ASSA ABLOY has signed an agreement to acquire KEYper Systems, a supplier of electronic and mechanical key management systems in the US, with a strong presence in the automotive segment. KEYper was established in 1993, and operates from its HQ in Harrisburg, NC. KEYper Systems will become a separate business unit of Traka, which is a pioneer in key and asset management, and an operating unit of ASSA ABLOY Global Solutions. Ric Stone, President of KEYper will report to Justin Sasse, Managin...
Matrix Comsec confirmes it will be hosting its maiden event Insight in Philippines on 24th January 2019. Solution experts will be exhibiting innovative unified communication, video surveillance, access control and time-attendance solutions at the event. They will also be highlighting the benefits of partnering with Matrix for the attendees. Matrix is well-known for its indigenous and innovative range of solutions for IP video surveillance, access control, time-attendance and unified communicati...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
Online security retailer safe.co.uk, which stocks big names in home security such as Yale, Swann and Ring, has launched its own brand of home safes. The Black Box series is ideal for homes or offices and is affordably priced for homeowners looking to kickstart their home security. Available in three sizes and with two lock options, key or digital keypad, safe.co.uk’s Black Box series is positioned as a starter range. Features of digital lock range: Digital keypad with a 3-8 digit PIN...
Hikvision, the supplier of innovative security products and solutions, announces its first ever Technology Partner Day to be held in Istanbul, Turkey, on November 28. The event will showcase integrated security solutions developed by Hikvision in collaboration with its certified technology partners, as well as provide a forum for prospective partners to explore development opportunities for new solutions by taking advantage of Hikvision’s vast resources. The Hikvision Technology Partner D...
Barox, the manufacturer of professional standard switches, media converters and IP extenders specifically designed for video applications, is promoting sophisticated personalised encryption techniques to provide important safeguards for protecting sensitive data networks. In the age of the Internet of Things and Industry 4.0, companies are increasingly relying on IP security to protect themselves from cyber attacks. However, when video technicians log onto video switch servers with their PC or...
A number of security providers have signed up to be dedicated partners for the new CLIQ Go from ASSA ABLOY Security Solutions, a UK division of ASSA ABLOY, the worldwide provider of door opening solutions. These include High Security Locking near Aylesbury, William Channon in London and John Planck Ltd in Chatham. By agreeing to be a CLIQ Go partner, security providers have access to exclusive training and support from ASSA ABLOY Security Solutions to help them market and sell the platform. Enabling small and medium-sized businesses to control security across their premises from a smartphone app, CLIQ Go combines mechanical and electronic security capabilities to meet the needs of a busy working environment. CLIQ Go smartphone app allows business owners and authorised individuals to manage a site’s security from the cloud and a mobile phoneManaging site security via mobile The new, user-friendly CLIQ Go smartphone app allows business owners and authorised individuals to manage a site’s security from the cloud and a mobile phone, tablet or PC. Individual access rights can be instantly revoked or updated from these devices, enhancing security while delivering the flexibility needed to amend these access rights on the go. With CLIQ Go, organisations can schedule access rights to a room or area, for contractors or other workers that may only be visiting a site for a specified amount of time. Furthermore, as a business grows, the CLIQ Go system can be easily expanded with minimal disruption. Easy-to-manage access control system Simon Wilson, National Sales Manager for ASSA CLIQ Remote at ASSA ABLOY Security Solutions, said: “Issues such as lost keys can be a serious security risk, and traditional mechanical locking solutions no longer offer a robust enough solution for many modern businesses. CLIQ Go offers an easy-to-manage access control system. “CLIQ Go is quickly becoming a very popular option for many organisations, with installers and resellers keen to stock the solution. Indeed, with just one mechanical key profile, resellers can easily keep the solution in stock for fast delivery and, with no doors to wire, installation is a straight-forward process too. “We are delighted to welcome on-board these new CLIQ Go partners, which we will be providing on-going training and support to help them maximise opportunities to promote this innovative system to their customers.”
Morse Watchmans, global provider of key control and asset management systems, is showcasing their KeyWatcher Touch key management system at ISC East in New York City. Also, on display is AssetWatcher, their RFID-powered asset management solution for sensitive and valuable assets. KeyWatcher Touch system “We always love the opportunity to get our product in front of new faces,” said Fernando Pires, CEO at Morse Watchmans. “ISC East gives us the chance to show the NY metro area the benefits that KeyWatcher and AssetWatcher can bring their business.” Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. AssetWatcher RFID solution AssetWatcher is a flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile electronics, and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three modes for flexible usage. AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher. “We’ve taken the features in KeyWatcher that our customers rely on most and applied them to AssetWatcher,” said Mr. Pires. “We also make a point to continually improve our KeyWatcher system based on user feedback, and we’re excited to show these powerful products this week in New York.”
Sofradir, a pioneer in developing and manufacturing key classes of advanced infrared (IR) detectors for military, space, scientific and industrial applications, announces its election to the Board of Stakeholders (BoS) at Photonics21, the European Technology Platform (ETP) representing the European photonics community. The BoS is the main decision-making body of the platform. Sofradir’s appointment is effective as of November 19, 2018. As board member, Sofradir will support Photonics21 BoS’ role in defining and prioritising the photonics research and innovation roadmaps to be proposed to the European Commission for funding. It will raise awareness of infrared and thermal imaging within the European photonics sector as well as their potential for application in a cross-section of industries. Significant contribution Sofradir’s representative, Patrick Abraham, private and public partnership manager at Sofradir, was one of 39 candidates elected. He brings close to 30 years’ experience in a diverse range of photonics applications from fiber-optics communication to infrared imaging and in forging strong relationships within the photonics R&D community in Europe. Sofradir is proud of Patrick’s selection to the Photonics21 Board of Stakeholders, where we have no doubt he’ll make a significant contribution" He has experience with H2020 and ECSEL collaborative projects and Private and Public Partnership (PPP) development. His skills include promoting and managing innovation as well as having a clear understanding of academic and industrial needs. “Sofradir is proud of Patrick’s selection to the Photonics21 Board of Stakeholders, where we have no doubt he’ll make a significant contribution,” said David-Billon Lanfrey, chief strategy officer at Sofradir. Efficient food production “Photonics is a key enabling technology across a wide range of industries. It is therefore essential that European players in the private and public sectors actively coordinate efforts on making the European photonics sector strong. Through this it will be capable of harnessing these innovations to bring viable solutions for addressing societal challenges, such as climate change, disease detection and efficient food production in Europe and beyond.” Mr. Abraham will act as an ambassador for infrared and thermal imaging by raising awareness of this technology within the European photonics community. Stakeholder board members are appointed for four years. Sofradir remains within Work Group 5 for Security, Metrology and Sensors, where it has been a member since 2014.
It is hard to think of somewhere with more critical security needs than a bank. While cyber-security grabs the headlines, in the day-to-day business of banking, physical security of people and assets is paramount. We’ve all seen the heist movies. Of course, in the real world, bank security is more complex than fitting the biggest titanium door you can find. Buildings, ATM housings and cash-in-transit delivery services all have totally different workflows, but each demands high-security locking they can trust, just like a vault. Could a single locking technology accommodate such a diverse range of needs? Critical infrastructure A range of high-security cylinders and padlocks for applications beyond doors maximise physical security and attack resistance For complexity and security, critical infrastructure like power grids and clean water plants set the bar for banks’ locking needs. Coincidentally, this utility sector is among the most enthusiastic adopters of CLIQ access control. CLIQ is a multi-layered locking system which combines key-operated mechanical and electronic protection. A range of high-security cylinders and padlocks for applications beyond doors maximise physical security and attack resistance. CLIQ technology then layers encrypted, user-friendly electronic security on top — adding control and convenience without the need for wires: all CLIQ locks for doors, padlocks, cabinets, lifts, gates and any relevant machines are wireless. Power to the lock’s microelectronics comes from a standard battery inside every programmable CLIQ key. Key based solution These layers of physical and electronic security work together to give banks a safety net should a key go missing. Any lost CLIQ key’s access rights are simply removed, instantly, using the system software and it no longer opens any door, vault or ATM. Because it’s a key based solution, CLIQ offers a simple step up from mechanical security to powerful access control, with no change to existing hardware like doors. Retrofitting is hassle-free. The secure CLIQ Web Manager software interface works from inside any standard browser, or on an intranet with multi-factor log-in authentication for administrators. Facility managers can control workflows by tailoring every user’s access permissions, without bulging key-chains or having to design a complicated, expensive key management system. One programmable (and reprogrammable) key covers all their needs. Special clearance Equally, the CLIQ system can generate an audit trail for any lock or user on demand, thereby streamlining incident investigation Areas requiring special clearance are easily defined and access to them restricted to specific staff. If multiple system administrators are required, CLIQ handles it — even across different sites or time-zones. Facility managers can place programming devices at strategic points — near the staff entrance, say — for employees or contractors to revalidate their permissions regularly. Shorter access rights validity instantly upgrades security in a banking hall or back-office. Equally, the CLIQ system can generate an audit trail for any lock or user on demand, thereby streamlining incident investigation. Programming devices collect audit trails at the time of reprogramming. CLIQ functionality saves you time and money. CLIQ can secure more than just doors. CLIQ cylinders are ideal for ATM housings, and bank staff or third-party vendors don’t even need to carry another key to unlock the ATM. Their single CLIQ key is programmed to open just the right ATM at the right time — a secure and controlled workflow. Secure Bluetooth connection Every opening is tracked and audited within the same Web Manager software, available on a local server or with ASSA ABLOY’s secure Software as a Service (SaaS) option. Running a cash transit department or business adds another variable to the security mix: staff and cash are always on the move and the entire workflow must be secured. If you are back at HQ to collect a key, you are wasting time and fuel. An award-winning extension of the same CLIQ system — CLIQ Connect technology — has it covered. With CLIQ Connect, a key-holder no longer needs to update access rights physically in person by returning to base or even by moving to the nearest location with a programming device. All they need is a smartphone, the CLIQ Connect app and a secure Bluetooth connection. It’s simple and agile — and quick to respond to any ‘live’ situation. Key-operated unlocking The online opening function of CLIQ Connect can even contribute to secure sequence unlocking for cash collections If you need to redirect a cash collection team while they are on the road, you just set new access permissions for a building or ATM within the CLIQ Web Manager. The key-holder makes a secure Bluetooth connection between their programmable CLIQ Connect key and the app to instantly update their permissions. They can now open the necessary locks at their new destination. The online opening function of CLIQ Connect can even contribute to secure sequence unlocking for cash collections. For example, locks can require key-operated unlocking within 60 seconds of access also being authorised by a system administrator.
Seagate Technology plc, a provider of data storage solutions, and IBM announces they are working together to reduce product counterfeiting using blockchain and security technologies. The project, which is designed to help manufacturers, integrators, and business partners fight counterfeit hard drives, uses the IBM Blockchain Platform to authenticate the provenance of disk drive products, bringing a new level of multi-layered security protection to the data management industry. According to the International Anti-Counterfeiting Coalition, global trade in counterfeit and pirated electronic products has reached more than $1.7 trillion in value. To verify product authenticity, Seagate will update the IBM Blockchain Platform on the IBM Cloud with product authentication data based on the Seagate Secure Electronic ID (eID) at the point of manufacture. Cryptographic erasure technology Seagate’s Certified Erase employs cryptographic erasure technology to produce a digital certificate of data purge Each unique identifier (serving as an electronic fingerprint) can be used to verify the identity of a hard drive at any time during its product life cycle. Seagate’s Certified Erase employs cryptographic erasure technology to produce a digital certificate of data purge, which is electronically signed by the device under the Seagate Secure public key infrastructure (PKI) and stored on the blockchain for compliance management with emerging global data privacy laws. Building upon IBM’s blockchain expertise and powered by the Linux Foundation’s Hyperledger Fabric distributed ledger framework, the IBM Blockchain Platform is designed to allow network participants to append and view blockchain data based on their level of permissioning. Throughout a product’s life, technology vendors, service providers, and end users will be able to confirm the product’s provenance on the blockchain, which provides an immutable record of events. This can help reduce data loss, fraudulent products and warranty costs, while improving product assurance for customers during deployment. Ecosystem-wide effort “Blockchain technology can be extremely effective in confirming provenance and authenticity of assets,” said Bruce Anderson, global managing director, electronics industry, IBM. “The ability to work with Seagate to combine blockchain with advanced cryptographic product identification technology is what sets this work apart, and signals blockchain’s potential to reimagine the electronics product life cycle management processes. Counterfeit electronic components are a global issue that requires an ecosystem-wide effort to address.” Customers can benefit from knowing that a drive is a genuine Seagate product and that any data on it can be securely erased The eID and Certified Erase capabilities are built on the Seagate Secure technology, which can enable higher levels of trust of product provenance and proof of data erasure. Customers can benefit from knowing that a drive is a genuine Seagate product and that any data on it can be securely erased which can assist customers with their efforts to adhere to international compliance standards. Global product counterfeiting “IBM has a proven history of technology innovation as evidenced by its market leadership in blockchain technology for product provenance in various industries,” said Mark Re, senior vice president and chief technology officer at Seagate. “By combining Seagate’s innovations in product security with IBM’s blockchain expertise, we want to prove that we can help reduce the incidence of product counterfeiting in the future.” As project development continues in this combined effort to fight global product counterfeiting, Seagate and IBM are anticipating that they will expand the business network to include participation from supply chain partners.
As part of plans to simplify its branding structure in the UK, ASSA is now being marketed as a product range from ASSA ABLOY. The move by the global supplier of door opening solutions will provide customers with a market-leading specification and architectural hardware range under a single brand. ASSA rebranded as product range Following the merger of ASSA and ABLOY back in 1994, ASSA Scandinavia has played an important part in the development of ASSA ABLOY as an important and renowned brand, both in the UK and internationally, for the specification of door opening solutions. In 2017, ASSA Sweden took the decision to rebrand to ASSA ABLOY In 2017, ASSA Sweden took the decision to rebrand to ASSA ABLOY. This move was a logical evolution for the ASSA brand and further strengthens the company’s project specification capabilities. The rebranding has now been completed in Scandinavia, with rebranded products and packaging now starting to be phased in. ASSA's brand reputaion Although products will be branded as ASSA ABLOY, the business will market them in the UK as the ASSA range from ASSA ABLOY. The approach will allow the considerable brand reputation of ASSA to be retained and continue to be promoted. Rebranded lock cases, cylinders and strikes, including the 900 series, are available now. Rebranded panic exit devices, padlocks and hinges will arrive in Q4. Rebranded steel strikes and handles will arrive in Q1 2019. Changes to the branding on ASSA keys and timings for this will be confirmed in Q1 2019. Rebranded packaging for these products in the UK will arrive in Q4 this year and Q1 2019. Simplifying brand structure Eryl Jones, Managing Director of ASSA ABLOY Security Solutions, said: “Since ASSA first started to manufacture cylinder locks in Scandinavia back in the 1930s, it has been synonymous with quality, high security and design. To this day, we continue to develop and design products to meet the needs of the most demanding environments.” “Rebranding ASSA to ASSA ABLOY will help simplify our brand structure and make it easier for customers to do business with us. We are excited about this exciting next phase in our history and look forward to what the future holds.”
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: how do we all, collectively, keep up? More critical is finding ways to offer or utilise new technologies and total solutions that make operations easier Ensuring security preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training in new security solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying an end goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilising new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing access to buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing security partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry collaboration for a secure future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
Throughout the UK there are many examples of smart city transformation, with key industries including transport, energy, water and waste becoming increasingly ‘smart’. A smart city is a one that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and resident welfare. Smart access is an important step forward in providing technologically advanced security management and access solutions to support the ambitions of smart cities and their respectively smart industries. Explaining smart access If we used the standard definition of smart, it would be to use technology to monitor, control and manage access, but the technology must be adapted to both the physical and management characteristics of smart cities. Smart access is an important step forward in providing advanced security management and access solutions to support the ambitions of smart cities For example, it would not make sense to install an iris biometric sensor at an isolated water storage tank, which is out in the open and may not even have electrical power. Nor would a permissions management system work, one that does not let you update permissions simply and easily and cannot be customised. With high volumes of people entering and exiting different areas of the city, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by business owners or managers for audits, improvements or compliance. When initiating a new access control system it is important that the supplier and customer work together to understand: Who can enter a secure area Where in the building each individual has access to When an individual can enter a secure area How an individual will gain access to a secure area This information can be crucial in the event of a security breach, enabling investigators to find out who was the last known key holder in the building and what their movements were whilst there. Installing an electronic lock does not require electrical power or batteries, much less a connection to send information Modernising locks and keys Installing an electronic lock does not require electrical power or batteries, much less a connection to send information, which means that it can be installed on any door as you would a mechanical lock without maintenance requirements. Permissions are stored within an intelligent key. If you have authorisation for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by the key will be recorded. You can update permissions from a computer or using an app on a mobile phone at the time of access, which will update the key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with company access policy and removes travel and fixed authoriser costs. This then delivers increased flexibility and higher levels of security. Remote access control utilities Access rights can be set at any time and on any day, and if required can allow access on just one specific occasion Using an app improves access control by updating access rights in real time with the Bluetooth key. It also provides notification of lost keys, joint management of access schedules, protection of isolated workers and much more. Combined with new technological solutions, an app allows contextual information to be sent, such as on-site presence, duration of an operation, authorisations and reporting of anomalies. Access rights can be set at any time and on any day, and if required can allow access on just one specific occasion, for example to repair a failure. Access can be restricted to enable entry only during working hours, for example. Permissions can be granted for the amount of time required, which means that if permission is requested to access a site using a mobile app, the company should be able to access it, for example, in the next five minutes. Once this time has passed, the permission expires and, if a key is lost or it is stolen, they will not be able to access the site. The rules for granting permissions are infinite and easily customisable, and the system is very efficient when they are applied; as a result, the system is flexible and adapted to suit company processes and infrastructures. Using an app improves access control by updating access rights in real time with the Bluetooth key Finding applications to create solutions In many cases, companies themselves find new applications for the solution, such as the need to obtain access using two different keys simultaneously to prevent a lone worker from accessing a dangerous area. The software that manages access makes it smart. It can be used from a web-based access manager or through personalised software that is integrated within a company's existing software solution, to automatically include information, such as the employee's contractual status, occupational risk prevention and the existence of work orders. In some companies, the access management system will help to further improve service levels by integrating it with the customer information system, allowing to link it for instance with alarms managers, intrusion managers or HR processes. With over one million access points currently secured worldwide, this simple and flexible solution will play a strategic role in the future of security.
Wireless locks offer specific advantages for access control end users and integrators, and some of their value has yet to be realised in the market. Wireless locks expand the range of applications for electronic locks to complement traditional wired systems. They offer flexibility and scalability. They save on integrators’ labour costs. They even provide opportunities for integrators to earn recurring monthly revenue (RMR). A recent Allegion panel discussion highlighted the value, opportunities and untapped potential of wireless locks. Allegion panellists elaborated on some of the many advantages of wireless locks, including the following: Providing more system flexibility It’s a time of change in corporate and institutional environments. Customers are trying to manage a smaller operating budget with more people and more multi-use applications. Building applications are changing more frequently. Wireless locks can be used to convert more mechanical applications to electronic, but they are not necessarily real-time and/or monitored applications.Customers are trying to manage a smaller operating budget with more people and more multi-use applications For example, a wireless lock could be installed on a seldom-used door, such as a storage closet, to avoid the need to manage keys. The flexibility of wireless locks also would allow that same door to be transitioned to communicate with a network via WiFi, or it could be used for real-time communication in a monitored system. “It’s much more flexible if one product can do about six different things,” says Brad Aikin, Allegion’s Channel Led Business Leader, Integrator Channel. New product approaches enable intelligence to be added after the fact to existing wireless locks, thus further increasing flexibility. Designing systems that are scalable “We now have products that can start from very basic applications, and then build capabilities through systems and integrations all within one device,” says Mark Jenner, Allegion Market Development Director. Offering a useful complement to wired systems Once you understand how to deploy the wireless technology, the efficiencies of it from a labour perspective are pretty amazing” Wireless is not a “silver bullet” – not for every application, says Aikin. “I think it is an incremental opportunity,” he says, and more likely to drive conversion of existing mechanical locks than to transition wired electronic systems. “You’re just looking to get a more efficient credential, and to get rid of that master key system, or to dramatically shrink it down,” he adds. “Wireless is an example of how the integrator can do more, not just differently, but have more conversations and help their end users. They are not things the end-users are going to ask for inherently; these are latent needs. They are not going to bring it up.” Allegion panellists elaborated on some of the many advantages of wireless locks Less labour involved in installations “Once you understand how to deploy the wireless technology, the efficiencies of it from a labour perspective are pretty amazing,” says Robert Gaulden, Allegion Project Based Business Leader, Electronic Access Control. “Integrators can deploy two additional jobs in a day because they are on and off jobs more quickly. There are huge benefits, depending on what environment you are in.” Labour is a significant cost for integrators – finding, retaining and training good employees. Any new efficiencies in terms of labour – such as the simplified installation of wireless locking systems – is a saving grace for integrators.Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment “We see a lot more adoption from our customer base once they become comfortable with how to use the wireless technology,” says Gaulden. New opportunities for RMR There is a shift among integrators away from one-time installations and toward a recurring monthly revenue (RMR) model in which the integrator manages all aspects of the system over time for a monthly fee. Wireless systems can help to simplify that transition by lowering costs. Managing interior doors and locks can add value and incremental revenue, says Jenner. Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment. “We support that from the product perspective, but developers and software companies need to take advantage of it,” says Devin Love, Allegion Market Development Manager. “It’s an important feature for the end user, but we are still navigating through the world of wireless adoption.” “No one wakes up in the morning and thinks ‘I am going to buy a lock today,’” says Aikin. “We need to ensure we are having conversations about security needs, but also about how to deploy the technology to make it easier to manage and have more flexibility,” says Aikin.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and information widely available on the Internet. In this case, technology offers a solution, too. A new kind of key cannot be duplicated by 3D printing. Ironically, it is manufactured using 3D printing techniques. UrbanAlps Stealth Key A Swiss company called UrbanAlps has introduced the Stealth Key, a key that is designed and manufactured from the inside out. The mechanical elements that enable the key to uniquely open a matching lock are hidden away inside the key beneath a pair of narrow ledges, where they are not susceptible to being scanned and duplicated using 3D printing. UrbanAlps offers a range of cylinder locks and keys based on the Stealth Key concept. A high-tech padlock incorporates additional security features such as a shrouded shackle to avoid cutting, anti-drill capabilities, and resistance to lock picking. Stealth Keys are made using 3D printing and a laser to fuse together successive layers of metallic powder added in a manufacturing process called "successive layer melting." Manufactured from the inside out, complex internal features are "printed" and then covered over later with a solid layer that shields the complex inner workings from being duplicated. Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities. It is less expensive than other technologies designed to shore up the security vulnerabilities of 3D printing, such as keys that combine both mechanical and electronic components. The company’s website touts “simple and affordable key copy protection.” Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities 3D printing challenge Locks and keys are among the oldest security technologies, dating back to Egyptians and the Romans. Their value has been proven over the centuries and they continue to provide security in many applications, even in today's high-tech environment. However, 3D printing presents a challenge. 3D duplication became a high-profile problem in 2015 when 3D printable computer-aided design (CAD) files for Transportation Security Administration (TSA) master keys were published on the Internet. Those are the keys used by airport security staff to open private suitcases for inspection. The files allow the keys to be duplicated and used to successfully open TSA-approved locks. The hacking of security systems is nothing new—most electronic security systems have been hacked, or have the potential to be hacked in the future. Increasingly, security involves an ongoing one-upmanship between the good guys and the bad guys – the programmers and the hackers, the white hats and the black hats – whether the technology is computer systems or even the locks and keys that have been around for centuries.
Primark, the international retailer that offers Amazing Fashion at Amazing Prices, is using Traka’s dock door and intelligent management solutions to ensure maximum efficiency and safety across its warehouse and distribution centres. Primark operates from eight distribution centres. Its most recent opening was in Islip, Northamptonshire, UK covering 1.1 million sq. ft. of space – the equivalent of 17 football pitches. It has 13 miles of aisles and is a 24/7 operation powered by over 250 committed employees. A key part of Primark’s success is its efficient distribution of goods to store to meet growing customer demands. This is a complex operation involving the use of a wide range of technology. Traka DockSafe door dock solution To ensure effective turnaround times, Traka’s multifunctional DockSafe door dock solution was installed to stop vehicles prematurely leaving Goods Out Bays, alongside intelligent key management systems. Traka supports Primark’s distribution centres with its DockSafe solution and key management systems" David Flavell, Primark’s Operations Development Manager – Supply Chain said: “Primark’s products fly off the shelves and rails, so we need to get our products from suppliers to stores as quickly and as safely as possible. Implementing the Traka DockSafe has been critical here. Not only is it simple to use, but also provides data on driver activity and bay usage, as well as increased peace of mind thanks to the prevention of driveways. It ensures the system runs like clockwork, which is great news for our colleagues whilst working hard to deliver Amazing Fashion to our customers.” DockSafe combination with iFob technology Traka’s intelligent DockSafe solution has been exclusively designed to stop vehicles prematurely leaving the Goods Out bays of a busy distribution centre. DockSafe combines Traka’s iFob technology with a unique Susie lock to create a robust protocol where a vehicle must be immobilised prior to the loading dock door being opened. Once goods are loaded, the door must be closed and the loading bay clear of forklifts or personnel, before the vehicle can be unlocked and driven away. Steve Bumphrey, UK Sales Director added: “Traka supports Primark’s distribution centres with its DockSafe solution and key management systems. With advanced features and data reporting, it ensures its people can optimise loading bay planning for long-term efficiency and productivity, in a safe and secure working environment.”
Abloy UK and security company Barry Brothers have supplied and installed a CLIQ Go electronic cylinder solution to a communal garden in Kensington, London to provide its subscribers with reliable and secure access. The garden’s previous access control system had proven to be unreliable, at times allowing members of the public unauthorised access which often resulted in damage in the area. Also, previous subscribers had maintained ingress and egress to the garden by retaining their key after their subscription had lapsed. Multiple access requirements Located in an enclosed area, the garden is secured with an external gate that is fully exposed to the elements. The resident committee required a durable locking solution to cope with such conditions, with the technology to control multiple access requirements; to allow subscribing resident’s access to the gardens, and a team of contractors and committee members with higher access permission to enter the internal compound to enable maintenance of the gardens. The new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements Sam Moxey, technical sales and project manager at Barry Brothers, London’s longest serving security company, specified the new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements. Excellent feedback The CLIQ Go App moves security to a new dimension, enabling controlled security from a mobile device and the ability to easily revoke access permission of non-subscribed individuals. Features include the ability to schedule access to areas and to provide contractors with time-limited access. If a key is lost, access can also be revoked using the CLIQ Go App, all managed from a cloud-based system. The system has been installed for six months with excellent feedback from the committee and subscribers. Membership subscriptions have increased and savings have also been achieved because of the reduced number of locksmith callouts. Sam Moxey, Barry Brothers, Said, “I wanted to ensure that the solution we specified would perform as required and finally resolve what had become an ongoing issue for the committee. Having worked with Abloy UK for a number of years, I had no hesitation in recommending CLIQ Go. It was very easy to set up and the programming of the CLIQ Go locks and keys was achieved easily, fitting with my busy workload.”
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio to extend its installed Gallagher Command Centre access control system. The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates—they needed the right wireless solution. Wireless locking technology Aperio wireless locks are battery powered, and so use much less energyUEA’s needs included more than just security, stylish component design and affordability. Crome Court was specifically designed to minimise environmental impact, including CO2 emissions. Any access control system was expected to contribute to that goal. The university chose Aperio wireless locking technology from ASSA ABLOY. Aperio wireless locks are battery powered, and so use much less energy than wired magnetic security locks. They only “wake up” when a credential is presented to the reader. On campus training “We decided to offer Aperio to upgrade and extend our system at UEA because of its outstanding reputation within the security industry,” explains Jason Boyce, sales manager at Gallagher. “Having worked with us for 6 years, Gallagher knew we would deliver,” adds David Hodgkiss, national sales manager at ASSA ABLOY UK. Installation was quick and easy, aided by training delivered on campus by specialist ASSA ABLOY technicians. “We found ASSA ABLOY’s service faultless,” says Wayne Dyble, installation and support manager at Check Your Security, UEA’s service provider. Environmentally advanced profile There’s no need for expensive and time-consuming work changing the locks Crome Court’s secure doors are fitted with Aperio E100 online escutcheons. Students open them with programmable RFID smart cards, instead of cumbersome mechanical keys. If a keycard is lost, it is straightforward for UEA facilities staff to cancel it and issue a replacement—using a simple web-based interface or mobile phone. There’s no need for expensive and time-consuming work changing the locks. UEA also aimed to build Crome Court with an environmentally advanced profile. Here, too, Aperio delivered. Wireless locks are battery-operated and emit much less CO2 than wired magnetic locks. In fact, in carbon terms, Aperio locks emit 0.16 percent of the total emissions produced by standard wired locks. Flexibility is another Aperio asset: additional doors can be brought into the same integrated Gallagher system whenever needed. “We hope to roll out Aperio across all new and existing residential estate,” says Christine Beveridge, head of campus services at UEA.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for students. Access management system The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff" In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Adaptable access solutions A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio® wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost-effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Improved student experience The Gallagher Command Centre integration allows for the access key and student ID to be combined in to one card, offering a number of benefits to both students and staff. The student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted" Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Monitoring access cards The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” Replacing keys with a combined access and student ID card has reduced our operational costs" Creating business value University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Enduring partnerships “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved, and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.” “The University has worked with 2020 Vision Systems for some time on CCTV and access control systems, so when they won the tender to provide and install the Gallagher and Aperio® systems we had every confidence that they would be able to deliver. The completion of our new state of the art Chamberlain development was extremely close to the date of the first student occupation and so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.”
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access control devices to become an integral part of a security system for assets and people with the highest level of protection. They sought locks to offer a durable, secure and flexible alternative to standard mechanical security. They found an easy, electronic way to administer a powerful, user-friendly system based on battery-powered physical keys and secure, advanced microelectronics. Flexible high-security locking Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissionsCreval chose eCLIQ key-based wireless access control for its banking premises. Bank doors across the Lombardy region are guarded by more than 30 durable eCLIQ cylinders, putting Creval managers in complete control of entrance security. eCLIQ is a scalable electronic extension of the CLIQ access control system deployed in critical infrastructure sites across Europe. Cylinders are fully electronic, protected against manipulation and with 128-bit AES encryption built into both lock and key microelectronics. Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissions. Time-limited access rights Creval’s security manager is now able to grant access based on scheduled times and specific doors, and right down to the level of the individual site user. It is also straightforward to set time-limited access rights for a user key, increasing security if a key is lost. Audit trails and event logs are collected to the same, fine-grained degree. Key management is easy with software operated from a local PC or securely on the web via a standard browser. In the unlikely event a key is misplaced, Creval administrators simply delete its validity from the system. “We are satisfied with the results of the new access control system,” says Claudio Brisia, Logical Security Manager at Creval headquarters in Sondrio.
Just a ten-minute walk from the city centre, the University of Leeds is upgrading door security in much of its student accommodation to keep pace with changing technology and customer demand. One of the biggest and busiest centres of higher education in the UK, the university has more than 34,000 students and over 8,000 staff, making it the third largest employer in Leeds. With such a large student population to house, its residence portfolio both on and off campus is impressive. It ranges from the Victorian architecture of Lyddon Hall to modern purpose-built apartments such as Storm Jameson Court, through to shared houses and a huge choice of flats and apartments run in partnership with the likes of UNITE and iQ Student Accommodation. Wireless electronic access control system The Residential Services team have chosen to upgrade their SALTO ProAccess management system to the latest versionStarting university is a really exciting time, and for many students it will be their first time living away from home so both they and their parents will want to know they will be living somewhere safe and secure. Starting in 2010, Residential Services swapped out its previous mechanical keyed system and since then has been using a wire free electronic access control system from SALTO across much of its student accommodation. This has proven reliable providing the versatility and efficiency to manage in excess of 1737 doors across the campus. But technology does not stand still, and many advances have taken place since the original installation. So, the Residential Services team have now chosen to upgrade their SALTO ProAccess management system to the latest version to take advantage of its increased functionality and features including the ability to use smart phones as access credentials. Benefits of SALTO solution Paul Carr, National Accounts Manager at SALTO Systems, says: “Our ProAccess SPACE Software is a powerful web-based access control management tool that enables users like the University of Leeds to programme access-time zones, manage different calendars and view audit trails from each door. ProAccess SPACE Software's user-friendly web-based interface is simple to set up and configure" “Its user-friendly web-based interface is simple to set up and configure, giving them the flexibility and control they need. It balances security with accessibility, and advanced technology with affordability. By embedding such a high-performance electronic access control solution into their infrastructure, the University can protect people – both students and staff – as well as their assets and buildings. Problems with key access control system “Student accommodation for instance, whatever shape it comes in, is usually busy with people moving from bedrooms to and from various facilities in and around the building. That means a lot of events for doors to deal with. If a room key is not handed in when one student leaves, is the room secure for its next occupant? If a key has been lost how do you cancel it and know the room is truly secure without changing out the lock? And regards to that lost key, has it been copied? “And for audit purposes, on a campus such as Leeds with such a massive choice of accommodation, how do you get an accurate security overview when there are literally thousands of keys in circulation? This is where ProAccess SPACE and electronic access control really scores. “And now, with changing technology, more people want everything to be accessed through their personal device. That should come as no surprise as today’s students are digital natives and they expect convenience to come as standard!” Delivering highest level of security It is important that students are safe and secure and that access to their accommodation is strictly controlled"Simon Mulholland, Residence Refurbishment and Development Manager at the University of Leeds comments: “Living in University accommodation is a great way to experience student life, make new friends and feel part of our student community. We understand how important security is and it is a responsibility we take very seriously. It is important that students are safe and secure and that access to their accommodation is strictly controlled. “The SALTO system we’ve been running since 2010 now has proven track record with us so upgrading was a fairly straightforward decision and the latest version of the ProAccess SPACE software enables us to continue to deliver the highest levels of security combined with the most convenient and enjoyable experience of the learning environment – all as cost-effectively as possible. “Mobile credentials are an exciting application, after all when do you see a student without a smart phone, so this together with a number of other functions gives us enhanced productivity and control in a familiar but more powerful package.”