Abloy UK has released a white paper to explore how the critical infrastructure sector can unlock the potential of smartphones in the workplace to improve employee mobility, job satisfaction and productivity. Despite consumer usage of smartphones increasing significantly over the last decade, many organisations haven’t been as quick to tap into the uses and benefits that smartphones can provide. Smartphones, an extension of IT infrastructure Abloy recognises that smartphones should be an...
SmartTask, a UK-based developer of cloud workforce management solutions, has announced the availability of its mobile operations app. Fully integrated smartphone app streamlines mobile patrols, alarm response callouts and keyholding for security officers and controllers helping demonstrate BS7984 compliance. Designed specifically for UK security services providers in collaboration with the UK security industry, SmartTask mobile operations keep field officers in contact with the control room....
Codelocks has expanded its Marine by Codelocks range, giving customers a wider choice of weather-resistant keyless access solutions. Due to the popularity of its CL510 and CL515 Marine by Codelocks products, launched in October last year, Codelocks has added a number of new locks to its Marine by Codelocks range. The new additions include light and medium duty locks from the CL200 and CL400 mechanical range, as well as further heavy-duty locks from the CL500 mechanical range – all of whic...
AlgoSec, a provider of business-driven network security management solutions, announces that AlgoSec CloudFlow, its cloud-native solution that is designed to deliver complete visibility and management of security control layers across enterprise cloud estates, is now available in AWS Marketplace, a digital catalogue with thousands of software listings from independent software vendors (ISVs). AWS Marketplace makes it easy for organisations to find, test, buy, and deploy software that runs on Am...
SALTO Systems, a renowned manufacturer of electronic access control solutions, has committed to helping achieve the 17 Sustainable Development Goals (SDGs) as defined by the United Nations (U.N.) General Assembly. “SALTO Systems has undertaken a profound transformation towards an increasingly sustainable model to respond to its environmental and social impacts, as well as to the main challenges which the world is facing today in the access control and security market. By proactively respo...
Intuitive tool provides step-by-step key system design. ASSA ABLOY, the pioneer in access solutions, announced the release of an improved and streamlined version of their Key System Design Studio. Introduced in 2017 by Medeco, an ASSA ABLOY Group brand, the Key System Design Studio is a user-friendly online portal that walks the master key customer through each phase of designing a new master key system. The new and improved version includes features to make master key design even easier, such...
With schools and universities reopening across the country, the safety of students and staff has never been more important. Security expert Mul-T-Lock recognises that every educational facility has a different security requirement and effective management of everyone who comes and goes is paramount, not only to save time and expense, but to also tighten security. For schools that are looking to upgrade or extend their current master key suite, Mul-T-Lock offers a wide range of cost effective solutions to address the varying needs of education buildings. Providing enhanced security These incorporate patented mechanical and electro-mechanical technology, providing enhanced security with increased control over access; at the same time reducing the number of keys that can be lost or stolen. Mul-T-Lock’s master key platforms are customisable depending on requirements, with a wide range of products including various lock and cylinder types. Mul-T-Lock has also recently launched a new antibacterial key solution The system is designed to serve dynamic and growing environments, so each master key solution is scalable to suit an education building’s needs both today and in the future. Mul-T-Lock has also recently launched a new antibacterial key solution, providing a more hygienic solution for education applications. The keys feature an antibacterial plastic head that contain an agent that suppresses the growth and spread of unwanted bacteria. Lower bacterial contamination The new keys have been successfully tested to ISO 22196, showing significantly lower bacterial contamination compared to other keys. If education facilities want to move away from mechanical to an access control solution, Mul-T-Lock specialises in a number of systems that can help. Mul-T-Lock also recognises that whilst access control is a fundamental element of security in higher education especially, many aging systems urgently need to be upgraded. According to a recent survey, higher education security and IT professionals are ready to embrace more modern technology as a way of improving the experience for students and staff. The findings showed that over half (54.2%) of respondents want to unify their access control credentials to support multiple applications whilst 44% want better integration with other security systems. Wireless locking system With SMARTair®, lost cards can be cancelled, and replacement cards reprogrammed for increased security Now that education buildings should provide a safe and hygienic environment with reduced touch-points for pupils and staff, Mul-T-Lock’s SMARTair® access control system replaces keys with a wireless locking system operated by smartcards and even smartphones when used in conjunction with Mul-T-Lock’s Openow™ app. With SMARTair®, lost cards can be cancelled, and replacement cards reprogrammed for increased security. The system can be tailored to meet each building’s needs and can be reprogrammed using the latest in access control management software as those needs evolve, without having to replace any physical locking systems – making it a cost effective and straightforward solution for all education buildings. Controlling access rights With no hardwiring, the system can be installed at low cost with minimal disruption to education facilities. Designated system managers can also monitor and control access rights – allowing personnel access when needed and revoking access once it is no longer required. By utilising the Openow™ app, facilities managers and security administrators can instantly send, revoke or update virtual keys from the designated SMARTair® software or web browser allowing staff to access specific buildings or rooms via their smartphone. System managers can be anywhere in the world when controlling access rights; making the whole process more convenient and secure for everyone. This also significantly reduces whole life costing, as it removes the need to replace key cards when they are misplaced.
DigiCert, Inc., the globally renowned provider of TLS/SSL, IoT and PKI solutions, has introduced Secure Software Manager, a modern way to automate and manage PKI security across CI/CD pipelines. Secure Software Manager Secure Software Manager makes it easy for enterprises to integrate secure key management for code signing into their development processes, while delegating cryptographic operations, signing activities and management in a controlled and auditable way. The drive for agility leaves product engineering organisations exposed to internal threats and hackers. Stolen code signing certificates and their associated keys have led to many high-profile attacks, where these keys have been used to sign malware and commit fraud. Cryptographic asset protection Secure Software Manager removes the burden on engineers for cryptographic asset protection DevOps teams need signing solutions that fit within their workflows and make signing keys easily accessible when pushing code, but many orchestration tools do not include key protection. Secure Software Manager removes the burden on engineers for cryptographic asset protection, enabling them to sign with confidence and freeing them to do what they do best: develop and deploy software quickly and efficiently. It provides: Command line tools that easily integrate with CI/CD systems. Automatic signing of packages, binaries and containers on every merge to master when authorised. RESTful APIs for custom integrations. Simultaneous signing of Docker containers and software code, adding trust to every step of process. Strengthening security around key accessibility Using Secure Software Manager reduces the risk of key theft and misuse by strengthening security around key accessibility and storage. Hash signing lets developers protect intellectual property, as no files are uploaded to the cloud. Additionally, IT organisations must comply with a variety of rapidly changing regulations that require robust key protections across increasingly dynamic and orchestrated environments. They also require full reporting and auditing capabilities to ensure compliance. Secure Software Manager enables: Secure private key management in hardware security module (HSM) and offline mode for keys when not signing. Flexible deployment via SaaS or on a public or private datacenter. Centralised user management with flexible, role-based permissions and single sign-on (SSO). Audit trail of signing activity for forensics and full accountability. Data and cyber security Secure Software Manager meets customers where they need to be, whether on-premises or in the cloud" “Secure Software Manager meets customers where they need to be, whether on-premises, in the cloud, or in hybrid environments through the DigiCert ONE platform,” said Senior Vice President of Product (Emerging Markets), Brian Trzupek, at DigiCert, Inc., adding “Our customers can enjoy complete automation or tailor the solution to support the degree of functions they require and be assured of seamless integration with their familiar CI/CD tools and processes.” Beyond authenticating devices for the IoT and enterprise networks with certificates issued from DigiCert ONE managers, organisations can also secure code and firmware. This includes enabling secure over-the-air updates throughout the lifetime of the device, using Secure Software Manager. Built on DigiCert ONE, PKI management platform Secure Software Manager is built on DigiCert ONE, a PKI management platform built with a new architecture and software to be the PKI infrastructure service for today’s modern cloud-native challenges. Released in 2020, DigiCert ONE software platform offers multiple management solutions and is designed for all PKI use cases. Its flexibility allows it to be deployed on-premises, in-country or in the cloud to meet stringent requirements, custom integrations and air gap needs. It also deploys extremely high volumes of certificates quickly using robust and highly scalable infrastructure. DigiCert ONE delivers end-to-end centralised user and device certificate management, a modern approach to PKI to provide trust across Kubernetes clusters and dynamic IT architectures.
Codelocks Inc., an access control company that designs and distributes innovative, keyless door locks and access solutions, introduces its newest KitLock by Codelocks product, the KL1100 KeyPad. This standalone lock shares a similar design and powered latch as the recently released contactless, smart card-accessible KL1100 RFID, yet maintains the traditional code keypad and features available in KitLock products. Multi-occupancy applications Utilising the same versatility and flexibility found in all Codelocks’ products, the KL1100 KeyPad can be operated in two distinct functions. The Public Function is suitable for short-term, multi-occupancy applications such as gyms, hotels and hospitals. The KL1100 KeyPad is the perfect addition to our KitLock by Codelocks range of products The Private Function is best for individual users, such as students or employees that require regular access to a personal locker, for example. The KL1100 KeyPad offers an optional pull handle, and when equipped with, the lock is fully compliant with all aspects of the Americans with Disabilities Act (ADA). “The KL1100 KeyPad is the perfect addition to our KitLock by Codelocks range of products,” said Matt Welty, Vice President, Codelocks Americas. ADA-compliant lockers “The product enhancements make this the ideal solution for managing large quantities of lockers or someone looking to improve their spaces with a sleek, modern design. Also, there is currently a void in the market for fully ADA-compliant lockers and cabinet locks, and with the added benefit of the KL1100 KeyPad pull handle, Codelocks now fills that void.” The KL1100 KeyPad is straightforward to install and a simple retrofit to the popular KL1000 footprint and is available in a metallic silver or gloss black finish. It is easy to operate and features a powered latch that enables intuitive ‘push shut’ closing, enhancing the customer experience.
With the outbreak of COVID-19, reducing touchpoints wherever possible throughout a building is front of mind for many businesses, building owners and facilities managers. Fortunately, there are a range of hands-free door opening solutions – available to suit all budgets and needs – that can help minimise the spread of infection, says the ASSA ABLOY Door Hardware Group. Doors and their hardware are the first and last touchpoints when entering or exiting a building, or when moving between different rooms. However, there are options available that can either limit the amount of direct contact with ironmongery and doors or offer an anti-bacterial solution. Overcoming this challenge Eryl Jones, Managing Director at the ASSA ABLOY Door Hardware Group, comments: “Doors are the one item we all touch every day; a physical barrier to keep us secure and safe. But with the increased risk that touching a door now poses, what can we do to overcome this challenge?” “When looking to limit the spread of infection from doors and kill germs, the first place to start is to make sure existing door hardware is being cleaned properly. As one of the most commonly touched surfaces in a building, it is vital that a regular cleaning routine is established. First, hardware should be cleaned with a mild, non-abrasive anti-bacterial detergent and water solution, using a soft cloth. Then, using water and a soft cloth only, surfaces should be wiped to remove any remaining detergent residue. The treated surface should appear visibly wet then allowed to air dry.” Door furniture solution UNION has launched GripSafe, an anti-viral copper door handle tape that simply wraps around a clean door handle" “For those seeking a more secure solution in areas with high traffic, decision makers might want to consider products that allow doors to be opened without a person having to use their hands. For instance, arm and foot pulls are an easy and cost-effective door furniture solution that limits the level of contact an individual has with a door.” “Alternatively, sites might want to think about products that feature anti-microbial surfaces. Hardware treated in this way, or that use materials such as copper, can effectively reduce the risk of transmission. To meet this need, UNION has launched GripSafe, an anti-viral copper door handle tape that simply wraps around a clean door handle and has been proven to inactivate 99.98 per cent of corona viruses. This offers a simple solution that can make a big difference.” High traffic corridors “The next step up would be to look at hold-open door controls, which can help keep doors open at all times, except in the case of an emergency. For instance, ASSA ABLOY offers its DC300G-HF door closer, which holds doors open in medium to high traffic corridors, allowing people to pass through without touching the doors.” Meeting the demands of BS 8300:2018-2 for inclusive design, it offers unrivalled performance when compared with other door closers on the market. UNION also offers DoorSense, a safe and legal means of keeping fire doors open, but which enables a fire door to close automatically in the event of an alarm. Hands-free solution Sharing keys between personnel can quickly increase the spread of bacteria and germs" “For those after a completely hands-free solution, there are a range of access control devices that simply require the wave of a hand to open. These are fitted with motion-sensing technology, and ideally suited to sensitive applications such as bathrooms, and environments such as hospitals, laboratories and schools.” “Finally, there’s also the option of access control solutions that use personalised keys. Sharing keys between personnel can quickly increase the spread of bacteria and germs. An access control system that employs individual keys puts a stop to this, while simplifying key management throughout a site and saving personnel valuable time and money.” Mechatronic locking system Solutions such as ASSA CLIQ® Remote, which is a mechatronic locking system that assigns access rights to a key, allows users to have their own personalised keys for all doors and eliminates the need to share keys. This reduces the risk of bacteria and germs spreading. “By taking these steps and considering the door hardware options available to them, decision makers can help make sure our buildings mitigate the risk of germs and stop the spread of infections, ensuring everyone feels as safe and comfortable as possible in these spaces.”
HID Global, a pioneer in trusted identity solutions, announces that it has collaborated with Temenos, the banking software company, to expand the features of HID’s multi-factor authentication solution that are seamlessly available to Temenos Infinity users through the Temenos MarketPlace. HID’s risk-based authentication solution is pre-integrated with Temenos Infinity, the digital front office product. Temenos is used in over 3,000 financial institutions and supports the digital transformation of banks worldwide, serving customers who increasingly want a mobile and online transaction experience. Risk-based authentication solution “HID is committed to helping Temenos customers meet today’s extraordinary demand for safe and secure access to mobile and online banking services as a result of the current global health crisis,” said Brad Jarvis, Vice President and Managing Director of the Identity & Access Management Solutions with HID Global. HID’s offering supports the Temenos Infinity capabilities through its HID ActivID® Authentication Platform “We are ensuring that Temenos Infinity users can benefit from the broadest range of capabilities in our risk-based authentication solution, from onboarding and transaction signing through self-service and management.” HID’s offering supports the latest Temenos Infinity capabilities through its HID ActivID® Authentication Platform featuring the HID Risk Management Solution with real-time risk profiling technology. Enhancing digital identity Temenos Infinity users now benefit from the following HID multi-factor authentication features as they serve their customers through digital channels: Wide range of options for authentication and onboarding, including static passwords, multiple types of One Time Passwords (OTPs) and FIDO hardware authenticators, and mobile push notification leveraging public key. Pre-integrated HID Identity Verification Service capabilities that simplify and enhance digital identity self-service and management while increasing administrative visibility. “As the leader in banking software, we know that the need for modern digital banking in this ‘New Normal’ will be greater than ever,” said James Holland, Director of Product Security with Temenos. “Temenos is helping banks support today’s surge in digital banking volumes while also ensuring that these interactions are secure at every point, including the consumer’s device where they are initiated. We welcome these new capabilities from HID Global.”
Security specialist Mul-T-Lock has launched MTL™300, a high-security yet affordable locking solution for both residential and small-to-medium business customers. The new cylinder platform is based on field-proven technology that enables it to be patented from day one, all the way through to 2033. As MTL™300 is based on existing technology, it also saves locksmiths expenses traditionally associated with launching new-patented platforms. Ideal for residential and small-to-medium business customers, MTL™300 is an entry-level locking solution that goes beyond the standard, offering advanced, patented technology and protection that complies with international standards. A restricted key copy system enables locksmiths to access exclusive keying profiles using six different special cut types while guaranteeing protection against unauthorised key duplication. Patented locking system MTL™300’s Master Key Systems (MKS) are supported by "Masterpiece" software, so locksmiths can plan and assemble their own MKS and continue to use the same key cutting machines and pinning kits as with Integrator. The combined use of the patented key and key blank, together with the Mul-T-Lock key cutting control system, provides locksmiths with advanced key copy protection, promoting security and trust. Roy Zadikov, Director of Product Management for Mul-T-Lock says: “Like Integrator, MTL™300 aims to satisfy the needs of consumers and small-to-medium businesses, providing convenience and efficiency, while integrating new and more innovative products and capabilities. Many of our locksmith customers have been crying out for a high-security, patented locking system developed by a worldwide leader, marketed at an affordable price, and this is what we’re offering with MTL™300.”
A defibrillator can save the life of a person suffering from cardiac arrest – but it is most effective when used in the first few minutes of the patient collapsing. Studies have shown that a shock given within the first three minutes provides the best chance of survival and even one minute of further delay can substantially lower the chances of recovering. Public Access Defibrillators (PADs) were created to allow untrained members of the public to deliver life-saving treatment in those precious minutes before an ambulance arrives. There are currently over 10,000 in the UK, located in parks, offices, high streets and sporting venues, and they are especially popular in rural communities, where ambulance response times are longer. Every second counts Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or locked. Leaving them open could lead to theft, vandalism or misuse. Leaving them locked could mean that precious moments are lost waiting for a local guardian to arrive – and could even cost a life. To save as many lives as possible, it’s clear that PADs need to be available 24/7, fully operational and easily accessible to users and local guardians. But there is a solution that can meet all these conditions – a lock that can protect against vandalism while providing convenient instant access when required. Life-saving solutions Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or lockedDigital locks are ideal for securing PADs because they don’t require a key, and anyone can be given access over the phone. In the case of a cardiac arrest, the user calls 999 and the ambulance controller provides them with a simple, easy-to-remember code. The ambulance controller can then advise them, step by step, what to do. Local guardians, who have responsibility for the PAD, can be provided with an override key to enable them to monitor and maintain the defibrillator. The PAD cabinets built by Duchy Defibrillators show exactly how this works in practice. Based in rural Cornwall, Duchy Defibrillators manufactures, supplies and installs monitored PAD cabinets. To provide public access to the defibrillators, it needed a lock that could keep its cabinets secure, make them easily accessible and withstand the stormy Cornish weather. Codelocks recommended a digital electronic lock that could operate on a standalone battery, making it especially suitable for remote areas. As well as offering flexible access, digital locks come with a range of varying options and functions to suit different applications. As Duchy Defibrillator cabinets are installed in a wide variety of locations and sometimes need to withstand outdoor exposure, it opted for a robust electronic digital lock that is both affordable and easy to set up. A digital-access revolution Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end-users The example of Duchy Defibrillators shows how digital locks can be used to keep defibrillator cabinets secure while affording instant access to users when they are needed. But the flexibility of digital locks also makes them suitable for securing property and equipment in a wide variety of situations, especially for shared and public facilities. This is why you’ll increasingly see digital locks used to secure restricted areas in hospitals, schools and offices, as well as shared facilities like hotel and gym lockers, public restrooms and more. Digital locks are available for a number of specific applications, including doors, lockers and cabinets. They can range from simple mechanical locks through to more sophisticated electronic locks and state-of-the-art smart locks. Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end users – making them very popular for contactless entry and with facilities managers that need to manage access to buildings and campuses. One thing is certain – whatever your access control requirements are, there’s a keyless lock solution to suit. The digital access revolution is here.
Across the globe, healthcare providers and facilities from care homes to hospitals and private clinics are working around the clock to reduce the risk to their staff and reduce the spread within their facilities. There are increasing reports in the UK that the virus has devastating effects in care homes, with fears that the US will be next in tow. The impacts on healthcare staff have also been stark with absence levels growing. In some health bodies across the UK up to almost 20% of their staff are off sick. The consequences of COVID-19 are clear to see in the short term, but it may also drive the need for technology that will help mitigate against pandemics and the spread of disease in the long term. One of these technologies that offers some promise is long-range RFID. The value offered is more than just security and safety Why long-range RFID? The value offered is more than just security and safety. Implemented correctly, it not only helps minimise the dangers posed to staff and patients, but also helps improve the efficiency and workflow around the facility. Here are 5 reasons long-range access control is part of the solution: Reduce contact spread of viruses Most viruses spread through droplets inhaled from someone else’s cough or sneeze. But a common indirect way of infection is germs being passed on when people touch surfaces such as doors, pin pads and handles. This can lead to the dangerous spread within healthcare facilities as it only takes one infected person to spread the virus to those that touch the same surface. Hence, during the current times of peak capacity, the risk increases. The right long-range access control solution can help minimise the risk by reducing shared contact points. Integrating vehicle and people access Long-range RFID is gaining traction as a complete people and vehicle solution. As an ideal solution that automates vehicle access without the need for ticket stations, pin pads or manned gates, members of staff can now go from their doorstep to the room they are required in without having to touch surfaces in order to access the car park and building. All of this can be done from a card that is transferred from a special holder in your car to a land yard for centrally managed, hands-free access around the facility. Card readers providing hands-free access around the facility More efficient building workflow Time is a precious commodity for medical staff and any time that is wasted on trying to enter the building, search for a badge or entering a PIN should be limited. Once in the building, a long-range electronic ID badge allows automated access around the building without having to present a card to the reader. For more emergency situations, its also common to attach cards to push trolleys, wheelchairs and other heavy equipment to help protect staff and patient safety. Fight against theft It’s a sad circumstance that in times of crises, theft is an issue that healthcare facilities have to deal with. Amid global shortages, there have been numerous cases of masks, medical equipment and other supplies being stolen from hospitals. A modern access control solution using long range readers can help by keeping supplies locked in a dedicated room with access granted only for approved staff ID badges. Whilst also restricting access in staff car parks to only approved staff members. Proactively manage the flow of staff members in your facility Access control software offers a unique insight of real-time data Access control software offers a unique insight of real-time data into key staff members and their movements within the building. This software can then compile the data collected into reports which can help reveal bottlenecks in the flow of staff members around the facility. In the case of an emergency, an access system with connections to readers and cameras, can lock / unlock certain doors, or revoke access to particular people in case their badge was stolen. Whilst we cannot accurately predict what the world will look like post COVID-19, long-range RFID technology could prove to be a powerful tool going forward. It offers solutions that go beyond just security, and helps healthcare facilities build a better future by improving workflow, manage medical equipment, protect patients, staff and visitors from infection and future pandemics.
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experienceOne of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and are used to authenticate access control credentials and read the data required to access multiple applications secured by multiple vendor devices. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are AES 128 encryption keys encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent LEAF EV2/EV3 cards allow up to 16 devices to be individually accessed using 16 unique keys, respectively that are stored in the smart cards (and among a variety of manufacturers). LEAF Identity Consortium enables interoperability with encrypted Smart Cards LEAF Memory Model specifies a standard EV2 (EV1 backward compatible) smart card data format and application access protocols that ensure each manufacturer’s devices can interface with a card chip in the same way. Specifically, each card has a “common data structure” based on the LEAF Memory Model, which means that the location of information is arranged on a card chip in a predictable and consistent manner. Each end-user application (for door readers, secure printing, vending, etc.) stored in the card is secured with their own cryptographic key. Member companies adhere to that structure in order to be interoperable with a single credential. There are no license fees or intellectual property rights involved. Keysets The approach involves a LEAF Custom Cryptographic Keyset (LEAF Cc Keysets) owned by the end-user. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of customer-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end-user staying in control and having unlimited interoperability.” WaveLynx Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications by multiple manufacturer’s devices. WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF Enabled. They provide a key management service (for life) to end-users based on LEAF capabilities. End-users “own” the keys and can submit a request to WaveLynx to have us securely share them with any other manufacturer. Sharing a key involves two key custodians from WaveLynx Technologies and the Vendor who is receiving the customer’s keys, each of whom only has access to half of the encrypted key in order to keep it secure. Keys are shared via a “key ceremony”. Combining capabilities The LEAF consortium provides a way for manufacturers to work together to provide an ecosystem of devices that are compatible with a single encrypted smart card without the need to embed proprietary reader modules in their devices or license another manufacturer’s technology, thereby making it possible for them to increase their market share. Working together, independent manufacturers can assemble a group of devices to compete more effectively with larger manufacturers. In effect, they combine their capabilities in order to offer the end-user viable options and to compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve. Although the standard does not currently offer mobile credentials, a common mobile credential standard is currently being discussed and designed by the Consortium.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimise the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customised access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorised entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorisation to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customisation ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing key cards and fobs with app Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognises which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable access control systems for SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favour simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving security dealers and integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalising that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS to measure product quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analysing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
Supra, a provider of mobile credentialing and entry management systems for automotive and real estate sectors, announces that its TRAC-Box key management solution has been selected by Oregon-based Guaranty RV Super Centres to help secure and track keys while keeping pace with a growing demand for recreational vehicle (RV) travel. Supra is a part of Carrier Global Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. Located in Junction City, Oregon, Guaranty is the state’s largest dealer of recreational vehicles, from entry-level tent campers to luxurious diesel-powered RVs that sell for more than $400,000. Gaining valuable sales An industry publication, RV Business, has named Guaranty one of North America’s top 50 dealers for six consecutive years and a top 10 dealership based on customer reviews. “With our large footprint of 25 acres and long dark winters, it is difficult to have visibility of activity,” said Marty Nill, managing partner, Guaranty. “With the Supra TRAC-Box, we’ve improved security and gained valuable sales and marketing insights, and assigning permissions is simple. We’re confident we have authorised access to our vehicles with tracking controls in place. Our vehicles are retail-ready using the Supra TRAC-Box.” Providing greater visibility Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles. Each TRAC-Box uses Bluetooth to communicate with Supra’s eKEY® mobile app on smartphones carried by Guaranty sales associates. They enter a PIN code into the app to unlock the keybox and acquire the keys from a built-in container. “Each time an authorised user opens a keybox, a record of the activity is stored in both the TRAC-Box and eKEY app, so managers and users can see the history of openings without having to return to the office,” said André Lalande, vice president – sales, Supra. “The app also transmits activity to the TRACcess Manager software to create an audit trail providing greater visibility to lock-up activities.” Removing access permissions TRACcess Manager also provides prompt visibility to the activity and frequency of RV showings, enabling management to see which RVs are most popular and reposition vehicles more efficiently. Notifications can also be set to alert management of keybox activity on specific inventory they want to monitor, for example, each time the 10 most expensive RVs are accessed. The TRAC-Box system also promotes accountability among associates and saves time looking for misplaced keys needed to show vehicles. When salespeople leave the company, managers can remove access permissions in easy, streamlined steps via any internet-connected computer or mobile device within a few minutes. Supra is featuring the TRAC-Box system in its virtual exhibit at the RV Dealers Virtual Convention & Expo, Nov. 9-20, 2020.
Schools and heritage sites present their own unique difficulties for security and access control. It becomes a challenge when the same is to be applied to a school that is also a heritage site of exceptional value. This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum that requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School chiefs also required little disturbance of everyday school learning. Wireless access control was the obvious answer. A wireless access solution to a 16th-century problem Powerful management option enables real-time security control to limit free access to and around the site SMARTair® wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts) are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for its new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. “The main benefit is the ease of real-time key management — from any place and at any time — via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff because no unauthorised people can enter the school.” SMARTair locks and readers SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorised areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation and integration The system was installed without a hitch and also without any disruption to classes" The installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor. To learn how easily SMARTair® wireless access control could secure your premises, download a free solution guide at https://campaigns.assaabloyopeningsolutions.eu/smartair
Loughborough University has selected the ASSA CLIQ® Remote system from the ASSA ABLOY Door Hardware Group to help secure its plant control rooms. With more than 18,000 students at Loughborough University for 2018-19, the award-winning ASSA CLIQ® Remote technology has been used across the site for a range of different applications, including teaching laboratories and offices. Its success as a security and access control solution has led to it being extended to cover the university’s plant control rooms too. Providing an easy-to-use electromechanical locking system, the ASSA CLIQ® Remote solution uses high-end micro-electronics and programmable keys and cylinders to offer flexible control over access rights. ASSA CLIQ® Remote solution Loughborough University can programme and update each key remotely, removing or granting access privileges for the key holder in real-time. This allows only those with the necessary authority at the university to enter a plant control room. Furthermore, the system removes the security risks associated with lost or stolen keys, eliminating the time and cost spent on replacing a mechanical lock. For staff that have access to these areas and then leave the university, their access rights can be easily be removed by using the system’s simple, web-based interface, ensuring ex-employees and contractors never pose a security risk. ASSA CLIQ® Remote also provides a full audit trail for assured peace of mind around who has accessed the plant control rooms and - because the locks are powered by a battery inside the programmable ASSA CLIQ® Remote key - no extra wiring is required when installing the system. Wireless electronics locks Phil Sheppard, Senior Clerk of Works at Loughborough University, said: “For us, a big advantage to ASSA CLIQ® Remote is that its electronics effectively extend the patent of the key indefinitely. The system cannot be copied, which means ASSA CLIQ® Remote provides a long-lasting access control solution.” “The audit capabilities of the system are also really useful, ensuring we know exactly who accessed a plant control room, and when. The system can be extended really easily as well, which has been another key reason why we continue to use ASSA CLIQ® Remote to meet our access control needs across the university.” “Ultimately, by working with a trusted manufacturer such as ASSA ABLOY, we can be safe in the knowledge that only authorised individuals can access the university’s plant control rooms.” Secure access control solution Sean Falkinder, National Sales Manager for ASSA CLIQ® Remote, adds: “We have provided a range of solutions for Loughborough University over the years, and the use of ASSA CLIQ® Remote for the university’s plant control rooms is just the latest success story. We’re delighted that the technology is able to provide such a safe and secure access control solution for the site.”
Schools and heritage sites present their own unique difficulties for security and access control. But what about a school that is also a heritage site of exceptional value? This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum which requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School leaders also required little disturbance of everyday school learning. Wireless access control was the obvious answer. Wireless access control devices The school chose SMARTair Wireless Online management for their new keyless access system SMARTair wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts), are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for their new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. Issue access credentials “The main benefit is the ease of real-time key management - from any place and at any time - via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff, because no unauthorised people can enter the school.” SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorised areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. Installation and integration The system was installed without a hitch and also without any disruption to classes" “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. Education management software SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorised from unauthorised people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Centre in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labour-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimises the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports centre and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorise and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Resilience and efficiency have become watchwords for the public institutions, before, during and after the ongoing health crisis. In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security. The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and warrant a mention in the Christian Old Testament. As a technology the key is familiar and proven, user-friendly and dependable. It can also be inflexible and time-consuming to manage. The security challenges of delivering public services do not stand still, but standard mechanical keys cannot move with oneself. Filtering access intelligently and dynamically has become part of security’s job description. Yet there is no need to dispose of the key altogether. One can adapt it, rather than throw it out. Intelligent, programmable keys combine the powerful features of electronic access control with the convenience of a mechanical key. They are keys, familiar and user-friendly… but evolved. When the key has a brain, one can do more with less. These efficiencies are critical in a world where demands on the public institutions are at levels not seen in generations. Cut workload and solve the problem of lost keys One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys" Lost keys present mechanical security with its most intractable problem. When a key goes missing, time and budget are expended to remedy the situation. Extensive rekeying and reissuing to relevant keyholders are complex and expensive. Programmable keys, however, solve the problem quickly. The French town of Villiers-le-Bel, north of Paris, faced these familiar key management challenges. Each person in their Municipal Technical Centre carried approximately 40 physical keys. If one was lost or stolen, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too, at great expense. Key duplication costs were mounting. “One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the town’s Municipal Technical Centre. To fix this expensive lost key problem, Villiers-le-Bel city administrators chose to combine trusted mechanical security with new electromechanical key-operated locking, all managed within the same flexible, wireless access control system. Now lost or stolen electronic keys are cancelled instantly using secure cloud software which works inside a standard browser, no software installation required. Administrators can program access rights for any key, padlock or cylinder. They filtre access to specific sites and doors according to the precise requirements of every municipal employee. Keep residents safe in their homes In Aalborg, Denmark, around 3,000 citizens in home care have programmable locking cylinders installed at their front door. This replaces a cumbersome mechanical master-key system. Aalborg’s installation was tailored to meet the needs of this vulnerable group of city residents. Certified technicians simply replaced each old cylinder with a programmable cylinder If a home care resident loses their key, its access rights can be deleted from the system without the need for a lock replacement — keeping the keyholder’s home safe and saving the city time and money on rekeying. Managing Aalborg’s system is straightforward. Lock installation was quick and easy: certified technicians simply replaced each old cylinder with a programmable cylinder — with no wiring and no major alterations to the door. Aalborg’s fire brigade quickly took over the maintenance process. Brigade staff now grant or revoke access, and tailor permissions for different users or locations according to defined needs. In Skellefteå, Sweden, electromechanical locking has given local firefighters faster, safer access to any building. To speed up emergency response times and improve firefighter safety, the local service fitted houses with secure façade key cabinets.More rapid response means a better chance to prevent a fire spreading Property keys are stored inside the cabinets, so authorised firefighters get rapid building access if there is a fire. When the emergency call comes, firefighters update their individual, programmable key at the station or while on the move, using a remote key updater kept in the fire engine. There’s no longer any need for fire stations to hold multiple sets of keys or for off-site firefighters to divert to the station to collect the right key. More rapid response means a better chance to prevent a fire spreading. Safety is improved for everyone, Skellefteå residents at home and firefighters at work. Clear workflow bottlenecks in public housing With crime against empty properties on the rise, public authorities in the English city of Rotherham aimed to minimise the time a council house stands vacant. However, workers from multiple departments require access to prepare a property for a new tenant. Passing keys securely between all relevant staff members was a major cause of delay. Security managers issue the precise permissions which every staff member needs At Rotherham Metropolitan Borough Council (RMBC), intelligent key technology helped streamline these workflows, upgrading security and saving money at the same time. RMBC identified physical key handover as a major bottleneck in their workflow. They needed a solution to speed up the process. Now, each relevant RMBC staff member is issued with their own programmable key. Using simple online software, security managers issue the precise permissions which every staff member needs. The access rights of any key can be amended or revoked at any time. Physical handover of mechanical keys, and the time and money spent coordinating this process, has been eliminated. Preserve the fabric of historic buildings, and the design integrity of new spaces Building type can make a big difference to the access control one chooses. Public spaces inside protected heritage buildings often cannot opt for card- and reader-based access control. Here, wireless electronic cylinders which simply replace existing mechanical locks solve the problem, preserving doors which may be centuries old. Intelligent key security is hardly noticeable for the library’s many visitors The issue of aesthetics also affects modern public spaces, albeit differently. In Stuttgart, innovative design was a key element of the city’s new library building. Door security should be discreet and not disrupt the vision of Korean architect, Eun Young Yi. This was the first public building in Stuttgart’s Europaviertel, a unique creation with a double façade with glass bricks, a brightly lit atrium four storeys high, and public entrances on all four sides. Almost as soon as it opened, the building was declared an architectural icon — “instantly one of the world’s most beautiful libraries.” Intelligent key security is hardly noticeable for the library’s many visitors, yet critical for protecting Stuttgart’s precious public heritage Save time and money managing keys for a mobile workforce Many public services involve managing and directing a mobile or contractor workforce. Mileage expense mounts up when workers must return to base to collect keys or update their access rights. With a Bluetooth-powered solution, everyone carries their own programmable key Mobile workers use more fuel and increase a carbon footprint. One makes a business more sustainable quickly if one reduces the mileage one travels. Reducing miles while maintaining security is not easy, if one relies on mechanical keys to secure remote or dispersed sites. Bluetooth-enabled intelligent keys eliminate the need for workers to return to headquarters to collect or return a mechanical key. With a Bluetooth-powered solution, everyone carries their own programmable key and keeps its access rights up to date on the move, simply by making an encrypted connection to a secure smartphone app — meaning fewer miles driven and less money wasted on unnecessary fuel. One technology powers all the solutions All the installations referenced above — and many, many more across the full spectrum of public services — run on the same technology: CLIQ® from ASSA ABLOY. CLIQ combines electronic and mechanical security in a range of wireless cylinder applications, including a full range of mechatronic and electronic cylinders and padlocks. CLIQ locks are installed without wires: every cylinder’s power is supplied by a battery inside the CLIQ key. These keys are physically identical and programmable by a system administrator using a desktop updater; by keyholders with a portable programmer; or in the case of CLIQ Connect Bluetooth-enabled keys, via an encrypted connection to a secure smartphone app, minimising both wasted journeys and unnecessary social contact between workers and office staff. Intuitive software makes it simple to manage access rights, enable and disable keys and customise access schedules, on site or on the go. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?