Integrated security manufacturer TDSi is pleased to confirm its continued programme of Table Talks sessions for its partners and end users. TDSi began hosting these regular sessions during the Lockdown phase of the COVID-19 pandemic, to deliver technical and informational content to interested parties. TDSi’s Table Talks are free online discussion and training sessions with a Roundtable of its key technical and commercial team members. Each session features TDSi’s security experts,...
Identiv, Inc. has announced its cohesive collection of COVID-19 response solutions in order to support enterprises and government customers in worldwide offices that are now reopening. Identiv’s frictionless, touchless solutions create healthier and more hygienic offices. The hands-free technology also streamlines transactions and access, temperature tracking, and contact tracing to help employees and visitors feel safe and secure. Frictionless, hands-free technology “With the thr...
Nexkey, a globally renowned innovator in the cloud and mobile-based access control industry, trusted by over 20,000 users, has announced the launch of Nexkey Solo, a wireless, battery-powered door strike. Traditional access control solutions that work with wired electric strikes require a door controller, reader, and access control panel to be connected with the strike to make the whole solution work. The result of needing up to four pieces of hardware drives up installation effort to hours and...
Nets, a renowned European payment and financial solutions company, has announced introducing a completely new way to identify customers securely from a distance. The Nets Passport Reader service bridges the gap between physical ID documents and digital identification, with the help of a simple smartphone app. The service has no geographical limitations and is compatible with passports from over 130 countries. Demand for digital identification is growing rapidly and will likely only increase, gi...
Suprema, a provider of access control and biometrics, is refocusing its efforts to offer fully integrated access control solutions for physical security and time and attendance applications in the post-pandemic world. With comprehensive end-to-end access control and workforce management system capabilities employing various touchless credentialing solutions such as facial recognition, RFID, and remote and contactless mobile devices, Suprema provides the extreme levels of versatility, proven per...
Vanderbilt, a provider of state-of-the-art security systems, announces the induction of Facial Recognition Terminals with Temperature Detection by ZKTeco into their access control portfolio. These products are touchless technology that enables skin temperature measurement and masked individual identification during facial and palm verification at access points. They interface with Vanderbilt’s ACTpro on-premise and ACT365 cloud-based access control solutions, and communicate with the syst...
The new DoorBird IP video intercom provides an option for adding access control via an ekey fingerprint scanner. The D2101FV EKEY door station is equipped with a cutout for installing the ekey home FS UP I fingerprint reader. Visitors and homeowners can use all the functions of the smart intercom immediately after installation including opening doors via app or RFID key fob. Once the ekey module has been mounted, access can also be granted by fingerprint. The DoorBird app controls, RFID reader and ekey reader can all be used simultaneously. The D2101FV EKEY door station is made of stainless steel and produced in Berlin, Germany by Bird Home Automation, a provider of smart door communication. The intercoms include high-quality components such as an IP video camera with a wide-angle lens and night vision, a speaker with echo and noise suppression, a configurable motion sensor and an RFID reader. Home and building system integration Using the open API interface, the DoorBird door station can be integrated into third-party home and building automation systems. The ekey fingerprint scanner is one of the fingerprint access solutions worldwide. With the ekey home FS UP I module, the Austrian company ekey biometric systems offers a stand-alone fingerprint reader that can be purchased separately and installed into the DoorBird D2101FV EKEY intercom at any time.
Nedap adds the multiple technology reader NVITE to their long-range identification product portfolio, for contactless driver identification. As a specialist in systems for long-range identification, Nedap is offering a wide range of solutions to identify vehicles and drivers, without delaying them. NVITE supports reading a wide range of credential technologies, such as Smartcards, Proximity cards and QR codes. The built-in Bluetooth Low Energy (BLE) and Near Field Communication (NFC) modules enable secure communication with third party smartphone applications. Access control applications NVITE is the state-of-the art reader that serves mixed user-groups, such as staff, tenants and visitors, in parking and access control applications. A welcoming experience starts at the gate, specifically for visitors, contractors and other users that come and go on a non-frequent basis. It is often challenging to manage these groups and from experience it is common knowledge that these type of groups can cause challenges that result in queuing at the gate. Nedap provides flexibility to end-users and integrators to manage these types of vehicle flows Offering a reader that supports multiple technologies in one device, Nedap provides flexibility to end-users and integrators to manage these types of vehicle flows using dedicated identification methods depending on user rights. Combined with the other solutions in its product portfolio Nedap is able to accommodate an even larger flow of vehicles, thereby contributing to a seamless entry and exit process at the gate. Multiple credential technologies “Our partners in the field of security now have access to an all-in-one reader that supports multiple credential technologies. In order to further optimise their services for multi-tenant and visitor management combined with physical and parking access control,” says Ido Wentink, Proposition Manager for the solutions portfolio for Automatic Vehicle Identification. “NVITE is the compact, flexible reader that enables users to identify themselves by presenting their card, scanning a QR code or activating their smartphone for having access to the facility.” The NVITE reader supports the following credential technologies: Smartcard (13,56 MHz): LEGIC Advant and Prime, MIFARE (DESfire), HID iClass, Sony Felica Proximity card (125 kHz): Nedap, HID Prox, EM4200, AWID QR: Quick Response and most mainstream 1D and 2D barcodes Bluetooth Low Energy (BLE) and Near Field Communication (NFC) Enabling secure communication To serve a growing number of mobile applications, Nedap has developed the Mobile ID Protocol. This protocol enables secure communication between the reader and any third party smartphone app. Nedap Mobile ID wireless communication protocol is based upon BLE and NFC. With this, the NVITE reader and third party application will perform secure authentication. NVITE supports a variety of well-established industry-standard communication protocols, such as Wiegand and OSDP (Open Supervised Device Protocol). These protocols enables seamless communication between the reader and a wide variety of access control panels.
Suprema, a provider of access control and biometrics for physical security, officially announces the formation of Suprema Europe SARL, which has been established to provide partners and customers in the region with better localised support. High demand for RFID solutions Formerly Suprema France SARL, Suprema Europe SARL will provide direct supply products and services to European partners. Suprema Europe has been granted an additional capital and will maintain products in stock and a technical support hotline in Europe. This will help Suprema partners grow further with better services available in Central European Time. Given the global pandemic and increased demand for touchless access solutions, Suprema is experiencing high demand for contactless solutions such as RFID solutions, mobile access cards and facial recognition readers.
To meet the evolving design needs of the diverse and growing market for biometric access control solutions, the globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced the expansion its fingerprint authentication touch sensor portfolio for physical and logical access devices and applications. FPC1025 sensor access module To enable maximum flexibility in product design, the new FPC1025 sensor version from Fingerprints has a smaller footprint than the other models in the series. The FPC1025 sensor has also been optimised for access control devices where every millimetre counts. This is the fourth addition to Fingerprints’ growing access control solutions portfolio, which focuses on offering high performance biometrics with the lowest power consumption and enabling a variety of form factors. Expansion of biometric solutions portfolio Demand for biometrics in access control solutions is expanding and diversifying" “Demand for biometrics in access control solutions is expanding and diversifying. With the further expansion of our biometrics solutions portfolio, we are enabling those with even tighter design requirements to enhance new products with market-renowned biometric authentication technology,” said Michel Roig, Senior VP of Payments and Access at Fingerprints. Michel Roig adds, “By leveraging our expertise from the mobile world, we’re committed to tailoring our solutions to meet the power, cost and design challenges of the latest physical and logical access control use cases.” Support for devices with streamlined user-authentication Like the rest of the portfolio, the FPC1025 can be used by devices and applications where secure, streamlined user-authentication is required. All sensors in the portfolio come with unique features that enable an excellent and secure daily user experience. The access sensor series combines Fingerprints’ proven technology to make life simple for device makers and end users.
Organisations globally are facing an urgent need to rapidly onboard hundreds of key employees, such as medical staff, nursing staff and other staff members, on a daily basis across multiple facilities and sites. HID Global, a worldwide renowned provider of trusted identity and identity management solutions, has introduced an emergency badging solution to help manage the secure issuance and administration of staff badges and access control credentials for employees as they navigate the current global health crisis. HID FARGO Connect solution HID Global’s offering combines its award winning HID FARGO Connect solution for cloud-based ID card printing with its latest innovation for cloud-based identity management solution to equip organisations with a convenient “touch-free” system that minimises the impact on overwhelmed credential issuance departments and drives a more secure work environment. Administrative and security challenges that have emerged among industry sectors such as healthcare institutions, government agencies and other organisations providing emergency services include: Inefficient access management processes that require manual sign-in and sign-out process. Overwhelmed IT departments that have had to adjust their credential issuance systems. Restricting access to in-demand items such as medical equipment and PPE (Personal Protective Equipment), and safeguarding against theft. Emergency badging solution HID Global’s emergency badging solution includes the tools required to issue secure credentials to temporary employees, such as: HID FARGO desktop card printer for ID and card issuance. FARGO Connect Console for badge issuance and management. A free, six-month subscription to HID FARGO Connect and the company’s cloud-based identity management platform. Consumables, cards, and subscriptions to HID Global’s applications and secure cloud environment for quick and convenient badge operations deployment.
The ID badge has become a nearly universal emblem of corporate life. In companies large and small, new employees are issued a radio-frequency identification (RFID) card that provides visual identification and unlocks the door when they arrive at work. RFID cards provide employees with secure 24-7 access to the workplace while maintaining a record of exactly who has entered the building and when. They are cheaper, easier to manage and more secure than physical keys; if they are lost or an employee is terminated, card access can simply be turned off. Protecting sensitive information The same cards can be used to enable access to all kinds of business systems beyond the front door The same cards can be used to enable access to all kinds of business systems beyond the front door. Companies can leverage the cards employees are already carrying to control access to the information, systems, materials and devices their employees use at work. Companies need systems in place to ensure that authorised employees have access to the information, business systems, materials and equipment they need, while keeping unauthorised users out. Effective access control and user authentication helps companies protect sensitive information (such as financials, HR data or company IP), control material and supply costs, improve safety and streamline workflows. User authentication is the ability to correctly identify an individual user and match their information to the devices or systems they are using. Access control is the ability to ensure that only authorised users are able to gain access to an asset or system. User authentication and access control Companies may use a variety of strategies for user authentication and access control, including physical keys, passwords and PINs. However, these methods are often less than ideal, especially when employees have to manage multiple keys or remember different passwords and PINs for different systems. Using an employee ID badge to access all of the other systems and materials they need during their workday is faster and easier for employees and simpler for business IT departments to manage. RFID systems for user authentication and access control can be used across a variety of business systems and devices. For example: Single sign-on (SSO) systems They also eliminate the IT headache of resetting forgotten passwords and PINs SSO systems allow a user to sign into the company network and access all of the software systems and records they are authorised to use and view. An RFID reader can be attached to, or embedded in, each workstation to enable fast and easy sign-on with an employee ID badge. RFID is more secure than password or PIN systems, as employees generally keep their ID badge on their person and are less likely to share a badge than a password. They also eliminate the IT headache of resetting forgotten passwords and PINs. RFID is especially valuable in settings where multiple employees may utilise the same workstation, as in call centers with multiple shifts or companies with hot-desking arrangements. The employee can easily gain access to all of their systems and files from any workstation by simply swiping their ID card to sign onto the network. Secure print Management Secure printing is beneficial for both cost-control and information management. Employees can send a print job from their desk at any time. The printer will only start printing when the employee signs in to start the job. This ensures that sensitive information will not be left lying on an unattended printer if there is a delay between the employee hitting ‘send’ from their desk and picking up the printout. Print management also reduces waste and provides accountability by tracking how much each employee is printing. RFID access for print management is faster, easier and more secure than entering login credentials into a small printer interface. Meeting check-in and scheduling Electronic displays are now used for scheduling, tracking attendance and controlling AV equipment Meeting room displays can now do a whole lot more than simply announce which meetings are scheduled for the day. Sophisticated electronic displays are now used for scheduling, tracking attendance and controlling AV equipment. Integrating RFID into a meeting room display allows employees to quickly check in to their meeting as they walk through the door. Systems can even be set to recognise the meeting organiser and automatically launch presentations or conference calls when they arrive. RFID user authentication Industrial vending machines and kiosks: Industrial vending machines and kiosks are an increasingly popular solution for providing employee access to necessary materials and equipment, from lab chemicals to safety gear. RFID user authentication and access control ensure that only authorised employees can get access to materials and supplies. They also link user identities to the materials they are using for increased accountability and better materials management Materials handling and manufacturing equipment: RFID can be used to control access to expensive and potentially dangerous equipment such as forklifts or robots. User authentication and access control ensure that only trained and authorised users are able to operate the equipment or make changes to their programming. RFID is simpler and more secure than a key system and provides a record of who has used the equipment.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-based products We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile credentials applications We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customised action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future of biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video management platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access control world An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm biometrics integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative security technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro intrusion portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping to cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalise on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight hosted managed service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarise system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enrol and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organisation. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralised location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customised reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralised monitoring and control Increased productivity Customised reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
Comelit has continued its work with multi award-winning London property developer, Howarth Homes to present new homeowners at office-to-residential conversion, Lovell House with smart access control and door entry. Lovell House, located off Uxbridge High Street in Middlesex is a stunning collection of 45 executive suites, one and two bedroom apartments set over six floors, each finished to a high specification. Smart access control and door entry system Each apartment has been individually planned to ensure a light and airy interior with excellent accommodation flow. Within the initial design process, Comelit was invited back to work with Howarth Homes to accommodate a request for smart security right from the point of entry to individual apartment access. Linzie Howland, Sales Director of Howarth Homes stated, “Howarth Homes is adept at creating affordable option developments interiors that demand more than just cursory attention. Every detail in each of our developments has been carefully and thoughtfully considered to ensure that our new home promises easy, hassle-free living.” SimpleKey access control solution Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets Linzie adds, “Lovell House is testament to this commitment, and commands superior specification right from access control through to door entry. We have gone above and beyond the expected to ensure homeowners can take advantage of purchasing offers and live in a development where we present smart security and visitor management without compromising aesthetics.” Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets in every apartment, allowing visual door entry operating through its 2-Wire SimpleBus solution. The powerful combination presents homeowners with the capability to answer access requests and manage home access. Comelit access control readers installed Each of the five floors has an access control reader installed alongside each lift facility, totalling 19 units around the site. The development itself is finished with a bespoke stainless steel panel with bezel design. All systems have been designed and installed to comply to Secured by Design standards. Tom Kidston of Excellence Electrical said, “Howarth Homes prides itself on its pledge for connected living for a connected world, so it’s essential access control and door entry is planned into the specification and design.” Residential security systems Tom added, “This is especially important at office to residential conversion works such as Lovell House, where systems need to be considered with the change of purpose to the building. Early planning ensures a coordinated approach to installation, with minimal cabling requirements to remain compliant, stylish and secure.” Daniel (Dan) Wood, Southern Sales Manager at Comelit UK said “Uxbridge is increasingly growing in demand for first time buyers and rental property, experiencing excellent capital growth. Howarth Homes has a number of developments in the area and we have been thrilled to work closely with them to deliver total solutions for access control and door entry.” Dan adds, “At Lovell House, the specification brief was to create futureproof, smart security and visual visitor management, delivered seamlessly with our SimpleBus and SimpleKey systems.”
Valdosta Regional Airport in Valdosta, Georgia offers three daily commercial flights to and from Atlanta Hartsfield-Jackson International Airport, along with general aviation. The airport contains three runways, two of which are used by commercial aircraft. The airport offers ground transportation, free parking, a Subway restaurant, and many other services such as hangar space and flight training to name a few. Previously, Valdosta Regional Airport operated a legacy Matrix access control system. The proprietary system, including the readers, panels and software, was outdated, making it difficult and expensive to obtain replacement parts. Building automation systems Looking for an open solution, Valdosta Regional Airport turned to Allcom Global Services for their expertise and upgraded to AMAG Technology’s Symmetry SR Retrofit Access Control system with HID readers. “Symmetry integrates into various video, intrusion and building automation systems,” said Kevin Cioffi, vice president, Allcom Global Services. Valdosta has more freedom to research competitive pricing and alternative options" “By choosing an open system, Valdosta has more freedom to research competitive pricing and alternative options. We are thrilled they have chosen Allcom. We gutted all the circuit boards and changed them to the Symmetry panels,” said Tim Register, operations manager/airport security coordinator, Valdosta Regional Airport. “We kept the antennas and how the data was transmitted. All the mounts stayed the same; we just swapped in Symmetry and it worked.” Integrating different technologies Symmetry controls access to the perimeter of the airport including the vehicle access gates and all outside doors facing the Security Identification Display Area (SIDA). The SIDA includes all areas that have access to the commercial apron and tarmac. The SIDA also requires a reader with a PIN-plus-card swipe to open, which make up 75% of the airport’s readers. The remaining Airport Operations Areas (AOA) require only a proximity card swipe to open, which are mostly internal doors and the main entrance. Thirty-two new HID proximity card readers were installed in total. To get the open system the airport required, Valdosta Regional Airport replaced older panels with Symmetry SR panels. As the Symmetry system changes or expands, integrating different technologies or adding more readers will be easy and less expensive. More economical approach The simple job of creating a badge for a user was cumbersome and time consuming with their old system The security operators found Symmetry much easier to learn and use, saving money and hours in training time. The simple job of creating a badge for a user was cumbersome and time consuming with their old system. With Symmetry, badges are created on demand, onsite, with no hassle or extra charge. “Symmetry provided us a more economical approach to facilitate the same thing we used to do with a more expensive, proprietary system,” said Register. “It is much easier to create a badge with Symmetry.” Life flight helicopter Airport authority employees, TSA, airline employees, fixed based operators, life flight helicopter and fixed wing aircraft are all protected by Symmetry. In addition to the perimeter, Symmetry controls access to all work areas within the airport and to the hangars located inside the perimeter fence. “An incident happened one Sunday morning where a car hit a pole and brought the power down,” said Tim Register. “If we were operating the Matrix system, it would have been down for hours. Our Symmetry system was only down minutes.”
HID Global, globally renowned company in trusted identity solutions, has announced that the traffic branch of the Singapore Police Force has deployed an electronic Know Your Customer (eKYC) system that uses HID Lumidigmâ V-series Fingerprint Sensors to verify the identities of driver’s license applicants. Lumidigmâ V-series Sensors The HID Lumidigm sensor’s patented multispectral imaging technology has helped improve identity-verification speed and efficiency as compared to their previous paper-based process, and its proven liveness-detection capabilities significantly diminish the risk of fraudsters compromising the eKYC system. The new eKYC system improves security by using fingerprints to verify the “true identity” of driver’s license applicants Deployed by HID partner Secur Solutions Group at Singapore’s three driving schools, the new eKYC system improves security by using fingerprints to verify the “true identity” of driver’s license applicants. The speed and reliability of the Lumidigm sensors has enabled the entire enrollment process to be performed at kiosks in seconds, from fingerprint capture through matching against the actual identity documents (NRIC/Work Permit). Fingerprint sensors The Singapore Police Force is now enrolling 500 to 700 individuals a day at the kiosks since deployment and has cut almost 1,500 man-hours of labor per month since eliminating its staffed counters and manual workflow. “The HID Lumidigm sensors have outperformed all alternatives with respect to speed, accuracy and consistency of image acquisition regardless of finger or environmental conditions,” said Tseng Wun Hsiung, CEO of Secur Solutions Group. “New opportunities are being considered for service enhancement and parts of the eKYC system are being evaluated for integration.” Integrated with multispectral imaging technology HID’s V-Series Lumidigm sensors were the first fingerprint products certified to the ISO standard HID Global’s patented multispectral fingerprint imaging technology captures unique characteristics from the finger’s surface and subsurface, which is particularly important for the Singapore Police Force’s eKYC system because it serves a large population spanning many ages, ethnicities and skin types. The Tseng Wun Hsiung technology works reliably with normal, wet, dirty, dry or damaged fingers, and in sunlight or wet or cold conditions. Field-updatable liveness detection is employed to distinguish between the captured biometric data from a real living person versus a plastic, fake or other artificial fingerprint copies. HID’s V-Series Lumidigm sensors were the first fingerprint products certified to the International Standards Organisation (ISO) standard focused on anti-spoofing and liveness detection. Fingerprint recognition “HID Global is delighted that our Lumidigm V-series sensors are delivering unparalleled accuracy in fingerprint data capture for the Singapore Traffic Police’s new eKYC system,” said Sujan Parthasaradhi, Director, APAC, Extended Access Technologies Business Area, HID Global. “We have no doubt our solutions will continue to give the Singapore Traffic Police the confidence of standards-validated spoof protection at their driving schools while helping them sustain the highest levels of efficiency and customer service.”
Navata Road Transport, a road logistics service provider, established in the year 1982, by founder Late Parvataneni Subhas Chandra Bose, now occupies a place of pride among the leading Road Transport Organisations in South India. Navata is spread across a network of 672 branches across India. Warehouses and distribution centers are an integral part of a hub and spoke operations at Navata. HR people at the Navata Road Transport had to manage and do manual work for time-attendance and overtime data. With manual work, data are prone to error. With error-prone data, it was difficult for them to proceed for salary payment. Not only this, but centralised monitoring of time-attendance data of employees of 20 locations across Andhra Pradesh was a difficult task for them. Time-attendance systems As they already had their inhouse application, communication/integration of the time-attendance devices with that inhouse application was the biggest question for them. To communicate with the Linux Server and devices, they required a third party application interface which was not feasible. Established in 1991, Matrix is a provider of Security and Telecom solutions for modern businesses and enterprises. Matrix Door Controller comes with built-in API for system integration As an innovative, technology driven and customer focused organisation, the company is committed to keeping pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance systems as well as Telecom solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints. Built-in API for system integration These solutions are feature-rich, reliable and conform to international standards. Having global footprints in Asia, Europe, North America, South America, and Africa through an extensive network of more than 2,500 channel partners, Matrix ensures that the products serve the needs of its customers faster and longer. Matrix has gained trust and admiration of customers representing the entire spectrum of industries. Matrix has won many international awards for its innovative products. With extensive analysis of the existing system and Navata’s requirements, Matrix came up with the solution to provide Door Controllers. Matrix Door Controller comes with built-in API for system integration. It directly pushes all the entry and exit records to the company’s Linux server. In addition to that, the customer can command and control the devices now through the inhouse Attendance Management and Payroll Application which was not possible earlier. Additional dedicated server Elimination of the errors has been possible in the data of Time-Attendance and overtime So, there is no requirement of any additional dedicated server for the interface with Matrix’s Door Controllers. Ultimately, these Door Controllers have overcome the challenge of communication with the company’s Linux server. By overcoming the challenges of the entire system, the customer enhanced the productivity of the employees and can effectively use the resources. After acquiring the solution from Matrix Comsec, Navata got the efficiency in Time-Attendance management. Elimination of the errors has been possible in the data of Time-Attendance and overtime. Now, employees get an accurate and timely salary at Navata Road Transport after the atomisation of Time-Attendance record and calculation. This increased the productivity of the employees because of the accurate data. This also made the HR work smooth and hassle free. Through live monitoring, centralised control of all the 20 sites has been taken. Reduces installation and maintenance cost Product Offered: COSEC DOOR FOT A Door Controller with higher storage capacity and touch sense keypad. It identifies the user in less than one second. With multiple connectivity options like 3G/4G/LTE it gives flexibilities with the customer’s existing system and therefore, reduces installation and maintenance cost.
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?
Automatic vehicle identification: State of the industry 2020Download
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload