ProdataKey (PDK), manufacturer of the cloud access control platform built for mobile, announced that its revolutionary “touch io” Bluetooth reader is now shipping. When installed as part of a pdk io access control system, the new readers allow users who have installed a mobile credential on their smart phone to enter a controlled door by simply touching their hand to the reader, making it the most convenient mobile solution on the market. There’s no need to unlock the smartpho...
VCA Technology, a UK provider of video analytics, announced the release of VCA Server, an AI Deep Learning based video analytics software suite which provides a key upgrade to the company’s flagship VCA Core platform. Offering simple integration with VMS and NVR manufacturers’ technologies, the new release ensures that sophisticated analytics can be set-up and installed within as little as fifteen minutes, allowing end-users to significantly reduce false alarms with minimal disruptio...
MedixSafe, a pioneer in the access control cabinet market, announces that its Key Access Ready Enclosure (KARE) key control cabinets are now available with Bluetooth format card readers. This wireless technology enables users to access their KARE cabinets using their mobile devices as their access credential, while still offering the high level of security synonymous with MedixSafe’s solutions. Polymer swing handle lock Each key tag easily snaps open so that names and/or numbers of keys...
Security expert Abloy UK announces that its PL330 padlock has achieved the highest possible rating during testing to simulate a criminal attack, making it one of the most resilient and dependable padlocks on the market. The PL330 extends Abloy’s padlock range to achieve LPS 1654 The padlock achieved a 1+ rating from the Loss Prevention Certification Board (LPCB) against standard LPS 1654, which focuses on the time taken to compromise a padlock and gain access to the asset or object it is...
At the ISC East 2019 event at Jacob Javits Center in New York City, Morse Watchmans (ISC East booth #847) is showcasing its KeyWatcher Touch key management solutions that protect important keys and physical assets, resulting in reduced downtime, fewer losses, and improved accountability. Also featured is their latest addition, KeyWatcher Fleet which is proven to optimise fleet utilisation and longevity through key control. “Morse Watchmans has multiple decades of experience in delivering...
In any busy medical facility — surgeries, dental practices or physiotherapy suites — it’s all too easy to accidentally leave a door unlocked. With expensive equipment or controlled drugs on the other side, any opening invites an opportunist. But if a customer installs a Code Handle electronic PIN lock, they need never worry again. The secure, easy-to-fit Code Handle fits right over an existing locking cylinder. The user can simply swap the door handle for a sleek, low-profile C...
Now the customer can combine the advanced access control of a wireless electronic escutcheon with the intelligence and superior security of an electromechanical mortice lock. With a robust design, the new SMARTair Lock is built to secure doors where high daily traffic and a large number of access events are all in a day’s work. This new wireless device in the SMARTair product range is built around three main elements. The external reader with multi-colour LED is available in several different finishes to blend with the existing doors. The lock’s internal control and battery-powered RF module also houses a button for electronic privacy. Finally, a battery-powered electromechanical clutch unlocks the door when a valid credential is presented to the external electronic reader. The new SMARTair Lock works with any DIN-compliant door handle — the users can choose their own. Streamlined security management The new SMARTair Lock can be installed quickly and wirelessly without disrupting your working day Users can also choose to install an additional mechanical cylinder, enabling them to unlock the door quickly and manually in any emergency. The lock incorporates admin-friendly features for streamlined security management. Sensors monitor and report when a door is left open or closed incorrectly, or when an attempted intrusion is detected. A SMARTair Lock also registers any unlocking events made via mechanical key. The new wireless lock works with any SMARTair management option, including offline, update-on-card and real-time, online system management. Its RFID reader accepts all common RFID credentials, including MIFARE®, iCLASS® and DESFire. The lock also works with the future-proofed Openow mobile solution from SMARTair, and the SMARTair Remote app. Simple and efficient The new SMARTair Lock can be installed quickly and wirelessly without disrupting the user's working day and make access in schools, hospitals and any other high-traffic location safer, simpler and more efficient — reducing wasted time and expense while ensuring that the premises are more secure.
Imou new product launch was held with the theme ‘Gathering and Growing’ in Shenzhen, where industry experts, Imou primary partners from all over the world, and international media gathered together to witness the launch of Imou’s new products for both domestic and overseas market. The event also demonstrated the rapid growth of Imou in the past year and how Imou will support and benefit the partners in future. Consumer IoT industry Mr. Xie pointed out that Imou will continue to deepen its efforts in the consumer IoT industry Mr. Ke Li, Dahua President, Mr. Yong Ying, Dahua Senior VP, gave their opening remarks to launch the event. Mr. Yun Xie, CEO of Hangzhou Huacheng Network Co. Ltd. (Imou), gave a keynote speech on ‘Gathering and Growing’, sharing the achievements and big moments of Imou since the brand upgrade last year, and elaborating on products, Imou service system, brand communication, etc. Mr. Xie pointed out that Imou will continue to deepen its efforts in the consumer IoT industry, continuously expand in the global market, and strive to enable everyone to enjoy smart life. Mr. Hongwu Zhao, Director of China Daily Hardware Technology Development Center, shared the report on the development trend of the smart lock industry. He pointed out that the entire smart door lock market is still a blue ocean market, and the industry is positioned to be the most promising area to experience a market breakout. 3D AI facial recognition technology Mr. Xianwen Dai, Head of Business Operation-Industrial from Alibaba, gave a speech on the new era of cross-border trading. As an important partner of Imou, Alibaba firmly believes that the Internet can help create a more beneficial environment by enabling companies like Imou to use innovation and technology to grow and compete more effectively in the domestic and global economy. The event saw the launch of many new heavyweight high-tech products for the domestic market, among which there was the highly anticipated Imou V8i Smart Lock - Imou’s first smart lock with 3D AI facial recognition technology to achieve more secured facial unlocking, allowing users to bid farewell to keys, free their hands, and enjoy more relaxed lives. AI-powered IoT camera The product launch also featured the release of the Wireless Security System in the overseas market For the overseas market, the release of Imou Ranger IQ received strong attention. As the first AI-powered IoT camera with capabilities to ‘watch, listen, speak, and act’, Ranger IQ can detect sounds/motion, identify human beings from moving objects or pets, warn off intruders with built-in siren, and act as the center of the alarm system to collaborate with detectors. The product launch also featured the release of the Wireless Security System in the overseas market. The brand new Imou Wireless Security System comes with the latest camera repeater technology, which allows for unparalleled long range coverage. Smart security industry The system also features plug-and-play setup, thus easily connecting with other security cameras. With the expertise in the smart security industry, Imou is striving to produce solutions that let everyone enjoy a secure, simple, and smart life through innovative technology. ‘Gathering and Growing’ with the partners, Imou is also seeking to continuously create value for partners. Being a user or a partner of Imou, you can always rely on Imou to enjoy your peace of mind, anywhere, anytime.
Traka is the key management solution of choice for leading multi-sector business protection management company, Guarding UK, ensuring compliant key holding services and integrated audit control capability. Guarding UK manages nearly 1,500 sites across the UK, protecting in the region of £40bn worth of assets at commercial, corporate and residential sites across industry sectors including central London premier sites, retailers, property owners and management agents, together with airports and airlines. Employing around 800 staff, Guarding UK installed bespoke-in-design Traka systems to uphold a pledge to customers for compliant and secure key holding, with remote accountability enabled to ensure keys are managed and available instantly by authorised personnel. Says Mick Spring, Guarding UK, Head of Mobile Services: “Guarding UK prides itself on being recognised as amongst the best leading security company in the country.” Dedicated audit control Guarding UK has installed key cabinets which are designed for organisations with a high key turnover “We are constantly monitoring our resources and systems to not only ensure compliance, but also create a culture that supports our teams to provide a superior service. Traka is a testament to this ambition, providing a unique way for customers to trust us to manage their keys effectively. Having an ability to work with us right from the initial design of a system was what really appealed, allowing us to incorporate different tracking attributes, with full visibility of key whereabouts at any given time." "Should a key holder need to attend a site, we can provide all details of the call out with dedicated audit control, including specific time, which can all be instantly emailed for business reporting.” On-site, Guarding UK has currently installed Traka’s L-Touch key cabinets, which are specifically designed for larger organisations with a high key turnover. High-quality protection management Working with specialist TrakaWEB Software, allowed for dedicated audit control capability, including notifications when keys are not returned, presenting instant traceability and reporting. Lee Payne, Market Development Manager for Traka UK: “Guarding UK is at the forefront of high-quality protection management and has managed to maintain this leading industry position through a commitment to compliance and continuous improvement across its sector offerings and service excellence.” “Within Guarding UK obligation to key holding, the adaptability of Traka technology allows us to create a solution that could not only enhance key management but also improve communications, operations and workflow, enabling staff to present a seamless team approach. The audit trail capability presents a system that can be relied on 24 / 7 / 365 for the ongoing benefit and peace of mind security of all Guarding UK customers.”
Codelocks Inc., an access control company that designs and distributes innovative, standalone keyless door locks and access products, announces a strategic partnership with Tether Technologies, a developer and manufacturer of digital tethering solutions for master keys and access cards. The challenge in the industry is to prevent keys from being lost while on the job, Tether Technologies’ focuses on ways to address and resolve human error associated with master key loss. In 2015 Tether Technologies developed Gravity®, the only industrial-grade, digital tethering device that electronically ties keys to its user to remain in the proximity of the tether. Gravity works by linking cards/keys via an electronic signal to avoid keys being lost from the start. Upon breaching the approximately 20-foot radius – distance may vary depending on the building or wireless interference – Gravity’s unique alarm, vibration and strobe light are triggered to alert users to quickly retrace steps to recover the key unit. Complete key management solution We are committed to this product and uniting both of our key management technologies to help individuals" When combined with Key Secure by Codelocks, a key control cabinet that utilises coded access to authorised persons, it becomes a fully comprehensive solution. The key cabinet will store and manage keys, while Gravity helps to prevent those keys – when removed from the cabinet – from the risk of being misplaced. To connect keys, the user simply presses a button and lifts the Key Unit up and out from the Belt Unit. Once removed, Gravity activates and the Key Unit flashes once, indicating it is now in electronic communication with the Belt Unit. “We understand the importance of having a complete key management solution, including preventing the potentially extreme cost associated with losing master keys,” states Matt Welty, general manager for Codelocks Inc. “We are committed to this product and uniting both of our key management technologies to help more individuals, campuses and businesses with their security systems.” Standard equipment protocol “We are excited to partner with Codelocks, a global company that is well-known and respected in the industry,” said Randy Neely, founder of Tether Technologies, Inc. “As the number of lost master keys continues to increase in an array of environments across the country, the joint presence of Codelocks and Gravity will allow this advanced solution to become standard equipment protocol in the world’s largest facilities.”
Device Authority, a pioneer in Identity and Access Management (IAM) for the Internet of Things (IoT), announced it has been accepted into the Venafi Machine Identity Protection Development Fund. For decades, code signing has been used to verify the integrity of software, and nearly every organisation relies on it to confirm their code has not been corrupted with malware. Code signing keys and certificates are used in a wide range of products, including firmware, operating systems, mobile applications and application container images. Unfortunately, organisations often struggle to secure and protect code signing operations because they don’t have a solution that allows them to consistently enforce policies across locations, tools and processes. As enterprises embrace and adopt IoT devices, code signing usage will continue to grow at an exceptional rate. Many organisations use home-grown solutions to fulfill code signing requirements for IoT use cases, but these tools often lack the visibility, automation and intelligence needed for proper protection. Automated solution Historically speaking, it’s very difficult to secure code signing operations for IoT devices Using their sponsorship from Venafi, Device Authority will provide a new turn-key code signing and update delivery extension to KeyScaler powered by Venafi Next-Gen Code Signing to connect security team policy and controls to secure the code signing process. Device Authority’s KeyScaler platform provides an automated solution to provision unique certificates, signed by a pre-configured Certificate Authority, to IoT devices – without requiring any human intervention. Additionally, Device Authority will create a new Certificate Authority service connector for the Venafi Platform. This will allow KeyScaler customers to use the Venafi platform as a source for certificate issuance. "Historically speaking, it’s very difficult to secure code signing operations for IoT devices,” said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi. “When developers sign code, IoT updates can be ripe for attack. As we’ve seen with Stuxnet, stolen code signing keys and certificates are powerful cyber weapons.” IoT cyber security “Attacking the code signing process can provide cyber attackers with control over a fleet of IoT devices. We’re pleased to work with Device Authority, a global IoT cyber security leader, to integrate with Venafi Next-Gen Code Signing to protect IoT.” “Venafi is a technology pioneer in the machine identity protection market. They understand the challenges of protecting IoT device identities and the applications they send data to. Being accepted into their development fund is a huge success for the Device Authority team and we are excited to complete the development and integration in the coming months,” said James Penney, CTO of Device Authority. Comprehensive protection for machine identities Venafi’s Machine Identity Protection Development Fund is a $12.5 million initiative to protect all machine identities. Funded developers will create integrations that accelerate the delivery of comprehensive protection for machine identities across complex enterprise networks. The Development Fund is a global initiative and will increase the visibility, intelligence and automation required for machine identity protection. The Machine Identity Protection Development Fund encourages recipients to build integrations across any technology that creates or consumes machine identities, including: Cloud and hybrid cloud infrastructure. DevOps. Containerisation. Secure Shell (SSH). Code signing. Robotic Process Automation (RPA). Artificial intelligence, machine learning and big data analytics. IoT Blockchain distributed ledger technology
The ability of Hanwha Techwin Europe’s Customer Support team to provide unbeatable pre and post-sales services has been enhanced by the company adopting the Zendesk Support platform. Zendesk Support is a globally recognised help desk system designed to assist product and service providers to prioritise, track and resolve customer support requests. It will augment Hanwha Techwin Europe’s existing customer support processes to ensure customers always receive a personalised and rapid response. Providing stronger customer support Zendesk Support will empower our UK based support team to provide even stronger customer support" “We are determined to excel in everything we do and in this respect, Zendesk Support will empower our UK based support team to provide even stronger customer support than we are already well known for, as it will allow us to prioritise and handle calls efficiently and improve customer experience,” said Bob (H.Y.) Hwang Ph.D., Managing Director of Hanwha Techwin Europe. “For Hanwha Techwin Europe, it is also about building a knowledge base and reporting system which will help us identify key issues and see the’ bigger picture’ in terms of our support environment.” Strengthening customer support services “The introduction of Zendesk Support completes the first phase of Hanwha Techwin Europe’s strengthening of its customer support services. The company has announced that over the coming months it intends to adopt other elements of the Zendesk suite.” “These include Zendesk Guide which provides access to a knowledge base and Zendesk Talk, which offers live chat and messaging opportunities, as well as the provision of local area all numbers to make it more convenient and economical for customers from across Europe to call in for support.”
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimise the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customised access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorised entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorisation to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customisation ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing key cards and fobs with app Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognises which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable access control systems for SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favour simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving security dealers and integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalising that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS to measure product quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analysing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
Wireless locks offer specific advantages for access control end users and integrators, and some of their value has yet to be realised in the market. Wireless locks expand the range of applications for electronic locks to complement traditional wired systems. They offer flexibility and scalability. They save on integrators’ labour costs. They even provide opportunities for integrators to earn recurring monthly revenue (RMR). A recent Allegion panel discussion highlighted the value, opportunities and untapped potential of wireless locks. Allegion panellists elaborated on some of the many advantages of wireless locks, including the following: Providing more system flexibility It’s a time of change in corporate and institutional environments. Customers are trying to manage a smaller operating budget with more people and more multi-use applications. Building applications are changing more frequently. Wireless locks can be used to convert more mechanical applications to electronic, but they are not necessarily real-time and/or monitored applications.Customers are trying to manage a smaller operating budget with more people and more multi-use applications For example, a wireless lock could be installed on a seldom-used door, such as a storage closet, to avoid the need to manage keys. The flexibility of wireless locks also would allow that same door to be transitioned to communicate with a network via WiFi, or it could be used for real-time communication in a monitored system. “It’s much more flexible if one product can do about six different things,” says Brad Aikin, Allegion’s Channel Led Business Leader, Integrator Channel. New product approaches enable intelligence to be added after the fact to existing wireless locks, thus further increasing flexibility. Designing systems that are scalable “We now have products that can start from very basic applications, and then build capabilities through systems and integrations all within one device,” says Mark Jenner, Allegion Market Development Director. Offering a useful complement to wired systems Once you understand how to deploy the wireless technology, the efficiencies of it from a labour perspective are pretty amazing” Wireless is not a “silver bullet” – not for every application, says Aikin. “I think it is an incremental opportunity,” he says, and more likely to drive conversion of existing mechanical locks than to transition wired electronic systems. “You’re just looking to get a more efficient credential, and to get rid of that master key system, or to dramatically shrink it down,” he adds. “Wireless is an example of how the integrator can do more, not just differently, but have more conversations and help their end users. They are not things the end-users are going to ask for inherently; these are latent needs. They are not going to bring it up.” Allegion panellists elaborated on some of the many advantages of wireless locks Less labour involved in installations “Once you understand how to deploy the wireless technology, the efficiencies of it from a labour perspective are pretty amazing,” says Robert Gaulden, Allegion Project Based Business Leader, Electronic Access Control. “Integrators can deploy two additional jobs in a day because they are on and off jobs more quickly. There are huge benefits, depending on what environment you are in.” Labour is a significant cost for integrators – finding, retaining and training good employees. Any new efficiencies in terms of labour – such as the simplified installation of wireless locking systems – is a saving grace for integrators.Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment “We see a lot more adoption from our customer base once they become comfortable with how to use the wireless technology,” says Gaulden. New opportunities for RMR There is a shift among integrators away from one-time installations and toward a recurring monthly revenue (RMR) model in which the integrator manages all aspects of the system over time for a monthly fee. Wireless systems can help to simplify that transition by lowering costs. Managing interior doors and locks can add value and incremental revenue, says Jenner. Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment. “We support that from the product perspective, but developers and software companies need to take advantage of it,” says Devin Love, Allegion Market Development Manager. “It’s an important feature for the end user, but we are still navigating through the world of wireless adoption.” “No one wakes up in the morning and thinks ‘I am going to buy a lock today,’” says Aikin. “We need to ensure we are having conversations about security needs, but also about how to deploy the technology to make it easier to manage and have more flexibility,” says Aikin.
The stakes are higher when it comes to hospital security. Patients expect and deserve privacy and safety. Yet a hospital building or complex must remain a welcoming and supportive space, around the clock. Mechanical lock and key technology may be too passive for this modern healthcare environment, but that does not mean users should abandon the familiarity of keys altogether, because not all keys are created equal. Programmable electronic key systems Programmable electronic key systems put sophisticated access control into the form of a traditional key Programmable electronic key systems put the advantages of sophisticated access control into the form of a traditional key. They reinvent the key for the 21st century, making it more flexible, more powerful and better equipped to handle the security demands of a busy place. Lost keys and departed employees are no longer a problem, because their key’s access rights can be cancelled with a click. And at multiple secure points around the hospital, the familiarity of a key is welcome to a user group who are not experts — at least, not in access control technology. CLIQ locking system Keys can be as smart as any card-based credential. For example, CLIQ technology from ASSA ABLOY backs up the familiarity and ease of use of key-based locking with the flexible management and real-time security features of an intelligent electronic access system. A CLIQ locking system consists of battery-powered, programmable keys; cable-free padlocks and cylinders that are easy to retrofit to almost any standard opening; and management software that can be run locally or via a secure cloud. For users, CLIQ means carrying a single, programmable key pre-loaded to unlock all authorised openings — not just doors, but also gates, alarm boxes, cabinets and lifts. Say goodbye to huge key rings. Programmable key solution For hospital security managers, a programmable key solution enables users to create personalised access schedules — even for temporary contractors — and collect audit trails for doors or keyholders automatically. Staff travels into, out of and through the hospital based on set rules and programmed into their keys. Many hospitals find CLIQ invaluable in managing access to medicines and other controlled substances. Nursing staff using older mechanical key systems struggle to keep track of who has the right keys. Searching for that person to gain access to drugs wastes precious time. Unauthorised access to drug stores can, of course, bring serious financial and safety implications. Medicine management with key-based access control Lock electronics are powered by the battery inside every key, so the retrofit was cable-free At Queen Elizabeth Hospital, Birmingham, pharmacy managers sought a better solution adapted to nurse-accessed medicine stores. They chose a PROTEC2 CLIQ system which combines mechanical disc cylinders with battery powered, programmable CLIQ keys. Lock electronics are powered by the battery inside every key, so the retrofit was cable-free. CLIQ devices secure doors, cabinets and mobile drug trolleys within the same access system. Security and pharmacy managers can see who opened every lock whenever they want — making medicine audits and incident investigation much easier. “Programmable key solutions can really boost medicine safety in hospitals,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. “Nurses at Queen Elizabeth, Birmingham, carry their own key with personalised access rights, so they don’t waste time finding out who has the key to every cupboard. Patients benefit. A similar system trialled at Scunthorpe Hospital found the total wasted time eliminated would equate to having an additional 24 nurses on duty across the Trust every day,” Stephan Schulz adds. Key-based access control solution Key-based access solutions are equally comfortable at scale. At University Hospital Frankfurt 1,100 eCLIQ cylinders secure doors in a new building. A fully electronic implementation of CLIQ technology, eCLIQ cylinders and keys are easy for staff to use and for hospital security managers to administer from web-based software. The CLIQ Web Manager makes it easy to program, reprogram and audit every CLIQ key, cylinder or padlock. Because the interface is accessible from anywhere with an internet connection — via multifactor login over https:// — users can manage a CLIQ system whenever and from wherever they choose. Its architecture supports multiple administrators or sites. CLIQ Web Manager The Web Manager also integrates easily with all kinds of business management software, helping users automate tedious operations and processes. They can also make the Web Manager one element within an existing access control system. The Web Manager can run in a self-hosted IT environment or completely free of local software installation with two different Software as a Service (SaaS) solutions, Shared SaaS or Dedicated SaaS with hosting just for users and maintenance schedules set by them. With either option, the security software is always up-to-date — a major benefit in healthcare, where confidentiality makes cyber-attack resistance critical.
Universities push traditional access control to its limits. The more one asks of it, the tougher it gets. If one wants to monitor access all over campus. To know who comes and goes to computer rooms and classrooms. One would like to filter access to conference and seminar rooms according to the time — lecturers all day, cleaners and contractors after hours. Meanwhile, one wants students to be safe 24/7, without compromising the sense of freedom they enjoy on campus. Traditional electronic door security Our Aperio wireless locks integrate seamlessly with more than 100 different security systems" Mechanical lock-and-key security cannot do this. Managing keys weighs facilities staff down. Students lose them all the time, and they’re expensive and laborious to replace. The traditional solution — wired doors with card readers — is costly to fit and run. There is an alternative. “Battery-powered electronic locks with inbuilt RFID readers are a cost-effective way to upgrade existing access control and bring it to more doors,” says Lars Angelin, Business Development Manager for Wireless Locks at ASSA ABLOY Opening Solutions EMEA. “Our Aperio wireless locks integrate seamlessly with more than 100 different security systems. You don’t even need to change your smart-cards. They fit all kinds of doors.” “And because they are battery-powered and wire-free, they’re much more cost-effective to install and run than traditional electronic door security.” It sounds great in theory. But what about the real world? These 5 universities have experienced an impact already. University of Liverpool, England A BREEAM sustainability rating of ‘Excellent’ was reward for innovative architecture that combines aesthetics with environmental awareness. Vine Court’s sustainable features include rainwater harvesting, solar water heating and battery-powered Aperio wireless electronic locks. Unlike wired access control, Aperio wireless locks use little electricity. Catherine Anderson at the University of Liverpool called Vice Court ‘a new and exciting benchmark for the Student Accommodation Sector.’ Lund University Faculty of Law, Sweden Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door The Law Faculty wanted to replace their access system without asking 50,000 students and staff to return existing smart-cards for reprogramming. Aperio made the process almost invisible from a user perspective. They didn’t even need to revalidate at a reader. Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door. A Pacom Unison security platform handles everything seamlessly. Facilities staff spends less time on admin and more on security. Aberdeen University, Scotland At Aberdeen’s refurbished Student Village, Aperio online cylinders and certified security locks cover doors requiring different grades of security. Cost efficiencies came at installation stage — no cabling to the doors means no expensive electrical contractors — and will continue through the locks’ operational life. Unlike standard wired access control that requires ‘always-on’ mains electricity, Aperio wireless locks are powered by batteries. These typically need replacing every couple of years — and that’s it for maintenance. HafenCity University Hamburg, Germany Aperio electronic cylinders filter access to the media centre, library, cafeteria and offices A partnership between SIEMENS and ASSA ABLOY provides intelligent, transparent electronic access control at a new docklands hub for the university. Aperio electronic cylinders filter access to the media centre, library, cafeteria, seminar rooms, staff rooms, laboratories and offices. Locking with these wireless RFID devices enables the university to remain an open, welcoming space without sacrificing staff and student safety. University of Birmingham, England Two new accommodation blocks at the university’s Vale Village complex needed locks to integrate seamlessly with a pre-existing campus security system, including Gallagher Command Centre software. Aperio locks now secure almost 1,800 doors with a low-cost solution that eases the key management workload for facilities staff. Everything is controlled from the Gallagher interface. And because Aperio is scalable, they can add new doors and buildings whenever they choose.
Traka’s innovative key and equipment management solutions have been installed at a new national distribution centre for a top four UK supermarket. The new distribution centre, fulfils orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centres are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorised personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centres are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorised colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organisations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorised ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
Globally renowned electronic locks manufacturer, Mul-T-Lock has announced providing Glenveagh National Park in County Donegal, Ireland with over 50 of its high-tech eCLIQ locks so as to enable them to efficiently manage access control rights across the whole estate. Spanning over 170 square kilometres in area size, Glenveagh National Park is the second largest national park in Ireland. It features a number of rugged mountains, pristine lakes, tumbling waterfalls and enchanted native oak woodlands that together make up its ecosystem. At the centre of the national park, on the edge of Lough Veagh, is Glenveagh Castle, a late 19th century castellated mansion, which was originally built as a hunting lodge. Advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock eCLIQ locking system With multiple facilities located on the sprawling site, Glenveagh National Park required a high-security and fully customisable access control solution, and therefore opted for Mul-T-Lock’s advanced eCLIQ locking system. The new and advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock, subsequently granting and revoking access to various areas of the estate whenever necessary. Remote access control solution Stephen Crowe, Regional Sales Manager for Mul-T-Lock, commented, “At Glenveagh National Park there is a need to restrict public access from certain areas for safety reasons, but at the same time, relevant staff should be able to access these areas whenever required”. He adds, “Our eCLIQ system proved the perfect solution for this, as administrators (those who manage the security system) can easily set-up tailored access permissions remotely via our CLIQ Remote Web Manager software. eCLIQ padlocks and cylinders Stephen further stated, “With eCLIQ, administrators also have the ability to set time-limited access – something that isn’t achievable with a mechanical system. For example, padlocks around the estate could be programmed to allow access to certain gates between Monday and Friday, from 8am to 6pm. It’s this customisation that makes our system so popular.” The Mul-T-Lock system was specified and installed by Paul Speer at JP Speer Locksmiths, who added, “We now have over 50 eCLIQ padlocks and cylinders securing gates, offices and the Visitor Centre within this impressive estate. The complete system is managed from the main office and once set up it is easily maintained, with the flexibility to change quickly whenever required.” Mul-T-Lock advanced eCLIQ technology Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed" Paul further said, “Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed. Glenveagh National Park has used mechanical systems in the past, but these haven’t been able to satisfy its access control requirements. Mul-T-Lock’s eCLIQ technology ensures that access rights are maintained for years to come.” Pat Vaughan, District Conservation Officer at Glenveagh National Park, finished by saying, “Mul-T-Lock’s eCLIQ system is the perfect fit for our Park as it has all the features that such a vast estate as ours requires. Park security He says, “During our summer season our visitor numbers quadruple and we have to employ seasonal staff to meet this demand. Having such a system as Mul-T-Lock’s eCLIQ means that we can set up temporary access for these workers, with all the relevant access rights required. The eCLIQ system also enables us to deactivate keys and revoke access at the click of a button.” Pat adds, “This is particularly helpful if any of our team accidently lose their keys, or if temporary staff forget to return keys after their time with us. We are extremely happy that we opted for the eCLIQ system to secure our beautiful estate; it will stand the test of time for years to come and has all the features we require to manage, build and secure our Park and its future.”
SMARTair® Wireless Online access management has proven a simple, school-wide electronic solution for greater control and security at Westbridge. Each staff member carries one RFID credential card programmed with access rights personalised to their individual role. In an emergency, the school can institute a complete lockdown via the centralised system. “Having a SMARTair® system in place has given us peace of mind. It’s quicker, it’s safer and it’s simple,” says Joanna Brunton, Executive Officer at Westbridge School. The school’s teaching, administration and residential buildings require multiple layers of access control, for both staff and students. The inflexibility of a legacy mechanical locking system had presented facility management and pupil safety challenges for years.“With over 50 staff, we needed more subtlety in assigning access permissions, which you simply can’t do with a bundle of metal keys,” explains Joanna Brunton, Westbridge School’s Executive Officer. New access system The system would need to be installed over the holidays for minimal disruption to the school’s busy calendar Beyond replacing and upgrading outmoded, inflexible mechanical key security, Westbridge had a number of requirements for its new access system. Devices in the new, unified system would replace piecemeal mechanical locking on 80+ doors around the site. School leaders wanted access control already proven in the field, with a track record of successful installations managing access in schools worldwide. New electronic locks must provide a real-time audit trail, so facility managers always know which doors are opened by which staff cards. The new system would also need to work within the school’s security budget — and be installed over the holidays, for minimal disruption to the school’s busy calendar. "We essentially had a safety and security need,” adds Joanna Brunton. “We needed to be able to discourage students from going where they didn’t need to be on site or redirect a student who was in a heightened state from re-entering a classroom and potentially disrupting the class or causing damage.” Wireless and battery operated SMARTair® solution has done everything we wanted it to do in terms of safety, security and monitoring" System administration is easy even for non-specialists. “I taught staff how to use the software and encode access cards,” says Kylie Bray, director at Western Lock Services, who have long managed hardware maintenance for Westbridge. “If a staff member loses their card, you can go straight in and delete it." The intuitive SMARTair® system software can open or secure individual zones, connecting to individual locks via a network of 9 hubs. “We now have the ability to set higher security for specific areas of our site, especially over the school holidays when students have gone home,” says Joanna Brunton. “Our regular maintenance contractors have their own access keys, so they just get straight on with their work without calling us to meet them for access. This keeps our time, and their costs, down. SMARTair® door devices are wireless and battery operated. Because there’s no need to run cabling to individual doors, installation was fast and cost-efficient. From a facilities management point of view, the solution has done everything we wanted it to do in terms of safety, security and monitoring,” adds Joanna.
As in every health facility, security for the Haute Savoie region’s new hospital presented a complex challenge. Access control required multiple checkpoints and access rights tailored to individual staff and contractors. Real-time control, enabling managers to respond proactively including by opening and closing doors remotely, was another essential. To meet their security challenges, managers selected Aperio® locking technology integrated online with an ARD access management system. Because Aperio® locks are wireless, the hospital could introduce many more layers of security and secure doors without incurring excessive installation or operating costs, including for sensitive offices and drug stores. Central access system software Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system Now staff no longer carry key bunches or waste valuable time hunting down relevant keys. All their individual permissions are stored on a single, programmable RFID credential. Alongside standard wired locking, the hospital chose 1,300 Aperio® wireless escutcheons, 10 Aperio® wireless handles with integrated RFID reader, and 301 Aperio® wall readers. A network of 228 Aperio® communications hubs connects every Aperio® lock wirelessly to the central access system software. All these battery-powered Aperio® devices integrate natively with the centralised access system, so wired and wireless access points at Centre Hospitalier Métropole Savoie (CHMS) are managed together, with real-time management logs, remote door opening and free time slot management. Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system. Maintaining access control autonomously “Having just a single badge — and not having to carry around heavy keys — has been a major advantage for us,” says Béatrice Dequidt, Health Executive at CHMS. “This solution's advantage is it represents a single site from an authorisation management and systems perspective,” explains Aurélien De Riols, ARD’s Eastern Region Director. One single, intuitive management interface enables security teams to administer and maintain access control autonomously, as well as streamline laborious everyday tasks. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Aperio and ARD maintain compatibility of credentials with the French government’s electronic Health Professional Card (CPS), for added staff convenience. For every site user, the advantages of carrying a single RFID-enabled badge — instead of multiple keys — are clear.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?