Three Factor Authentication using a biometric like facial authentication in the Alcatraz Rock platform is really one of the most secure ways to control access,” said Alcatraz Chief Revenue Officer Tina D’Agostin. “At Alcatraz, we have worked to leverage the Rock to work as that third authentication factor so that data centers, government entities, nuclear plants, the military, and similar organisations can provide the secure protection they are required to deliver.” Authenticates authorised users The Rock can be used for one, two or three factor authentication. In one-factor authentication, the Rock is the primary access control device and facially authenticates authorised users. In two-factor authentication, the Rock is used in combination with a badge reader to grant access. In three-factor authentication, the Rock is used along with two additional access control devices, like a badge reader and a PIN reader to verify employees' identities. Alcatraz Rock offers a touchless physical access control solution that works with an access control system In this scenario, the user needs to enter personal data, like a PIN or password, utilise a physical pass, like an ID badge, and provide biometric identification, like the facial authentication conducted by the Alcatraz Rock. It is the combination of these three distinct criteria that delivers 3FA, which is the ultimate in access control. The Alcatraz Rock offers a touchless and secure physical access control solution that works with any access control system. Autonomous access control It replaces or augments badging as a credential with facial recognition, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. The Rock uses machine learning for increased security and accurate tailgating detection, while intelligently enrolling employees as they are badging in, which eliminates the headaches associated with traditional onboarding. “The addition of 3FA is an exciting enrichment to the Alcatraz Rock platform as it is our goal to deliver autonomous access control that offers security that is unrivaled and is more affordable than security guards or turnstiles,” said D’Agostin. Renowned system integrators A number of renowned system integrators and security organisations - including Johnson Controls, PSA Security Network, SAGE Integration, and TRL Systems - have incorporated the Alcatraz Rock into their solutions portfolio. To learn more about how Alcatraz Rock can provide multi-factor authentication for an organisation, one can sign up for a demo on the company’s official website.
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, hosted a virtual partner summit on Feb 3, 2021, where it announced new leadership, shared business success stories as well as a business blueprint for future growth. Suprema Partner Summit The Partner Summit, attended by close to hundred Suprema partners, began with a greeting from James Lee, the new Chairman of the company. Lee thanked partners for Suprema’s sales performance, shared how Suprema headquarter employees are striving under the COVID-19 pandemic, and introduced the new leaders of Suprema. Hanchul Kim, previous Managing Director of Suprema, was appointed the new Head of BioStar business. Seongbin Choi, the former Head of Software R&D, is now leading the entire BioStar R&D. Andrew Kim, who joined Suprema, in September 2020, as Chief Strategic Officer, was named the new Head of MOCA Systems Inc., a Suprema-affiliate start-up specialising in mobile credential solution. FaceStation F2, the fusion multimodal terminal At the virtual partner summit, Suprema shared the success of FaceStation F2 At the virtual partner summit, Suprema shared the success of FaceStation F2, the fusion multimodal terminal featuring Suprema’s latest face recognition technology that combines the best of IR and visual face recognition methods. “FaceStation F2 hit record sales for most units sold three months into the launch. This is the most success than with any other product we’ve ever released,” said the new Head of BioStar business, Hanchul Kim. Contactless and face recognition solutions He adds, “Thanks in part to the success of FaceStation F2, Suprema’s sales units of face recognition devices more than doubled in 2020. With the demand for contactless solutions on the rise, we expect face readers to account for around thirty percent of entire unit sales in 2021.” Suprema also presented a five-year vision to become a renowned provider of ACaaS (Access Control as a Service) to enterprise market, using AI, big data and cloud technology. Visual recognition, data analytics and AI expert “Suprema has a strong visual recognition, data analytics and AI technology that will serve well in advancing to object and motion detection, so it really is a natural path for us to expand to the field of fire, intrusion alarm and video surveillance and take BioStar platform to the cloud to offer a total solution to higher-end enterprise customers,” Hanchul Kim further explained. Towards the end of the event, Suprema gave a peek of X-Station 2 scheduled for launch in the first half of the year. X-Station 2 is an advanced touchscreen-based card reader capable of adding QR code module option at the bottom.
The need for safer and more touchless ways to pay has escalated and consumers are embracing contactless cards as the preferred means of payment, with 77% using them regularly in-store. However, in parallel with the increased use of contactless are rising security and usability concerns. The pandemic has rapidly changed the way one pays and their attitudes towards how they want to pay in the future. “PIN codes have been annoying for a long time, but who would have thought a year ago that one in three consumers would fear touching the PIN-pad when paying in-store?” comments Lina Andolf-Orup, Head of Marketing at Fingerprints. Nevertheless, today that is the ‘new normal’ and the PIN-pad concern now equals concern levels around handling cash due to fear of contracting viruses, according to a new global study by Fingerprints and conducted by Kantar across five global markets. Safe and touchless ways The need for safe and touchless ways to pay has risen. Consumers have continued to move away from using cash (22%), and the bank card is now the dominant way consumers make in-store payments (73%), with very few claiming to use mobile wallets (2%). On average, one in two are using their contactless card as the main method when paying in stores. Mobile payments will likely grow too but is a polarised method, with one in four thinking they will use it more France (60%) and the UK (57%) are the countries with the highest penetration, but contactless has also gained adoption in the famously cash-heavy Germany (38%). The contactless card is also used frequently, with over three quarters (77%) using it at least weekly. The majority of consumers (63%) think they will use contactless cards even more in future. Fondness for contactless cards Mobile payments will likely grow too but is a polarised method, with one in four thinking they will use it more than today, but 32% still think they won’t make mobile payments at all in-store in future. There are some differences across markets and segments, but the overall picture remains consistent that consumer usage and fondness for contactless cards is here to stay. Consumers need a reason to trust contactless. The main reason for consumers’ affection for the card is trust - it is easy to use (78%), it works everywhere (70%), it is secure (68%) - and of course, it can work as a complement to the user’s smartphone, especially for online payments. For ‘real life’, in-store payments however, very few think mobile first. Usability point of view Consumers truly need a reason to trust contactless, both from a security and usability point of view" “The contactless card is far from perfect, however. Consumers are worried around its security, and this level of concern has risen since our earlier research, likely fuelled by growing usage and raised payment caps. People are aware and increasingly concerned about anyone being able to use their card if they lose it." "On the other hand, there is also an issue with the transaction cap and confusion caused by still often needing to input your PIN - an unwelcome step not only because of hygiene concerns, but as an added point of friction. Consumers truly need a reason to trust contactless, both from a security and usability point of view,” adds Lina. Biometric payment cards The biometric payment card is the answer to consumer needs. Biometric payment cards, where the user authenticates themselves with their fingerprint on the card instead of entering a PIN code, is a desirable innovation when one asks the consumers. It will enable secure, hygienic, convenient contactless payments no matter the amount and also offers consumers a ‘wow’ factor with a technology that’s still somewhat familiar, with many now comfortable with biometrics from use in smartphones. Biometric payment cards directly address consumer needs and concerns, both rational and emotional. Half of all consumers want a biometric payment card, with a further quarter being open to it. Fingerprint feature In fact, they want it so much that over half (51%) would switch bank if they could have one. In Australia and the UK, the interest is even higher, with over six in ten willing to switch bank. And, among the 18-35-year olds, the willingness to switch is the highest (66%), followed by those with higher income (61%). Beyond this, a significant proportion (43%) would also be willing to pay extra to have the fingerprint feature on their card. This differs across segments, with younger demographics wanting it to a higher degree (55%) and willing to pay for it (61%). Among the consumers that use their contactless cards regularly, 62% want it to be biometric and almost half would be willing to pay for it (49%). Constraints of contactless From our research, it is clear demand for biometric cards has only increased with the pandemic" In the two countries included in the earlier survey, conducted ‘pre-Covid’ at the end of 2019, the interest in having a biometric payment card has since increased too, with around half of consumers now citing it as a preference in France (51%) and the UK (48%). “From our research, it is clear demand for biometric cards has only increased with the pandemic. Behaviours have shifted quickly and adoption of contactless cards has boomed, penetrating new markets and segments while also shining a spotlight on the current issues and constraints of contactless that have now become real consumer pain-points." Offering biometric payment "Banks have an opportunity to bring innovation to consumers’ favourite payment form factor. By offering biometric payment cards, banks can not only show they care for their existing customers, they can also attract new customers and create a potential new revenue stream,” Lina added. Fingerprint Cards AB (Fingerprints) is one of the world’s leading biometrics company, with its roots in Sweden. They believe in a secure and seamless universe, where the users are the key to everything. The company’s solutions are found in hundreds of millions of devices and applications, and are used billions of times every day, providing safe and convenient identification and authentication with a human touch.
The Security Industry Association (SIA) has released version 2.2 of SIA Open Supervised Device Protocol (OSDP), an access control communications standard developed by SIA to improve interoperability among access control and security products. SIA OSDP version 2.2 features the messages and formatting that were included in the International Electrotechnical Commission (IEC) 60839-11-5 standard released earlier in 2020 and addresses some of the minor errata within that document. SIA OSDP version 2.2 replaces version 2.1.7 of the specification, released in 2015. Facilitating encrypted communications Chief among the updates are an enhanced method for file transfer, which allows for the transfer of large data sets for firmware updates or graphics from an access control unit to a reader, clearer instructions for the implementation of SecureChannel to facilitate encrypted communications and updated messages for handling smartcard applications within the protocol. SIA OSDP version 2.2 is a bridge that allows for easier updates of the OSDP specification and the subsequent publishing of these enhancements as an international standard. SIA OSDP allows devices, such as card readers, control panels or other security management systems to work together, providing the security industry with a solution that moves far beyond the widely-used Wiegand standard in terms of security and functionality. Advanced security applications The SIA OSDP standard is recommended for access control installations that require advanced security A two-way channel and encryption pave the way for advanced security applications such as the handling of smart cards, biometrics and government applications that require Public Key Infrastructure or Federal Identity, Credential and Access Management requirements. “SIA OSDP version 2.2 is a culmination of all of the work done over the past five years to prepare the protocol for international standardisation and fixes the majority of common implementation challenges faced by implementers of version 2.1.7,” said Steve Rogers, co-chair of the SIA OSDP Working Group and president at IQ Devices. Already in use by many manufacturers, the SIA OSDP standard is recommended for access control installations that require advanced security or will be used in government and other higher-security settings. Comprehensive testing program In April 2020, SIA introduced SIA OSDP Verified, a comprehensive testing program that validates a device’s conformance to the SIA OSDP standard and related performance protocols. Maintained and developed by the SIA OSDP Working Group since 2011, the SIA OSDP standard was approved by the IEC technical committee on alarm and electronic security systems as an international standard in June 2020. SIA OSDP v2.2 aims to duplicate the contents and terminology that were required in the IEC standardisation process, harmonising the SIA published protocol series and the IEC standard. Future versions of OSDP will continue to follow the IEC formatting conventions, enabling the always-evolving work of the SIA SODP Working Group to be more easily adopted through the IEC standards process.
Third Millennium is pleased to announce the launch of a flush-mounted Ligature Resistant reader. The RX5M is a Third Millennium styled flush-mounted Ligature Resistant reader. The unit is a multi-technology reader suitable to interface with all standard access control systems. This unit offers impact-resistant construction with a high degree of protection against vandalism and malicious attack. Quick and easy installation The stainless-steel flush fit assembled housing may be secured to a recessed standard UK Double Gang Back Box using two security screws, making installation quick and easy. Steve Greenaway, Business Manager, said “The primary function of the reader is to prevent anyone from harming themselves, or others, and ensuring that a ligature cannot be attached to the reader.” “However, the RX5M is also suitable for areas where standard readers might become damaged, such as unsupervised public places, corridors and detention facilities.”
Third Millennium is pleased to announce the launch of a flush Panel Mount reader. The RX5 is a Third Millennium styled flush Panel Mount reader. The unit is a multi-technology reader suitable to interface with all standard access control systems and may be used in speed gates and turnstiles or other third-party enclosures. Having provided readers with turnstiles and speed gates for many years, this is the first product specifically designed for this market. Contactless entry Steve Greenaway, Business Manager, said “We have provided readers for turnstiles and speed gates for many years, but this is the first product that we have designed specifically for this market.” “Offering true contactless entry is ever more important, and this demonstrates our commitment to constantly review and develop our products, and to provide the safest possible solution at the main point of entry.”
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
Fingerprint identification had once been the most widespread biometric technology around the world. However, many argue that this technology has quite a lot of shortcomings. For instance, even expensive fingerprint reading scanners have a hard time identifying dirty or wet fingers, plus, some people's fingerprints are unreadable. Furthermore, being vulnerable to the temperature and precipitation, such scanners consequently cannot be used outdoors. Plus, fingerprint reading scanners do not meet today’s demand for contactless biometric technology. According to a new comprehensive report 'Global Contactless Biometrics Technology Market 2020-2026', "the Global Contactless Biometrics Technology Market size is expected to reach $18.6 billion by 2026, rising at a market growth of 19.1% CAGR during the forecast period. The development and acceptance of contactless biometric technologies have been driven by demand for faster and easier authentication processes and boosted by demand generated by the COVID-19 pandemic." Thus, it is contactless biometric recognition technologies that meet the latest requirements. Too expensive? Until quite recently, face recognition technology was too expensive and poorly scalable. Nevertheless, a lot of factors have changed in recent years. To start with, facial biometric technologies have become more accessible for a large audience. Being affordable, reliable, and easy to use, facial recognition systems provide a high level of security. Furthermore, the facial recognition system allows you to instantly notify about facial identification cases.The market of biometric technology is continuously growing It is also important to emphasise that the system itself automatically updates biometric data. Photos in biometric profiles can be updated directly from the video stream. The data is stored in long-term storage and does not take up much memory. The reasons mentioned above provide all business fields with a competitive advantage. Since the market of biometric technology is continuously growing, contactless identification will be highly demanded in the long run. Impact of COVID-19 Plus, the contactless facial recognition system is especially relevant today due to the COVID-19 pandemic. Now wearing a mask is required almost in all public places. That is why those systems aimed at people's safety monitoring had to promptly develop their solutions according to the new requirements. Developers of facial biometric solutions have encountered an issue of face detection in masks. It was essential to adapt the software to such changes, more specifically update the face recognition algorithm. It may be illustrated by the case of RecFaces company. RecFaces developers have updated the facial biometric algorithm to ensure the most accurate recognition of people in masks that cover almost 50% of a person's face. Nonetheless, if the company forbids entering its territory without a mask, the system sends notifications (push or SMS notifications) to control people coming through the checkpoint with and without masks. The algorithm update has boosted face recognition accuracy and speed. Global transformation As a matter of fact, facial recognition algorithm has evolved around the world. According to the tests conducted by the National Institute of Standards and Technology (NIST), the top face identification algorithm of 2020 has an error rate of 0.08% compared to 4.1% for the best algorithm in 2014. Such improvements will reduce risks linked to misidentification, and expand the advantages that can come from proper use in the long run.Al and deep learning are key elements of the latest-generation algorithms According to the National Institute of Standards and Technology report recognition errors were caused mainly by image quality variations like pose, illumination and expression. In 2018 the software was at least 20 times more accurate than it was in 2014 and in 2019 finding “close to perfect” performance by high-performing algorithms. Such improvement has resulted from the integration or replacement of previous approaches with those based on deep convolutional neural networks, operating even with poor quality images. Artificial Intelligence (Al) and, more specifically, deep learning are key elements of the latest-generation algorithms. Facial recognition is reaching that of automated fingerprint comparison, which has been considered as the gold standard for identification for a long time. Therefore, there is no doubt that innovation drives the development of solutions, and biometric technologies also move with the times. The shift from fingerprints to facial recognition is a vivid example of such evolution!
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm biometrics integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative security technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro intrusion portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping to cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalise on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight hosted managed service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarise system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Sovereign Safe provides deposit facilities that truly push the global standards of the safe deposit industry. With the very latest modular high compression steel vaults constructed and installed by specialist manufacturers, state-of-the-art biometric access with complete audit trail from electronic alarmed lockers, Sovereign stands unrivalled as a globally recognised company in any high security facility services, anywhere in the world. Enhanced security No high street bank or any safe deposit centre can match Sovereign’s credentials and the extraordinary security levels that they have achieved. People across the country have been targeted for their valuables, not only on the streets, but also in their homes. Challenges were to offer a complete peace of mind by delivering the highest-level of security and access permission through various levels of security check (e.g. Card and Biometric Palm Vein Reader). Matrix Access Control solution Matrix Access Control solution is designed to address security concerns in a professional and systematic method Matrix solved these challenges by providing COSEC PANEL LITE, VEGA, PVR, PATH Series, and ARC DC100P. Matrix Access Control solution helps in enhancing security, along with barriers and door controllers. Matrix Access Control solution is designed to address security concerns in a professional and systematic method, without compromising on hospitality and productivity. It allows enrolling visitor’s Fingerprint/Palm Vein Reader/RFID Card, in order to provide the visitor with access to restricted areas, as per the below criteria: 2-Person rule: This is enforced by requiring the presence of at least two authorised persons Route based access: This allows user to access the authorised route only Anti-pass back: This restricts to enter a secured area second time without first leaving it Result: Peace of mind Seamless experience Increase productivity of staff Quick actions on exceptions Multi-layer authentication Boost customer satisfaction Matrix products offered include: COSEC VEGA CAX integrated with turnstile COSEC PVR DOOR CONTROLLER COSEC PANEL LITE COSEC PATH Series COSEC ARC DC100P
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorised and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorised to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorised fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilise the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorised entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.
Boutique office company, Office Space in Town, has selected Opem Security to install SALTO Systems to provide access control for its newest serviced office development in London, Blackfriars. The company offers businesses and individuals flexible workspace solutions, providing serviced offices, co-working space, meeting rooms and virtual offices in London, Cardiff, Northampton, and Edinburgh. Designed meeting rooms Affectionately named the ‘Happiness’ building, this vibrant and quirky, new serviced office development is located in Tudor Street in the heart of London’s prestigious Midtown district. The building has undergone an extensive £8.5 million refurbishment that has transformed it into affordable uniquely themed, high-spec luxury offices intended to help boost productivity and wellness in a professional, HQ quality standard office – created for those who appreciate style with a twist. The building now incorporates over 475 workstations split over five floors The building now incorporates over 475 workstations split over five floors, each with its own individual colour treatment. The building also boasts nine individually designed meeting rooms – each based upon the theme of ‘what makes you happy’ ranging from a quirky hot air balloon designed room, through to an aquatic haven, deep down ‘under the sea’. Controlled air conditioning It is also the first building in the UK to feature Clear View Dynamic Glass - intelligent, electrochromic windows that automatically tint to maximise natural light and reduce heat and glare. The building also boasts the most-up to date technology, enabling it to achieve a Wired Score rating of Platinum, high standard soundproofing and individually controlled air conditioning, to support clients’ growth and business needs. Sara Chegwidden, Chief Operating Officer (COO) for Opem Security says “Right from the start of this project, the client wanted to incorporate the latest technology into the development. This meant that security for the building also had to be top notch, and that the access control system chosen had to be a technologically modern locking solution that would satisfy the needs of both the business and its users.” Integrated electronic locking SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution “It had to be wire free with no cabling requited for network points etc alongside the requirement to be able to grant access rights instantly and revoke them in real-time if and when required. An audit-trail overview of who accessed which door at which time together with easy installation completed the requirements. So, after a site survey and listening to how the customer wanted to operate and manage the building we recommended SALTO as the best product to fit the brief.” SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution that bring seamless access to every door in any building in an efficient, safe and secure accessible way. Building operating requirements It’s tailored to the customer’s needs and building operating requirements and designed to give users ultimate freedom of choice regarding system layout, type and number of access points as well as level of security. It enables users to incorporate the functionalities they need now, and upgrade accordingly as and when their needs grow. Security risks related to lost keys are completely eliminated and system operators can manage every door and user access plan from powerful web-based management software. Both staff and customers can open doors with convenient and flexible credentials; smart key card or by smart phone if required. There are no costs from lock replacement caused by lost keys, which saves valuable time and resources across the organisation. Operating smart cards Controlling access plays an important role in the security of any building The new security system is now installed, with a total of 88 doors across a mix of communal doors, offices, meeting rooms and exit doors secured by XS4 original narrow body smart handle sets and SALTO wall readers. Controlling access plays an important role in the security of any building and SALTO’s Innovative, wire-free technology allows stand-alone electronic locks to read, receive and write information via their operating smart cards. And, if the client chooses, they can also incorporate the use of JustIN Mobile technology making it easy and secure to incorporate smart phones as a part of their access control solution. Access control solution Office Space in Town’s Developments Director, Simon Eastlake, comments, “From initial investigation through to building wide deployment, Opem Security have provided an excellent service. SALTO now provides us with a robust future proof access control solution that allows for the integration for third party systems as well as wireless doors and mobile tech as we wish.” Jason Pelham, Founder and Chief Executive Officer (CEO) for Opem Security concludes “The combination of the SALTO SPACE platform together with competent engineers and clarity of direction from such a professional client ensured this project was a pleasure to work on. The installation was straightforward and this ensured we delivered the project on time and fully met Office Space in Town’s security expectations.”
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
Sharps Pixley is a British bullion house, formed in 1957 when two historic private bullion partnerships merged. In 2015 Sharps Pixley decided to put physical gold back on the streets of London via a flagship high street presence in St James’s Street, just off Piccadilly. In this very special shop, not only can customers buy products but they can also store them on-location in new, state-of-the-art safe deposit box facilities. Sharps Pixley needed to upgrade their ageing control system for their safe deposit box service. Old biometric system They were facing a number of challenges with their old biometric system which was substantially impacting customer experience and satisfaction: Capturing fingerprints during the enrolment phase, especially with older clients, would typically take several attempts. During the verification process, the shop operator faced similar issues thus requiring multiple system restarts to get the device working correctly. The software was unstable and would often crash. New additional functionalities were also required to be able to offer the correct secure services to the clients: Two person authentication to access a single safety deposit box. Manual authentication in addition to biometric identification. Replacing the key fob with a biometric solution. Access control technology Arana Security was contracted to help. Operating in the UK and Middle East, Arana Security specialises in biometric solutions, access control technology, surveillance and monitoring systems. They set about to design a new application for Sharps Pixley, to enhance the security, authentication and usability of the system - adding new next-level security clearance and a fresh and improved enrolment of clients’ biometrics. For the important biometric part, Arana Security and Sharp Pixley selected IDEMIA’s MorphoWave Compact contactless fingerprint device to enable fast, smooth and accurate verification of clients. MorphoWave Compact performs a 3D scan and verification of four fingerprints in less than one second, in a quick, easy and hygienic touchless hand wave gesture. Thanks to advanced algorithms based on Artificial Intelligence, the accuracy is very high, even with ageing fingers. Contactless biometric devices The system provided has improved the client’s service and provided a more robust, secure and reliable solution The implementation of MorphoWave Compact contactless biometric devices meant less time wasted at the desk waiting for confirmation of IDs and less stress on both the clients and employees. The system provided has significantly improved the client’s service and provided a more robust, secure and reliable solution. Sharps Pixley’s comments: “We approached the Arana team with a particularly unique set of problems to resolve including a security system that used hardware and software originally designed for a totally different purpose. I knew what I wanted but was not sure if it was possible. I was essentially an explorer deep in the jungle with a perfect map in my own head, but with no tools or machinery to hack my way out." Provides palpable reassurance "Arana did more than just clear a path for me to get to my destination - they paved the road for me afterwards. MorphoWave Compact device from IDEMIA is the icing on the cake that makes this all possible. Used properly it is refreshingly simple and intuitive. The team here and our clientele no longer struggle to manage or use our access system. The device itself provides palpable reassurance in the technology and that has true value”, says Bruno Garcia, Sharps Pixley.
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fuelled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralised access control systems Almabani General Contractors was using traditional decentralised access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognised in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralised, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customised reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralised solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customised with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralised time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download