Traka is attending The Security Event 2021, to showcase its latest intelligent solutions in key and equipment management, together with powerful integration capability to improve sector productivity, security and accountability. TrakaWEB software On stand 3a/H50, Traka will be presenting its latest generation TrakaWEB software, offering remote administration with the benefits of faulty item exchange, curfew and fleet management, together with full audit control capability. It can be recorded w...
In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximise benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems...
Maxxess (MAXXESS Systems, Inc.) is targeting increasing demand across the Middle East and North Africa regions for affordable, seamlessly integrated systems and visitor management solutions, with the appointment of Issam Alhamadam as Business Development Manager (BDM) for the MENA region. He joins the company at a time of exciting growth for its eFusion and eVisitor technology, with a number of major projects in the pipeline. The market is being boosted by a drive towards diversification across...
Keyless, a pioneering privacy-first biometric authentication firm announced that it has joined the DizmeID Foundation, to develop an open ecosystem for decentralised management of digital identities. Control over digital identity DizmeID Foundation operates to combine the benefits of self-sovereign identity with necessary compliance and regulation, to enable wallet holders with ownership and control over their digital identity, data access, and distribution. Keyless will work alongside A...
With a combination of duty of care, valuable equipment and personal data, the education sector presents one of security’s biggest challenges. Choosing the right access control solution is critical. Could going wireless be an option? The ideal access control solution for a school, college or university should provide control without complexity — and make security management more streamlined and user-friendly in the process. It should save every institution both time and money. Secur...
Built to withstand all access control needs, the tough new SALTO Neoxx electronic padlock takes security beyond normal expectations. SALTO Systems has invested years of working with some of the best minds in the security industry, their community of security specifiers and installers, to build the most reliable and smartest electronic padlock on earth. SALTO Neoxx Padlock With exceptional attention to detail, premium materials, and all SALTO technology inside, their latest padlock, SALTO Neox...
Iris ID, the globally renowned company in iris recognition technology for over 20 years, will showcase its top products for law enforcement agencies at the National Sheriffs’ Association's (NSA) annual conference and exhibition – NSA 2021 Annual Conference and Exhibition, slated to take place from June 22-24, 2021, at the Phoenix Convention Center. Iris ID will occupy booth #114 at the exhibition. NSA 2021 Annual Conference and Exhibition The annual conference is an opportunity for the members of the nation's more than 3,000 sheriff's departments to learn and share information related to all parts of their mission, including law enforcement, jail operations, prisoner transport and courthouse security. Tim Meyerhoff, Director, North America, Iris ID, said biometric technology plays an increasingly important role in helping sheriff's deputies complete their jobs daily. Tim said, “Rapid and accurate identification of people is a major law enforcement need.” Contactless iris-based biometric systems Tim adds, “There is no room for error when it comes to booking and release of those charged with crimes. And our contactless iris-based biometric systems, the most accurate on the market, are ideal as departments continue battling the COVID-19 virus.” Among its many products, Iris ID will highlight three widely used by law enforcement organisations. iCAM M300 and iCAM R100 access control readers iCAM M300 is a lightweight, handheld device used by law enforcement to enroll and identify people in the field The iCAM M300 is a lightweight, handheld device used by law enforcement to enroll and identify people in the field. The iCAM M300 offers access to the three primary modes of biometric identification – iris, facial and fingerprint – with communication protocols including NFC, Wi-Fi, Bluetooth, GPS, 4G LTE and more. The iCAM 300 also provides magstripe and contactless card support and offers an MRZ reader to verify ePassports. Iris ID iCAM R100 readers replace the need for PINs, access control cards and RFID fobs to enter integrated smart lockers and key management cabinets protecting keys, weapons, evidence and other valuable assets stored by sheriff's departments. Iris ID biometric technology used by US government agencies Law enforcement agencies across the U.S., including the Los Angeles County Sheriff's Department, the York County (Penn.) Sheriff's Office and the U.S. Border Patrol use Iris ID biometric technology. Iris ID iCAM 7S series product is currently included in the Los Angeles sheriff booking stations. It is used to add iris-based identity authentication capabilities, resulting in more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints.
The smartphone is changing access control and security management at every scale and level, from global corporations to small companies. Making the switch to mobile access control, however, can seem daunting. Questions may arise around cost, practicality and the potential need for new door hardware. Yet going mobile is actually a lot simpler and quicker than many think, as one new guide explains. Data from the recent Wireless Access Control Report 2021 suggests almost two-thirds of organisations have already adopted mobile access control, or plan to do so within two years. Industry analysts Omdia estimate that downloads of mobile credentials grew by 220% between 2018 and 2019 alone. Mobile access control The main benefits of mobile access control, the report suggests, are convenience, cost and security. All three of these advantages apply for any scale of organisation. The user convenience of replacing plastic key-cards with secure ‘mobile keys’ on a smartphone is obvious. Identical benefits have already brought a mobile-first ethos to banking, travel booking, food delivery and many more sectors. The ability to get the job done efficiently from anywhere is becoming essential From a business perspective, too, the option for facilities managers to use their own smart device to issue, amend or revoke an employee’s mobile key brings added flexibility. It frees security staff from the desk and its dedicated admin PC. As the work patterns become fluid — IBM estimates 1.87 billion people will be mobile workers by 2022 — the ability to get the job done efficiently from anywhere is becoming essential. Access management via smartphone offers this. Reissuing mobile credential Secondly, mobile credentials are simpler and quicker to administer than key-cards, which brings significant cost savings. Deploying mobile keys on employee smartphones removes any need to purchase plastic cards or pay for their printing. Any missing plastic credential needs replacing; cancelling and reissuing a mobile credential is essentially costless. Mobile access control also enables a business to reduce its use of non-recyclable plastics. Third, the security of mobile credentials improves on traditional card-based access control. More than 17% of respondents to a recent survey admitted losing an RFID card or fob in the previous 12 months. Such an event obviously threatens site security. How quickly would an employee notice this missing plastic key-card? The survey did not ask, but everyone would notice a missing phone more quickly. Electronic access control Access permissions can be cancelled or amended over the air without any need for updaters Security managers can react fast when credentials are mobile. Access permissions can be cancelled or amended over the air without any need for updaters, for example. Everything happens instantly inside the credential app. Even if a missing phone is not spotted quickly, almost every device now has a built-in failsafe: Biometrics, fingerprint or face ID screen-locks, stop any casual thief from using a phone’s mobile keys. But what of the challenges of switching standard electronic access control for mobile access — especially for businesses which may not have a large or specialist in-house security team? In truth, if businesses choose the right solution, the challenges of upgrading to mobile keys and access management are far fewer than many imagine. Electronic door locks In many cases, there will be no disruption to existing doors or door hardware, and no drilling at all around the door. Some electronic door locks are compatible out the box with both RFID and mobile credentials. The same reader can be used interchangeably with standard plastic cards and a smartphone. User experience at the door is identical: Just tap or move the phone close a reader to unlock. The same reader can be used interchangeably with standard plastic cards and a smartphone In most places, employees can use their own phones. A system offering access via a secure iOS or Android app presents no obstacles to many Bring Your Own Device (BYOD) policies. In the assessment of the recent Wireless Access Control Report 2021, the move to mobile may not result in any wholesale changes to current lock and reader systems.’ Access control system With the right mobile access control system and technology, businesses save the costs involved in replacing lost or damaged credentials. Facilities staff save time previously wasted in handover meetings, getting new or replacement plastic key-cards to the right people. Mobile access based on a secure app streamlines the process of system management. Updating, revoking or adding new access rights takes place instantly over the air. Many app-based systems offer the ability to store keys for several sites within one secure environment. Keyholders can travel to multiple locations contact-free. Mobile access solution Many businesses have already followed an easy upgrade path to mobile access" “The Openow mobile access solution for SMARTair, for example, enables security managers and site users to manage all their mobile keys from one app,” says Mikel Gaztañaga, SMARTair Sales Manager at ASSA ABLOY Opening Solutions EMEA. “Many businesses have already followed an easy upgrade path to mobile access. SMARTair wireless locks are deployed in buildings and businesses all over the world. The whole system makes switching to mobile simple and cost-efficient. Existing SMARTair systems don’t even need new hardware to upgrade.” For users, the benefits are clear. The device in their pocket does the job of one or several plastic cards. If they’re carrying their phone, they already have their keys with them — secure, convenient and almost cost-free.
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors announced they will be displaying contactless security doors and turnstiles, including a new optical turnstile, the Speedlane Compact, in booth #8037 at the ISC West exhibition in Las Vegas on July 19-21. ISC West is the largest security event in North America, bringing together thousands of security and safety professionals for networking, education, and discovery of new technology. All of Boon Edam’s security entrances will be paired with the latest in access control and biometric technologies to demonstrate a seamless solution for attendees. They are also the official turnstile sponsor of the show. Prioritising exhibitor and attendee safety The ISC West exhibition will be the first national, in-person event since the start of the COVID-19 pandemic. Boon Edam is in open communication with ISC West on their plans to prioritise the safety and security of both exhibition staff and event attendees. All Boon Edam booth staff will be wearing masks and adhering to social distancing requirements as mandated by the event. “Boon Edam is ready to safely resume physical security conversations at ISC West this year,” said Valerie Currin, CEO and Managing Director of Boon Edam Inc. “Our customers are requiring hands-free entry solutions that mitigate tailgating and piggybacking. Our ISC West booth this year will showcase exactly what our customers have been asking for in this new security landscape.” Integrated technologies for a touchless entry Boon Edam will be featuring all its touchless security entrances to prevent unauthorised entry at its facilities The COVID-19 pandemic has created a requirement for contactless, hands-free entry into all facilities and campuses. Security professionals are challenged to provide these touchless entrances without compromising physical security. Boon Edam will be featuring all its touchless security entrances that enable security professionals to deter, detect and prevent unauthorised entry at their facilities. Each entrance product will be fully integrated with third-party touchless access control technologies that are available on the market today. The following solutions will be on display in Boon Edam’s booth: 1) NEW Speedlane compact optical turnstile This new turnstile solution was created out of a market need for premium quality, swinging barrier turnstile with a small footprint – making it ideal for building retrofits. The Speedlane Compact maintains the same level of tailgating deterrence and detection of its larger turnstile counterparts while offering easy installation and integration with access technologies. The Compact will include an HID card reader installed inside the cabinet. 2) Lifeline Speedlane swing optical turnstile This slim, swinging optical turnstile will feature a unique, white powder-coated finish and mid-height glass barriers for tailgating detection. The turnstile will be integrated with Boon Edam’s Boost pedestal, which is specially designed to complement the aesthetics of the Lifeline optical turnstile series and house virtually any access technology inside. The Boost will include the latest version of Essex’s credential card reader, the iRox-T, which now features Bluetooth and OSDP capabilities that expand HID Global’s Mobile Access solutions. 3) Tourlock 180 security revolving door The Tourlock in Boon Edam’s booth will demonstrate the combination of fast throughput with high security The unmanned security entrance of choice for the Fortune 500, the Tourlock provides the highest level of bidirectional traffic throughput while preventing unauthorised entry. The Tourlock in Boon Edam’s booth will include StereoVision® piggybacking detection technology and an AMAG Symmetry card reader to demonstrate the combination of fast throughput with high security. 4) Circlelock solo security mantrap portal Offering the highest level of security available in an entrance, the Circlelock security portal uses StereoVision® technology to prevent intrusion into the most sensitive locations, such as data centers and executive suites. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorisation, while facial recognition technology provides instant authentication inside the portal: the secure, edge-based facial authentication access control device by Alcatraz AI, called the Rock, ensures only the right person can enter.
Installers and specifiers are still not fully aware of the many options available to them to help manage social distancing and limit direct contact with ironmongery and doors, says the ASSA ABLOY Opening Solutions UK&I. In line with a recently updated guide from the Guild of Architectural Ironmongers and Finishes and Interior Sector, which outlines how business owners can use partitioning and ironmongery to help manage social distancing, ASSA ABLOY’s extensive portfolio means its products can help with these issues in a number of key ways. Top 5 ironmongery tips “During these times, it’s no surprise that installers and specifiers are being asked about the most suitable products to fit,” says Eryl Jones, Managing Director of the ASSA ABLOY Door Hardware Group. “It’s critical to advise decision makers on practical product choices, which not only meet the needs of the here and now, but which also provide long-lasting, compliant solutions too.” “For existing hardware, the truth is nothing will beat a regular and thorough cleaning routine. However, for new installations, there are a variety of considerations that installers and specifiers will want to bear in mind when advising their customers. Here are our top ironmongery tips on how to manage social distancing and limit contacts with doors.” Seek specialist closing devices To minimise contact with a door, many will be tempted to keep doors held open. This, however, must not be done with fire doors, but this challenge can be overcome with electromagnetic hold-open units. Connected to the building’s fire alarm system, these will automatically release in the event of a fire, helping to keep people and property safe. ASSA ABLOY’s DC300G-HF door closer has the option to not only choose hold-open but free-swing functionality too ASSA ABLOY’s DC300G-HF door closer is commonly specified for these applications, with the option to not only choose hold-open but free-swing functionality too. This enables the door to operate without any resistance, so it can be left open in any position. However, just like with the hold-open feature, should a fire alarm be activated, the electromagnetic feature will release the door and ensure it’s closed securely. Provide personalised keys Users sharing keys can quickly increase the spread of bacteria and germs. An access control system that employs individual keys puts a stop to this and simplifies key management too. Electromechanical solutions use high-end micro-electronics and programmable keys and cylinders to overcome this challenge. ASSA CLIQ® Remote is one such system. A popular, award-winning solution, it allows all users to have their own personalised keys for doors, eliminating the need to share keys. A recent success story has been with the Hean Castle Estate, with ASSA CLIQ® Remote ensuring managers stay in control of access rights across the site at all times. Another long-term benefit of the system, according to Trustee David Lewis, is its flexibility. “As the Estate expands, the ASSA CLIQ® Remote system can grow with it,” he says. “The system is now simply part of the infrastructure of the Estate; should we need more cylinders or padlocks added to it, then this is an easy and hassle-free process.” Adopt anti-microbial solutions Anti-microbial solutions, or touch-safe as they’re often called, offer a proven way of preventing bacteria from spreading. In the current climate, it’s unsurprising that installers and specifiers are receiving an increased number of enquiries about these solutions. It’s worth noting that these products might not offer the best long-term solution, as they can lose their potency over time. Nevertheless, they are easy to install and cost-effective. Customers might also want to consider anti-viral copper tape products, which simply wrap around a clean door handle, for a quick, temporary touch-safe solution. For example, UNION has developed GripSafe to meet this need, which has been proven to inactivate 99.98 per cent of corona viruses. Don’t forget about ancillary products From concealed hinges to concealed door closing devices, ASSA ABLOY has a range of products When considering ironmongery and doors, it’s can be easy to forget about other ancillary products that can help limit and mitigate the risks of spreading bacteria. If there are concerns around products that could provide surfaces where bacteria may collect, then concealed products offer an assured solution. From concealed hinges to concealed door closing devices, ASSA ABLOY has a range of products available for guaranteed peace of mind. Another factor to think about is signage. Given the current climate, specifiers may want to consider signage relating to hand washing and sanitising, social distancing, and other measures that can be taken to prevent the spread of germs. Making sure products are up to mark While not directly relating to helping manage social distancing or limiting contact with doors, the final tip is on product marking, as it’s vital that solutions with the appropriate product marking are being specified and installed. With the new UKCA and UKNI marks introduced from 1 January 2021, it’s crucial that installers and specifiers understand the implications for products that do not have the correct marking in place. Not only will product marking be invalidated, but the potential implications for all those involved throughout the supply chain could be very serious, including significant fines and penalties. Third-party marking ASSA ABLOY is taking all the appropriate steps to ensure its products have undergone the correct third-party marking for goods being sold into Great Britain or Northern Ireland. Those with questions or concerns around ironmongery product marking should not hesitate to contact the ASSA ABLOY team to discuss in more detail.
SALTO Systems, a manufacturer of electronic smart access solutions, has launched a newly-redesigned website that offers detailed product information, enhanced industry vertical focus, and covers the latest technology and electronic advances for SALTO platforms, technology, and services. Improved functionality The new site places a large emphasis on visitor experience and provides a streamlined, modern design, improved functionality, and accessible resources to help support the informational needs of clients and prospects alike. Comprehensive site to help make access decisions "We are thrilled to launch the new SALTO website and strongly feel that it aligns with our sustainable company vision of becoming the most technologically advanced access control provider that develops disruptive electronic smart locking solutions for any type of application all around the world,” said Borja Ganzarain, Brand, Content and Marketing SALTO Systems. The new website provides visitors, customers, partners, and end-users with a new ecosystem" “We have been working hard to give our website an upgrade. Our goal with this new website is to provide our visitors, customers, partners, and end-users with a new ecosystem that will help them develop a better understanding of SALTO. They will find a sleek new comprehensive site that delivers the information they need to make informed smart access decisions.” Cloud-based smart access solutions The website provides easily accessible information for potential customers, business, and technology partners to gain key insight into SALTO access control solutions and deliver personalised and engaging content and experiences about cloud-based smart access solutions from the SALTO KS platform or industry-leading SALTO Space on-premise access management platform. Robust access platforms The new saltosystems.com website offers a clean and modern design, with information that will be updated regularly with news, blog articles, business cases, new product launch updates, and more. The newly-designed website offers detailed product information on the electronic lock products SALTO develops and manufactures as well as educational information about robust access control technology platforms that enable end-users to experience the most advanced, secure, and convenient keyless smart access. Delivers security and safety management An enhanced section of the website features in-depth solutions for the variety of market industries that SALTO has established a growing footprint and world-class references within: commercial, residential, and shared living spaces, education, healthcare, hospitality, co-working, and retail. SALTO has electronic hardware and software solutions that work together (and with other building technologies) that apply to each industry, delivering security and safety; flexibility and scalability; an improved user experience; and simplified management. MyLock configurator The popular SALTO MyLock configurator is also featured on the new site so that specifiers, architects, partners, and end-users can individually configure SALTO’s wire-free electronic door lock components and visualise them on different doors types or styles. In addition to the SALTO electronic hardware, MyLock users can choose from several door models and a wide range of colours, finishes, handles, and functions, and then download the technical specifications of the selected product configurations.
Lock and security specialist, Mul-T-Lock has launched CLIQ Local Manager, the ideal locally installed access control system for medium to large businesses. The new CLIQ Local Manager software has been designed for the day-to-day management of eCLIQ master key systems. With it, system managers can perform a variety of tasks, based on the specific needs of their environment, managing access rights of user keys locally via desktop programming devices. CLIQ Local Manager Mul-T-Lock’s CLIQ Local Manager is simple to set up, even for new users of CLIQ. Automated COM port selection makes getting started quick and easy, plus the software has been developed to be extremely intuitive and user friendly, reducing the need for lengthy training sessions and in turn, decreasing investment costs. CLIQ Local Manager has also been developed to offer a more secure solution, owing to its state-of-the-art future-proof design, which allows system managers to allocate access authorisations and collect audit trails. This makes the software ideal for securing premises that house maximum security or sensitive data, such as prisons, hospitals and government establishments. Support for GDPR-compliant software CLIQ Local Manager supports GDPR-compliant software, used to meet user demands for data privacy Able to handle up to 5,000 keys and 5,000 cylinders, CLIQ Local Manager also supports GDPR-compliant software, used to meet user demands for data privacy. The software can be used with any common Windows computer and is ideal for those wanting an access control system in remote locations, such as national parks and farmland, as there is no need for network coverage at points of installation. eCLIQ access control locks Working on a modular system, Mul-T-Lock’s eCLIQ access control locks are quick and easy to install, in place of mechanical cylinders and padlocks. Retrofittable to doors, cabinets and gates, and requiring no cabling, the system offers a low cost and low maintenance solution for all types of applications. CLIQ Local Manager allows for easy migration from old manager software and lets users choose the level of service they need so that they can always get help and software updates, whenever needed. Plus, the software allows users to set reminders so that they never forget an important task.
Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption. Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalisation bringing multiple business benefits, which would simply not be possible using traditional models. Digital transformation While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment. Yet, with more organisations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximise the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge. Improved access control in smart environments These urban constructs are capable of reducing waste, driving efficiencies and optimising resources The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimising resources and increasing citizen engagement. Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. Frictionless access control During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity. Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimising the risk of infection, by removing the need to touch shared surfaces. Such systems can be customised and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful. Barriers to adoption Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant. Many are now beginning to realise that connected network-enabled solutions are here to stay Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space. Time will not stand still, and many are now beginning to realise that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature. The importance of cyber hygiene Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks. Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT). While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited. Cyber security considerations Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognised cyber security principles, incident reporting and best practices. It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security. The future of access control There is a natural dispensation towards purchasing low-cost solutions There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organisations by their association. The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world. Cyber security key to keeping businesses safe In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies. As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor. The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.
When we talk about security, people are often quick to jump to conclusions and picture bouncers, heavy steel doors and alarms that go off as soon as a door is opened. Access control is in fact one of the most common and least invasive methods of adding extra security to a home, communal or business premises – controlling who is able to enter a space based on the use of entry codes, key fobs, and/or access cards. Communal flats and office blocks are where access control is often an important factor in keeping the building secure, though private residences also have their own lowkey methods of access control with burglar alarms and personalised codes. With that said, what is it that makes access codes so effective across so many spaces – and why are they so important in today’s society? Benefits of access control Every time you visit an office space, enter a block of flats, or drive into a gated community, you will likely be faced with restricted access and a code pad – plus a button to ring through if you are a visitor. This is a prime example of access control, whereby the owner of the premises has installed a gate or security door which requires a code to enter from the outside. Pressing the request button puts you through to a controller who can then either grant access or deny access. The primary benefit of access control is that it ensures that a space remains secure Some of these code pads have cameras so that the controller can see the visitor – some just have a microphone and speaker. The primary benefit of access control is that it ensures that a space remains secure – only visited by those who are granted access. This restriction helps to keep residents and property safe, not only deterring burglars but ensuring that they are unable to gain entry without permission. Access control panels Some of the examples of access control panels in use include: Private car parks, granting access to employees or residents or paying guests based on the location. Communal buildings and flat entranceways, granting access to residents. These kinds of access control panels will have multiple buttons, one for each flat so that guests can buzz and speak to their contacts. Offices, granting access to employees and their guests. Another key benefit of access control is that entry and exit data can be tracked Another key benefit of access control is that entry and exit data can be tracked, and data can be used for anything from tracking the use of a building, to understanding and logging when individuals have entered and left the premises. For those who have ever watched a Detective drama, you will know how crucial this kind of data can be to determining alibis! Replacing lost keys Inhouse, this can also be useful in identifying who is around when an incident occurs, and in ascertaining how many people are in the premises in the event of a fire or emergency situation. On top of knowing when individuals are accessing certain spaces, access controls can also be used to restrict access to spaces during certain time periods – for example at the end of a shift, or overnight. This is most often found in commercial spaces and car parks, as private residences will grant access at all hours to residents. Access control plays an important role in security and can impact everything from your insurance bills and insurance cover to the amount you spend on replacing lost keys. By keeping certain spaces restricted, only granting access to those who are supposed to be there for work or through their private residence, you are able to keep individuals safe and protect them from the effect of theft. Preventing unlawful access Access control is particularly crucial in tracking the movement of employees should an incident occur In a workspace, access control is particularly crucial in tracking the movement of employees should an incident occur, as well as making the life of your team much easier in allowing them to move between spaces without security personnel and site managers present. It can also reduce the outgoings of a business by reducing the need for security individuals to be hired and paid to remain on site. For a private homeowner or flat owner, access control is what grants you the privacy and security that you deserve in your own space. Whether the control is placed on the outside of a bin store, car parks, communal entrance way or your own personal flat, creating barriers to prevent unlawful access can make a private residence more appealing to tenants or homeowners, and can also provide information and data about who has entered a building and when. Vacant property security The value of access control is that there are a range of solutions according to your budget, your requirements, and the way that you intend to use access control across your site or inside space. For the most part, access control is considered to be a cost effective way of increasing security, cutting back on personnel while ensuring that access is only granted to those who are supposed to be a specific space. The value of access control is that there are a range of solutions according to your budget According to construction site and vacant property security company Sicuro, access control systems with a built in camera are becoming increasingly popular, particularly on the exterior of a building when it comes to granting access to visitors – as those inside can see who is asking to be let in. Managing access control Meanwhile, across inside workspaces and sites, access control managed by pin numbers or fingerprints is often sufficient. Access control is an important part of modern security, ensuring that everywhere from office spaces to private residences are protected from unwanted or unlawful visitors. For the most part, access control is managed automatically, tracking and storing data on who has entered and exited a specific space and at what time – though some examples are tracked and managed manually (for example in a school reception or private residence).
The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labour costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming 29th June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organisations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practice, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and are used to authenticate access control credentials and read the data required to access multiple applications secured by multiple vendor devices. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are AES 128 encryption keys encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent LEAF EV2/EV3 cards allow up to 16 devices to be individually accessed using 16 unique keys, respectively that are stored in the smart cards (and among a variety of manufacturers). LEAF Identity Consortium enables interoperability with encrypted Smart Cards LEAF Memory Model specifies a standard EV2 (EV1 backward compatible) smart card data format and application access protocols that ensure each manufacturer’s devices can interface with a card chip in the same way. Specifically, each card has a “common data structure” based on the LEAF Memory Model, which means that the location of information is arranged on a card chip in a predictable and consistent manner. Each end-user application (for door readers, secure printing, vending, etc.) stored in the card is secured with their own cryptographic key. Member companies adhere to that structure in order to be interoperable with a single credential. There are no license fees or intellectual property rights involved. Keysets The approach involves a LEAF Custom Cryptographic Keyset (LEAF Cc Keysets) owned by the end-user. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of customer-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end-user staying in control and having unlimited interoperability.” WaveLynx Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications by multiple manufacturer’s devices. WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF Enabled. They provide a key management service (for life) to end-users based on LEAF capabilities. End-users “own” the keys and can submit a request to WaveLynx to have us securely share them with any other manufacturer. Sharing a key involves two key custodians from WaveLynx Technologies and the Vendor who is receiving the customer’s keys, each of whom only has access to half of the encrypted key in order to keep it secure. Keys are shared via a “key ceremony”. Combining capabilities The LEAF consortium provides a way for manufacturers to work together to provide an ecosystem of devices that are compatible with a single encrypted smart card without the need to embed proprietary reader modules in their devices or license another manufacturer’s technology, thereby making it possible for them to increase their market share. Working together, independent manufacturers can assemble a group of devices to compete more effectively with larger manufacturers. In effect, they combine their capabilities in order to offer the end-user viable options and to compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve. Although the standard does not currently offer mobile credentials, a common mobile credential standard is currently being discussed and designed by the Consortium.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimise the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customised access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorised entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorisation to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customisation ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Retrofitting modern security to old or protected heritage buildings used to be an installer’s nightmare. Wiring could be complex, with damage to ancient architecture or door hardware a constant risk. Now, wireless access control devices that match the protection and durability of wired technology, have made it straightforward. For a facilities manager, the security remit for any building or space is broadly the same. People and assets must be kept safe. Access to the most sensitive areas should be carefully filtered. Intrusion has to be stopped. Yet, installation, wiring and larger modifications present a unique set of challenges in an older building. Battery-powered access control Battery-powered access control devices can add equivalent features wirelessly, at lower and more predictable cost, because no cabling is required around the door. In a wireless system, locks for doors, cabinets and other openings communicate over-the-air with a network of hubs. These may be placed close to existing mains power sources, minimising disruption to the building fabric. Software makes the access decision, which is communicated back to locks via the hub Software makes the access decision, which is communicated back to locks via the hub. Everything happens almost instantly and wire free. In an old building or structure, choosing to wire for door security opens up not only expense, but also uncertainty. Indeed, when working under old floors and inside walls, which are 100 years or more old, surprises are guaranteed. At the installation stage, big surprises can be very expensive. Wireless access control cylinders Aesthetics is another concern. Wireless access control cylinders, for example, offer durable, certified electronic security paired with a minimal visual impact. At a heritage property, low-profile security solutions are a must. In addition, replacing mechanical locks with wireless electronic door devices reduces the manual workload involved in handling and tracking physical keys — saving time and money for property managers. Retrofitting 21st-century locks to a 16th-century building In updating access control for one school property in Spain, installers faced precisely these challenges. The Colegio Diocesano Santo Domingo in Orihuela is more than just a school. Its historic buildings date back to the 1500s. An on-site museum needs protection from the same access system. This is a heritage site, as well as a place of learning. Hence, the brief for a new access system required minimising disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry. Hence, they must not be damaged. School leaders wanted to avoid disturbance to everyday learning. Wireless locks were the answer. Wireless locks installed “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” said the school’s IT Manager, Francisco Fernández Soriano. Francisco adds, “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time. This increases security for children and for staff because no unauthorised people can enter the school.” SMARTair system Installation of the school’s new SMARTair system demanded little work Installation of the school’s new SMARTair system demanded little work. Some doors are 500 years old, so major alterations were not possible. ASSA ABLOY’s SMARTair door devices are easily fitted without drilling or wires. To install a SMARTair cylinder, for example, a professional simply replaces the existing mechanical cylinder with the battery-powered SMARTair device. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Flexibility for school and care home security “At the Vejle Friskole in Denmark, key management had been eating up a very long time, approximately 5 hours a week,” explains Henrik Kækel, the school’s Technical Service Officer. Now, mechanical keys have also been replaced by a wireless access control system. More than 80 doors and cabinets around the school are secured with SMARTair locks. At a historic property like Vejle Friskole, the customer required that devices were easy and unobtrusive to retrofit. SMARTair locks installed at Vejle Friskole “It was really bad [before] because we had big problems with keys that were lost,” said Henrik Kækel, adding “There was a lot of work on keying in and handing out.” Today, Vejle Friskole staff spends around 5 minutes a week managing their access system.” Henrik adds, “It's incredibly easy to figure out and it takes 1 minute to code a student.” Even managing the leasing of school buildings for non-school events is simple and secure. Facilities staff issue digital credentials for the duration of an event, then cancel them immediately afterward via the software, with no concerns that someone may have copied a physical key. Electronic locking system Pamplona’s Casa de la Misericordia, in Spain, also switched their century-old building from mechanical to electronic locking Pamplona’s Casa de la Misericordia, in Spain, also switched their century-old building from mechanical to electronic locking. To meet the day-to-day care needs of over 500 residents, they had a specific set of demands for a new access system. Real-time control over the premises was essential. “In a residence like ours it is critical to have real-time management that allows us to interact with a door at any time,” explains Ernesto Serra, Facility Manager at the Casa de la Misericordia. Advanced wireless technology The system also needed to be flexible and expandable, so it could be installed in two phases. Advanced wireless technology suited to retrofitting in an old building was another must-have as this 1930s building has large doors and walls up to 1 m thick. “A wireless solution that allows us to install access control without wiring up the buildings is a big advantage, the system has adapted to our present and future needs,” said Ernesto Serra.
It can be a challenge to find an ideal electronic lock for every opening, and then to manage them all within a single, integrated solution. All too often, security procurement involves difficult compromises: A system that works perfectly for one door or department leaves another where the same solution doesn’t quite meet its needs. Range of access control solutions A newly built commercial premises in Banská Bystrica, Slovakia, power-tool manufacturer Makita stocks and distributes batteries, and runs wholesale supply logistics. They searched for a single, intuitive system to control every access point — now and in the future. Yet, as at many other sensitive commercial sites, not every door or opening is the same. Makita needed an access control solution with a comprehensive range of devices — to secure escape doors, entrances, interior doors, and more. “The diversity of access control devices available for the Incedo™ system was a decisive factor,” says Makita’s Richard Cimerman. Device management from a single system Makita Slovakia has a totally flexible, futureproof Incedo access solution designed to grow with their business ASSA ABLOY Opening Solutions’ Incedoä platform connects security software and hardware within a single, seamless ecosystem. The range of Incedo-enabled devices and award-winning door hardware convinced Makita — for this site and for future premises and refurbishments around Slovakia. The new Banská Bystrica facility has an Incedo system controlling access through main entrances, fire doors, and emergency exit doors, as well as interior doors fitted with Aperio® wireless electronic escutcheons. User-friendly Incedo Business software manages and monitors everything together from a single control panel. It filters and restricts employee and visitor access to specific areas of the plant. Secure key credentials The modular, platform-based Incedo solution incorporates wired and wireless door locking devices from across the ASSA ABLOY range; card, token and secure mobile key credentials that can be used interchangeably; and a growing range of third-party security solutions. Should Makita upgrade to Incedo Plus management in the future, their own system could manage CCTV and alarms alongside access and door entry. When security demands change at Makita Banská Bystrica, their Incedo system can adapt. With Incedo software, Makita can switch between local and Cloud managed solutions whenever they choose. System size is scalable up or down, anytime and on-demand, as security needs or space usage change. Makita Slovakia has a totally flexible, futureproof Incedo access solution designed to grow with their business.
Schools present unique challenges for security and access control. But what about a school that is also a heritage site of exceptional value? The Colegio Diocesano Santo Domingo in Orihuela, Spain, is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning — with a museum that requires the protection of the same access system. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: They must not be damaged. Wire-free electronic locks were the obvious answer. A wireless solution SMARTair® wireless locking devices now control access through 300 doors around the school. Electronic escutcheons, knob cylinders, and wall readers (including lifts) are connected to intuitive SMARTair software by a network of 38 HUBs. The school chose SMARTair Wireless Online management for their new keyless access system. This powerful management option enables real-time control of access to and around the site, even if the school’s data network is down. Automated emails inform security staff of any incidents, keeping students, teachers, equipment, and precious heritage safe. Real-time key management “The main benefit is the ease of real-time key management — from any place and at any time — via the wireless online management system,” says the school’s IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff because no unauthorised people can enter the school.” In addition to the main entrances and classrooms, access to private spaces is constantly monitored “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library, and the IT room is constantly monitored.” Scalable modular system Installation of the school’s SMARTair system required minimal work. Some doors date to the 16th century, so major alterations were not possible. “The system was installed without a hitch and also without any disruption to classes,” he adds. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, the school’s “SMARTair Phase II” is already under discussion.
Adani Group is a multi-national conglomerate headquartered in Ahmedabad, Gujarat, India and has a diversified portfolio of businesses, including resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with Mundra being the country's largest commercial port. With multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders across 25+ business units. Managing staff attendance and diverse shifts Adani Group is widely engaged in multiple business units and ports with 50,000+ workers under 900+ contractors, employed at various locations. Maintaining and managing entire attendance, diverse shifts and leave policies for the various locations, and numerous workers at a central place was critical for them. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management. To provide approved and appropriate induction of each worker at a defined level, monitor the progress status of each work order and its segregation based on reports were quite challenging. Report generation to eliminate the fraudulent and erroneous payment of wages at contractors' end had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. COSEC Contract Workers Management COSEC Contract Workers Management offers centralised attendance management solution for various branches After comprehensive discussion regarding problems and requirements, Matrix offered COSEC Contract Workers Management solution for their 50,000+ workers, who have been employed under 900+ contractors, spread across four locations in India. COSEC Contract Workers Management offers centralised attendance management solution for various branches, spread across multiple locations, which automates all processes, right from recording entries and exits up to processing salaries. Enrollment of the worker credentials COSEC Contract Workers Management facilitates enrollment of the worker credentials, along with a photograph, documents, and induction details. It helps contractors to manage workers efficiently, using contractors' self-service portal. The solution provides multiple connectivity possibilities via Ethernet, Wi-Fi and mobile broadband. It eases the tracking of work order progress. It offers seamless integration with SAP using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations via email and SMS. Results: Enhanced security with effective worker's enrollment process abiding by various induction levels. Increase in productivity of admin by 20%. Easy decision making due to the generation of customised reports. Smooth and effective monitoring of work orders. Improved security with centralised control and monitoring - Reduced time spent by the security department. Error-free man hours' computation for quick & effective wages' calculation. Minimised manual interventions. Matrix products and solutions Offered: COSEC CENTRA LE - Application Software Platform expandable up to one million users. COSEC LE CWM - Contract Workers Management Module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF Card-based Door Controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare Card and NFC-based Door Controller. COSEC VEGA FAX - Fingerprint and RF Card-based Premium Door Controller with Touch Sense LCD, IP65, Wi-Fi, PoE. COSEC DOOR FOP - Fingerprint and RF Card-based Premium Door Controller with LCD and Keypad.
The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential, for both internal and external users. The museums needed a system that will be able to cope easily with changes, site extensions, and two-site operation, and a solution that would remove the need to change all cylinders when an employee loses a key. eCLIQ locking cylinders installed Now, the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders, across the two sites. ASSA ABLOY’s eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights, and schedules for external providers and contractors. A unified system manages access to both locations. Every authorised key holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorised, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Designed for museum security Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers, along with their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. eCLIQ locking system Fitting eCLIQ locking system was a simple and wire-free task, and the museum staff, performed the installation themselves. One training session, with the admin software, was sufficient, to put them at ease with their new system. Looking after eCLIQ components is also easy, an integrated lubricant reservoir ensures cylinders, don’t require maintenance for up to 200,000 cycles. AES encryption, rapid processing and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. Easy and effective access control “I am very happy with the eCLIQ solution,” said M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums, adding “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council, to show the effectiveness and simplicity of the eCLIQ solution.” Guyot adds, “Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
Ways to manage visitors and improve communications, while keeping doors to the Congregation Beth Jacob’s sanctuary and school locked. Aiphone IS Series video intercom Aiphone IS Series video intercom mounted just outside the main entry allows visitors to buzz one of four master stations. “Emergency communications and procedures are now embedded in our daily operations,” said Greg Sterling, Past President of the Congregation Beth Jacob. Enhancing safety against active shooters In recent years, houses of worship have become an all‑too‑common target for active shooters, burglars and vandals The Congregation Beth Jacob provides a house of worship, pre-school and attached K-7 religious school for the Redwood City, California’s Jewish community, in the heart of the famed Silicon Valley. In recent years, houses of worship have become an all‑too‑common target for active shooters, burglars, vandals and a host of other criminals. Founded in 1930, Congregation Beth Jacob has a rich history as the first Jewish institution built between San Francisco and San Jose. Since an earlier sanctuary was destroyed by a suspected arsonist in 1979, Congregation Beth Jacob has taken security of its members, students and employees very seriously and regularly updates its systems and procedures. Managing visitors and improving communications Congregation Beth Jacob’s security integrator, Oakland-based HighCom Security Services, was asked for ways to manage visitors and improve communications, while keeping doors to the sanctuary and school locked throughout the day. Requirements for the Congregation Beth Jacob included: Sanctuary employees had to be able to remotely see and speak with visitors before opening an exterior door. Employees needed to be able to easily communicate between the 12 classrooms and offices in the sanctuary and school. The solution had to be easy for employees, congregation members and visitors to use. “Emergency communications and procedures are now embedded in our daily operations,” said Greg Sterling, Past President of Congregation Beth Jacob. Fences and gates installed Fences and gates now guide visitors from the street to a rear parking lot and a double-door entry to the main facility. This and all other exterior doors are kept locked. An Aiphone IS Series video intercom is mounted just outside the main entry, allowing visitors to buzz one of the four master stations located on the desks of the Executive Director and Receptionists and in the common areas of the main and school offices. Colour LCD monitors on the IS Series master stations allow office staff to see and speak with visitors, before remotely unlocking the door. Keypads at the door let employees open the door by entering a code. Wall-mount audio intercoms Aiphone speakers and horns were added to share emergency messages in the school play area Wall-mount audio intercoms have been provided in each classroom. Teachers can communicate hands-free with the main or school offices, and other classrooms. They can also choose to use the intercom’s handset for more private conversations. Before the intercoms were installed, teachers had to leave the classroom and walk to the office for help. Aiphone speakers and horns were added to share emergency messages in the school play area, two patios, front entry, sanctuary, social hall and main dining room. Surveillance cameras installed Surveillance cameras set to view the parking lot, school entry and the street fronting Congregation Beth Jacob. Sanctuary staff can view live video from monitors in the facility’s main and school offices. Panic buttons were installed in each classroom, the social hall and kitchen. Pushing a button generates a code phrase intended to start an immediate facility lockdown without overly frightening the students.
Round table discussion
Security systems are vital to any company. Nowadays, however, they can also provide additional benefits to any enterprise beyond protecting people, assets and facilities. Specifically, systems that were previously focused on security can now be leveraged in new ways to benefit the broader enterprise. When this happens, the security department transitions from a ‘cost centre’ to a repository of data that can benefit the whole company, and even contribute to the bottom line. We asked this week’s Expert Panel Roundtable: How can ‘security’ systems benefit the larger mission of an enterprise?
The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?