Sargent and Greenleaf (S&G), renowned manufacturer of high-quality mechanical and electronic locks, has announced the release of its Digital Vault Lock solution. Through a secure online interface and user-friendly software, this static code, electronic time lock allows for increased flexibility and security for convenient vault access. Digital Vault Lock Combining an attack-resistant lock case and enhanced features to protect against a variety of threats – vibration, bouncing a...
Leading lock specialist Pickersgill-Kaye (Kaye), a brand under ASSA ABLOY’s High Security & Safety Group, is encouraging those responsible for critical infrastructure sites to consider servicing contracts to help minimise the risk of costly breaches of security. Perimeter protection With terrorism posing a serious threat to the UK’s interests, perimeter fencing, doors and their locks are the first line of defence against potential intruders at installations such as chemical and...
At ISC West 2019 (booth #13109), Sielox LLC is showcasing versatile new enhancements to its Pinnacle v.10.4 Access Control Platform. New functionality allows users to seamlessly access the features of Allegion’s Schlage Engage Wi-Fi locks enabling them to be easily integrated with Pinnacle Schlage Wi-Fi access platform feature. Additionally, Allegion Schlage wireless locks can now receive firmware updates through Sielox’s 1700 controller using Allegion ONR technology, which can save...
Sielox LLC is demonstrating its portfolio of layered security systems at ISC West 2019 in booth #13109, which address the complexity of providing the right combination of features and configurations to best accommodate specific applications and needs. Featured solutions include: the new release of Pinnacle v.10.4 access control solution; Sielox CLASS crisis lockdown alert status system; AnyWare browser-based access control platform; and the company’s highly-touted 1700 Intelligent Controll...
Supra, a renowned global provider of mobile credentialing and entry management systems, has introduced the TRAC-Guard padlock for authorised, secure access to virtually any remote site. Ideal for installations in telecom or utility stations, storage units or other locking points, this Bluetooth-enabled padlock adds convenience and security in place of traditional mechanical or combination locks. TRAC-Guard padlock The versatile TRAC-Guard padlock comes ready for use and fits seamlessly i...
ASSA ABLOY Door Hardware & Access Control is proud to announce that it will be exhibiting at the first ever The Security Event 2019, showcasing its latest security and integrated access control technology solutions. Taking place at the NEC in Birmingham from 9-11 April 2019, the show is a major new exhibition for the commercial and residential security market and is set to welcome more than 6,000 visitors. ARX security system ASSA ABLOY Door Hardware & Access Control will be available...
The ABUS 440A U-lock adds an extra layer of security to an already-solid bicycle lock with ABUS' proven 100db alarm system featuring the 3D Position Detection System. The core of the lock is ABUS' reliable steel lock body and 12mm round shackle, which is tough enough to deter theft on its own. Add in the 100db alarm (as loud as a circular saw) and it's enough to scare away most thieves. Intelligent alarm system The intelligent alarm system is powered by long-lasting coin cell batteries for ease of use. Small bumps trigger warning beeps, while continued movement triggers the full ear-splitting alarm. The lock is available in a pocket-sized ‘mini’ (6.3") shackle version or the standard (9") size. Both sizes come with the Tex USH bracket, featuring a silicone impregnated strap, which makes installation on any tube shape a breeze. MSRP: $89.99 for the mini, $99.99 for standard.
SMARTair wireless access control system is designed for schools. With intuitive management software, credentials and battery-powered locks in many configurations, it is easy to install and convenient for non-technical staff to use. The system can handle a large number of users and logs every interaction, so incidents are investigated efficiently. The system is more cost-efficient to run than wired access control or traditional mechanical security. Doors require minimal alterations when SMARTair battery-powered devices are fitted, because there is no wiring around the door. Real-time online functionality Accessible from a PC, tablet or mobile device, the software puts site managers in total control A lost card is much cheaper and less hassle to replace than any physical key. There’s no need to change the locks, merely to delete a card’s authorisation from the system. When needs change, it’s easy to extend coverage to more locks or combine offline and real-time online functionality within the same installation. Accessible from a PC, tablet or mobile device, the software puts site managers in total control. They check door status at a glance. Profiles can be created for different user groups — teachers, cleaners and office managers, for example — and state tables allow doors to switch between open access and card/PIN control at different times of day. It’s equally easy to manage more than one installation from a single interface — for example, if an administrator manages multiple sites or federated schools. High-traffic environments Features can be tailored to every building or door, as required. For example, opening times can be longer for disabled users or privacy overrides enabled at selected doors. Thanks to reliable audit capabilities, SMARTair software can double as your automated roll-call system. SMARTair devices fit many kinds of opening. Battery-powered escutcheons are a robust solution for most doors — and offer an optional PINpad for extra security. SMARTair wall readers protect higher-security openings and high-traffic environments, like exterior doors and parking areas. Wall readers also suit doors fitted with a fire alarm — science labs, for example. And SMARTair secures more than just doors. For lockers in communal areas or changing rooms, SMARTair cabinet locks with integrated RFID readers work within the same system. Key management It was really bad before because we had big problems with keys that were lost" So, a programmable card that unlocks the main door can double as a locker key. The same credential can make payments in the canteen. And so on. In Denmark, Vejle Friskole saved a huge amount of time switching to SMARTair. Key management was eating up “a very long time, approximately 5 hours a week,” explains Henrik Kækel, the school’s Technical Service Officer. Now mechanical keys have been replaced, and over 80 doors and cabinets are secured by SMARTair devices. SMARTair is easy to manage. "It was really bad before because we had big problems with keys that were lost,” says Henrik Kækel. “There was a lot of work in key administration.” Today, Vejle Friskole staff spend around 5 minutes a week managing their access system. “It's incredibly easy to figure out... it takes 1 minute to code a student,” Henrik adds. Out-of-hours access At Lycée Kreisker, in France, school managers faced a similar dilemma. How to replace an existing, stressful solution which involved managing two separate key systems? Security was paramount: any access system must ensure the safety of 2,500 staff and students and meet France’s tough school security regulations. SMARTair readers now control access through the main gate — every school’s critical first line of defence. Classrooms are locked with wireless escutcheons. Non-technical, in-house staff carry out basic administration via the easy-to-use SMARTair software. System configuration is affordably outsourced. So, for example, doors can be pre-programmed to remain open between 9am and 5pm but require a credential for out-of-hours access.
PEAKnx, manufacturer of solutions for home and building automation from Darmstadt, Germany, has partnered with Bird Home Automation, the Berlin-based IP video door intercom manufacturer that develops innovative door communication technologies under the brand name “DoorBird”. This partnership brings numerous advantages for KNX users: The DoorBird door station can be easily and quickly connected to the PEAKnx Controlmini and Controlpro touch panels allowing the user to see and speak with the visitor through the PEAKnx touch panel. Integration of DoorBird and PEAKnx system Sascha Keller, CEO of Bird Home Automation, was the one who initiated the partnership: "It quickly became clear to me that there was a great potential to combine our know-how. The cooperation has developed very positively and quickly from the very beginning. Thanks to our open API, we were able to integrate DoorBird into the PEAKnx system within a very short time which allows us now to offer our customers even greater flexibility when it comes to their smart home." PEAKnx and DoorBird are pursuing a common goal of manufacturing the most innovative smart home technology PEAKnx and DoorBird are pursuing a common goal of manufacturing the most innovative smart home technology. Gerald Palmsteiner, Vice President Operations COO at PEAKnx: "I heard about DoorBird a few years ago. It attracted my attention at the time because as far as I knew, it was the first manufacturer of IP door stations that made door opening via smartphone possible. That was impressive. The company is very successful, and we are happy to start this cooperation". IP door stations and KNX panels Installing and setting up IP door stations and KNX panels is seamless and smooth. To ensure an excellent connection between DoorBird and PEAKnx panels, the door station camera can be integrated into YOUVI, the PEAKnx visualisation software, via a RTSP stream, a network protocol that controls the transmission of audiovisual data. The touch panel and the IP door intercom communicate via a SIP gateway. With the installation of X-Lite software from CounterPath on the KNX panel, the connection between the two components is completed. "Shortly after DoorBird approached us, it was clear that working together is a great idea," says Palmsteiner. "We look forward to continuing working together very productively and are currently developing an interface between YOUVI and the SIP gateway that will make the use of the X-Lite software redundant.”
Open Options, global provider of open platform access control solutions, will showcase their DNA Fusion access control platform and its powerful components at ISC West 2019 in Las Vegas. DNA Fusion platform Considered the largest security industry trade show in North America, ISC West hosts over 30,000 security professionals and showcases a wide range of products and solutions from hundreds of industry manufacturers. ISC West attendees are invited to visit Open Options at booth #2103 to experience the latest features in the DNA Fusion platform, including FlexAPI, Open Options’ application programming interface, OpenDX database exchange software, and DNA Fusion’s Mobile and Web applications. Attendees will also be able to learn more about DNA Fusion’s numerous partnerships and integrated solutions with industry leaders such as Milestone, Allegion, ASSA ABLOY, Traka, and many more. IT-centric access control solutions We’re excited that ISC West 2019 will be our platform to announce the latest additions to our extensive partnership portfolio" “Our ability to provide the most IT-centric access control solution on the market is enhanced by unified partnerships and integrations with other leaders in the security industry, and we’re excited that ISC West 2019 will be our platform to announce the latest additions to our extensive partnership portfolio,” said Open Options’ vice president of sales and business development, Ben Vestal. “Each new integration adds robust functionality that enhances the DNA Fusion user experience and provides even more opportunities to supply our customers with a best-of-breed solution.” Product display Some of Open Options’ products and technology integrations that will be on display at ISC West 2019 include: NSC-200 IP-based door module Von Duprin RU/RM wireless exit device Farpointe Conekt Bluetooth reader eyeLock iris reader New destination control integrations Traka key and asset management integration Vingtor-Stentofon AlphaCom substation ASSA ABLOY Aperio Hub and lock Schlage LE series wireless mortise lock ISONAS Pure IP RC-04 reader-controller
UNION has launched CodeGUARD 5, the first access control device available to meet the new BS 8607 grade 5 standards. High-security push button locks The recently introduced grade 5 standards provide the most stringent level of security and access control for mechanical push button locks to date. Providing an extremely strong level of attack resistance, grade 5 was introduced because of the need for a high-security push button lock, and UNION is the first manufacturer to answer this need. Grade 4 – previously the highest level – could only meet the required standard with the help of an additional integral locking unit. In contrast, a grade 5 device such as CodeGUARD 5 delivers a ‘one-stop’ security and access control solution, where the latch and lock are integrated and tested together. As a result, CodeGUARD 5 offers users an automatic deadlocking unit, whereas a grade 4 product is reliant on key holders to lock a door. CodeGUARD 5 access control solution Featuring BSI Kitemark certification, CodeGUARD 5 provides access control and security in a single package Featuring BSI Kitemark certification, CodeGUARD 5 provides access control and security in a single package, delivering assured protection for securing people, assets and data, while offering the convenience of access control without the need for wiring. One of CodeGUARD 5’s key features is its 20mm deadlocking latch. This means it will not succumb to the kind of physical attacks that mechanical push button locks typically undergo, such as a crowbar being placed between a frame and lock to force a door open. Mechanical push button lock system Furthermore, the mechanical push button lock system is secured through more than 2,000 code combinations. Unlike its competitors, the unit is also always supplied to customers with a passcode different to the standard factory settings, for optimal security. Providing extremely high corrosion resistance, the new CodeGUARD 5 solution is also ideal for perimeter security applications. The system has undergone a salt spray test for 240 hours to demonstrate its capabilities in highly corrosive environments, with its aesthetics and performance unaffected over time. Fire doors CodeGUARD 5 is offered with universal handing and fixings, so the system is easy to order and specify too Suitable for 30- and 60-minute timber fire doors, and 240-minute metal fire doors, CodeGUARD 5 is offered with universal handing and fixings, so the system is easy to order and specify too. This is all backed by a three-year guarantee, offering the kind of high-quality product assurance that customers have come to expect from UNION. Karen Hubbard, Product Manager at UNION, said: “Whatever the application, CodeGUARD 5 delivers unmatched strength and durability. Building on our reputation and heritage, which dates back to 1840, CodeGUARD 5 is the toughest push button lock available, meeting the latest grade 5 standards for BS 8607.” People and asset protection Karen adds, “The solution brings together security and access control as has never been seen before – protecting people and assets even under determined and prolonged attack. CodeGUARD 5 comes with more than 2,000 code combinations, offering a huge advantage over many competitor products where pre-set factory codes have been a real weakness in the past. This is all complemented with a smart and stylish finish, with CodeGUARD 5 featuring an ergonomically-designed handle that would suit any modern environment." “There is no other mechanical push button lock available that comes close in terms of strength and robustness. As such, CodeGUARD 5 is ready to set a new benchmark for mechanical access control.”
Security expert Abloy UK highlights the importance of physical security to protect against digital data breaches, following the recent approval of a new standard that offers the ability to add tangible authentication to secure online accounts. WebAuthn, which has now been approved by the World Wide Web Consortium (W3C), standardises an interface for secure authentication of users in web-based applications and services. An extension implemented in this standard is the Credential Management API, which allows users to authenticate using ‘something’ other than a password, such as a gesture, biometric reading or a key. Security against cyber-attacks Most of the major browsers have already implemented support for this standard in anticipation of its approval - something that Abloy has welcomed in line with its own view that having something physical to rely on as well as electronics is inherently more secure. If you can get close enough to the individual and get enough data you can fill in the gaps and recreate the identity" Pip Courcoux, Sales and Product Manager - CLIQ Systems at Abloy UK, explained: “In many ways, security against cyber-attacks is similar to security against physical attack. For example, a stolen password is a stolen credential, a phishing attack is similar to wireless credential cloning.” “If you can get close enough to the individual and get enough data you can fill in the gaps and recreate the identity. Although passwords have become more complex and harder to duplicate, they may just not be good enough alone.” Time-based access With this in mind, Abloy offers PROTEC2 CLIQ, a state-of-the-art locking solution based on detainer disc cylinders and electronic identification. PROTEC2 CLIQ provides mechanical security and allows for flexible control of keys and access rights, and complete audit trails via a web-based management system. This system’s mechanical key has been developed over generations to be one of the most secure mechanical platforms in the world. Combining this with the CLIQ microelectronics platform introduces an additional layer of security and flexibility through advanced encryption and time-based access principles. Pip adds: “As the big tech companies continue to develop Artificial Intelligence and Quantum computer chips, the digital world will face new threats, so passwords and encryptions could be broken in milliseconds.” “But when electronic security fails, Abloy customers will sleep soundly knowing they are ahead of the curve, having chosen a balanced approach to their security where mechanical and digital work in harmony.”
The basic principles of access control are well established: only authorised people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the right sort of access control for your organisation? It makes sense to assess what is desirable against what is affordable or available in the electronic access control market today. Asking yourself these 5 questions will lead to a wise investment in the right technology: Wireless locks like Aperio work seamlessly with existing systems from over 100 different access control providersDo you want to extend your existing system, or begin from scratch? You are not stuck with locks chosen by a previous management team. Security needs change. Wireless locks like Aperio, for example, work seamlessly with existing systems from over 100 different access control providers, integrated online or offline. You will save time and money extending your current system with a technology like Aperio and users can continue with their existing credentials. Going forward, it makes sense to choose locks built using open architecture, for added flexibility and to future-proof your next investment. Who are the site users and what kind of credentials suit their needs? In many industries, access to premises is required by permanent staff and short-term contractors: your access system needs to be flexible. Different systems offer credentials stored on cards and fobs, or on programmable, battery-powered keys. For example, the new Openow app for SMARTair wireless locking converts a user’s smartphone into a virtual key. You issue and revoke user keys using the intuitive software, an efficient, flexible mobile management solution. What is the structure of the site (or sites) you protect? You will need different locks for high-traffic and low-traffic doors, indoor and outdoor use. Almost everywhere, wireless locks are much easier to install and to maintain than traditional wired magnetic locks — and more cost-effective to run. Certified wireless security locks provide extra protection for sensitive areas needing stringent standards. If you have a mobile workforce or manage dispersed sites, consider the credential management practicalities. For example, programmable keys that are easy to update with a Bluetooth-enabled smartphone app — like ASSA ABLOY’s CLIQ Connect solution — will save your staff time and money. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions Do you want to secure more than just doors? Some wireless systems have locks for cabinets, machines, windows and even server racks (handy if you want an extra layer of control over co-located servers). There will be workflow advantages in monitoring these ‘non-doors’ — medicine stores, for example, or car parks or lifts — from the same admin interface as your doors. Site users will appreciate the convenience of carrying one credential for every access need. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions. For example, CLIQ mechatronic padlocks are currently deployed outdoors at utility sites in Scandinavia and supermarkets in East Africa. Do you need real-time capabilities? Choose an Online system and you can manage and amend access control doors at any time and from anywhere, using the admin software. You can monitor sensitive areas like medicine stores remotely and in real time, and can revoke access rights if a user credential gets lost. In an emergency, remote locking or unlocking of an entrance could be critical. Aperio wireless locks, for example, are integrated with online electronic access and real-time monitoring systems in hospitals, manufacturing plants and student halls of residence. With some systems, including SMARTair, you can combine ‘Update on Card’ and Online updating for different doors within the same installation. The CLIQ Connect app and programmable keys make real-time control over remote sites or teams possible. Wireless access control offers a compelling mix of audit compliance, easy installation, cost efficiency, and seamless integration. It makes life easier for security managers, and is deployed in premises as diverse as power plants and co-working spaces; museums and care homes; banks, schools and skyscrapers.
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable entry management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorised individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorised access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable hardware components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorised employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing security needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorisations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorisations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion alarm systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customised intrusion systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customise the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video management system A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full alarm and event management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analysing video content over large distances Intelligent Video Analytics have the unique capability of analysing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
With the ever-growing availability of video data thanks to the low cost of high-resolution video cameras and storage, artificial intelligence (AI) and deep learning analytics now have become a necessity for the physical security industry, including access control and intrusion detection. Minimising human error and false positives are the key motivations for applying AI technologies in the security industry. What is artificial intelligence? Artificial intelligence is the ability of machines to learn from experience using a multi-layer neural network, which mimics the human brain, in order to recognise items and patterns and make decisions without human interference. The human brain is estimated to have 86 billion neurons; in comparison, the newest Nvidia GPU Volta has 21 billion transistors (the equivalence of a neuron), which offers the performance of hundreds of CPUs for deep learning.AI can learn continuously 24 hours per day every day, constantly acquiring, retaining and improving its knowledge In addition, unlike humans, AI can learn continuously 24 hours per day every day, constantly acquiring, retaining and improving its knowledge. With such enormous processing power, machines using Nvidia GPU and similar chips can now distinguish faces, animals, vehicles, languages, parts of speech, etc. Depending on the required complexity, level of details, acceptable error margin, and learning data quality, AI can learn new objects within as fast as a few seconds using Spiking Neural Network (SNN) to a few weeks using Convolution Neural Network (CNN). While both SNN and CNN offer advantages and drawbacks, they outperform tradition security systems without AI in terms of efficiency and accuracy. According to the research reports of MarketsandMarkets, the market size of perimeter intrusion detection systems is projected to increase from 4.12 billion USD in 2016 to 5.82 billion USD in 2021 at a Compound Annual Growth Rate (CAGR) of 7.1%. Meanwhile, the predicted market of AI in security (both cyber security and physical security) will grow from 3.92 billion USD in 2017 to 34.81 billion USD by 2025, i.e., with an impressive CAGR of 31.38%. Legacy perimeter intrusion detection systems Legacy perimeter intrusion detection systems (PIDSs) are typically set up with the following considerations: Geographical conditions: landscape, flora, fauna, climate (sunrise, sunset, weather conditions, etc.), whether there are undulations in the terrain that would block the field of view of cameras Presence or lack of other layers of physical protection or barriers Integration with other systems in the security network: camera, storage, other defensive lines (door, lock, alarm, etc.) Types of alarm triggers and responses System complexity: intrusion detection with various types of sensors, e.g., microwave sensors, radar sensors, vibration sensors, acoustic sensors, etc. Length of deployment Local regulations: privacy protection, whether the cameras/sensors must be visible/hidden/buried, etc., electromagnetic interferences that may affect other systems such as oil rigs or power plants Human involvement: on-site personnel arrangement, human monitoring, human action in response to alarms AI object detection can easily distinguish different types of people and objects Pain points and benefits of AI The conditions listed above correspond to certain requirements of an intrusion detection systems: minimal false alarm, easy setup and maintenance, easy integration, and stable performance.AI by nature is designed to learn, adapt itself and evolve to work in multiple conditions: it should be integrated with existing video recording systems Minimal false alarms: False alarms lead to increased cost and inefficiency but are the main problem of PIDSs without AI technology, where animals, trees, shadows, and weather conditions may trigger the sensors. AI object detection can easily distinguish different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Therefore, the amount of false alarms can be reduced by 70% to orders of magnitude. Easy setup and maintenance: Legacy PIDSs without AI must account for terrain, line of sight of cameras, sensor locations; any changes to the system would require manual effort to recalculate such factors and may disturb other components in the system. In contrast, AI PIDSs enable the system administrator to access the entire system or individual cameras from the control room, configure the region and object of interest in the field of view of cameras within minutes, and adjust with ease as often as necessary. Computing knowledge and even specific security training are not required to set up a secured PIDS with AI because AI PIDS is designed to relieve humans from knowing the inner working of machines. Easy integration with complementary technologies: Legacy PIDS without AI relies on physical technology, which are often proprietary and require complete overhaul of systems to function smoothly. On the other hand, AI by nature is designed to learn, adapt itself and evolve to work in multiple conditions, so AI PIDS is easily integrated with existing video recording (camera) and storage (NVR) systems. AI also eliminates the need for physical wireless or fiber-based sensors; instead, it functions based on the videos captured by cameras. Furthermore, AI enables easy and instantaneous combinations of multiple layers of defense, e.g., automatic triggering of door lock, camera movement focusing and access control as soon as a specified object is detected in the region of interest, all set up with a click of a button. Stable performance and durability: Legacy PIDSs without AI requires complicated setup with multiple components in order to increase detection accuracy. More components mean a higher probability of malfunction in the system, including exposure to damages (e.g., sensors can be destroyed) and delay in detection, while human monitoring is inconsistent due to human fatigue (studies have shown that a person can concentrate in mundane tasks for only up to 20 minutes, and the attention span decreases even more rapidly when humans are faced with multiple items at once, e.g., multiple camera monitoring screens). AI significantly reduces, if not completely eliminates the need for human involvement in the intrusion detection system once it is set up. In addition, AI reduces the risk of system malfunction by simplifying the hardware sensors needed. Minimising human error and false positives are the key motivations for applying AI technologies in the security industry Additional benefits of AI in intrusion detection Artificial Intelligence is undeniably reshaping every business and weaving into every aspect of daily lifeMaximal detection capability: The most advanced AI intrusion detection system today provides an all-in-one solution to distinguish any combination of alarm-triggering criteria beyond perimeter protection. Using AI, the system administrator can configure as many zones with different settings and object of interests as necessary, which include detections for specific colors or attributes (e.g., person not wearing the required uniform or carrying food/drink), numbers and dwell time (e.g., group of more than 5 people loitering), or movements (e.g., cars moving faster than the speed limit). In addition, AI can accurately pinpoint the location of event occurrence by displaying the camera that records the event in near real time, i.e., with few-second delays. Lower security operation cost: By minimising the number of false positives and human involvement while maximising ease of use and stability, AI intrusion detection systems significantly decrease the total cost of ownership. Companies can reduce the large security personnel overhead and cost of complicated and expensive legacy PIDSs systems. McKinsey Global report in June 2017 shows that proactive AI adopters can realize up to 15% increase in profit margin across various industries. Artificial Intelligence is undeniably reshaping every business and weaving into every aspect of daily life. In security, legacy systems are giving way to AI-based systems, and the first enterprises to adopt AI-based systems will soon, if not immediately, benefit from such investment. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, New York, would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into smart locks and building automation. This year, ASSA ABLOY is marking the 175th anniversary of the Yale brand. Global home security brand “People all over the world trust the brand to protect what they love most in their homes,” says Kate Clark, Managing Director of Yale EMEA at ASSA ABLOY. Although Yale has a successful commercial sector business in the United States, in the rest of the world Yale is a residential brand. The Yale brand is well known in 130 countries from Australia to the Czech Republic to Colombia, and is popular in Africa, too. In the EMEA (Europe, Middle East and Africa) market alone, Yale has around 20,000 products; that’s without counting products sold in the Asia-Pacific and Americas regions. Yale is familiar as a generic term for “lock” in some areas and is one of the largest home security brands in the world. Expansion into digital locks Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand “I think we stand for safety, quality and reliability, and that hasn’t changed,” says Clark. “It’s as important now as ever. We have tried to pioneer new technology in the industry, new innovations. The rate of acceleration has increased, and there are so many technologies we have to understand and work with.” Growing beyond its heritage in mechanical locking systems, Yale is now expanding into digital locks that can protect homes with a high level of security synonymous with the Yale brand. The current selection of locks includes partnerships with tech brands such as Nest Labs (Google) and Alexa (Amazon). There is a rapid acceleration of growth in the electro-mechanical lock market. But even as the focus expands to smart locks and partnerships with tech companies, Yale continues to dedicate time and resources to the design of their core mechanical products. Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand. Yale padlocks and bike locks also keep the name top-of-mind. There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. Beyond mechanical locks and PIN codes “It’s important for people to know that we have been around a long time, and we want to celebrate that,” says Clark. “It’s a fantastic story around the brand and what we have achieved. Internally we have a lot of people doing a lot of great things with the brand. We inspire people working with the brand and show them that this is the pedigree, and it should be cherished. We are also raising awareness among younger people, so they know that we are still relevant.” We have an obligation to show people that the new technologies are just as secure as mechanical locks" There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. “We have to take people on a journey,” says Clark. “We have an obligation to show them that the new technologies are just as secure as mechanical locks. If we eliminate PIN codes, we have to do it in a secure and safe way. Then suddenly access to your home can be made available by a company you trust.” Smart home security “We have a responsibility to do our best job with the new technology – it’s wonderful, but it needs to be used correctly,” says Clark. “I personally feel a responsibility to do that in the right way.” For example, in working with Amazon and Alexa to remotely authorise the delivery of a parcel to a home, concerns of security must be weighed carefully along with issues of convenience. “It’s important that we get the balance right,” says Clark. “We need to know the right person is giving the right voice command to lock a lock. We have to be true to our core as ‘security first.’” Will Yale be here another 175 years? Clark says she doesn’t expect to be around to find out but will do her best to preserve and promote the brand until she hands it off to a new caretaker.
Security Essen 2018, held in Messe Essen, Germany, promised attendees a newly modernised trade show with a simplified layout and more interactive experience. Compared to previous years, halls were reorganised by technology area, with aisles laid out to make more direct pathways for attendees. The fair welcomed 950 exhibitors and more than 36,000 trade visitors from the global security market. Several manufacturers mentioned that footfall had been lighter than expected, but that the show had delivered on its promise to welcome more international visitors, in particular from the Middle East region. Exhibitors also grumbled about higher costs for booth space. Key security industry exhibitors Exhibitors expressed concern that the absence of key players reduced overall foot traffic Exhibitors praised the bigger aisles, which made it easier for visitors to navigate the show. However, some were unsure whether this was due to a better layout or simply because the show was missing key exhibitors. Notably absent were access control provider Dormakaba, security solutions company Honeywell, and surveillance providers Geutebruck and Dallmeier. Exhibitors expressed concern that the absence of key players reduced overall foot traffic. Security Essen hosted a particularly strong access control presence. Halls 2 and 3 were home to companies from across the access control and mechatronics spectrum. Sponsorship by EVVA covered the west entrance. The locking systems manufacturer, which celebrates its 100th anniversary next year, boasted significant floorspace. Exhibitors were pleased with the large access and locking presence, commenting that London-based IFSEC International tends to be dominated by video surveillance providers. EVVA, which celebrates its 100th anniversary next year, boasted significant floorspace Deep learning and artificial intelligence The push toward artificial intelligence (AI) in physical security continues, although the tone at Security Essen seemed to be shifting beyond hype and more toward how the technology can actually add value. For example, Hikvision’s cameras boasted more intelligence and processing power, and the company emphasised faster-paced product cycles. Customers ultimately do not buy AI – they buy benefits and solutions VIVOTEK embraced artificial intelligence as the biggest trend in the industry. The company demonstrated its latest deep learning technology for crowd detection applications. For Dahua, artificial intelligence allows users to easily search metadata in a video, including age and behaviour. Dahua demonstrated its solution for the transportation market, which is able to learn if a bus or train driver is falling asleep at the controls. However, some manufacturers chose not to focus on artificial intelligence. Representatives from Brivo and Eagle Eye Networks highlighted that customers ultimately do not buy AI – they buy benefits and solutions. Historically, video analytics were oversold and underdelivered, and the same could happen to AI if the term is overused in marketing security solutions. VIVOTEK embraced artificial intelligence as the biggest trend in the industry The German market & GDPR While the fair welcomed an increase in international visitors, many stands offered a distinctly German flavour. Exhibitors catered to German customers’ preference for data protection and high levels of privacy. Visitors were welcomed to the show by banners from Genetec, emblazoned with the slogan “Privacy matters… So, remember to forget me.” The video security provider’s stand demonstrated this concept more tangibly, via its Privacy Protector Module. The surveillance software, which is certified with the European Privacy Seal (EuroPriSe), monitors events while automatically pixelating people and vehicles in real time. If an incident occurs, an authorised operator can securely access the unaltered video. Visitors were welcomed to the show by banners from Genetec Other companies also acknowledged issues of privacy and cybersecurity. Hikvision noted that Europe is more regulated, which limits the implementation of the company’s products compared to those used in China. Dahua emphasised that its data for the German market is stored in Frankfurt to meet demands for data protection. IDIS made a point of saying there are no backdoors to their products. The deep learning products are easy to use and 96% accurate, says the company. FLIR has developed a cybersecurity hardening document, and strives to be transparent about cyber issues, including a web landing page where customers can raise any concerns. Vanderbilt is also pushing the cloud as a way forward with its ACT365 cloud-based access and video solution. Users are not intimidated by the cloud anymore since we all use it in our personal lives, says the company. Also on the access control side, EVVA were clear on the security of their AirKey mobile access system, which uses technology based on internet banking, double encryption and high-quality hardware. As well as demonstrating its SAROS thermal camera, FLIR strived for cybersecurity concerns to be addressed by customers Taking a broader view Nedap views security as being about allowing people to focus on their daily lives and work, safe in the knowledge that security is being taken care of. At the show, Nedap launched its new slogan ‘Security for Life’, stating that “true security is when you don’t have to think about it”. Nedap’s global client program represents a long-term commitment to projects. They are having more discussions with clients about risk management through standardisation and centralised policy.Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it Clients remain with Nedap because they keep investing in the platform, constantly updating the code and simplifying it to improve scalability for organisations, says the company. Nedap had one of the few double-decker booths at Security Essen. Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it. HID Global touted their extensive use of partnerships to provide solutions. SeeTec highlighted their move away from products to a more solution-based approach. FLIR, perhaps best known as a thermal camera company, were pushing their solutions approach to markets including intelligent traffic, smart city, video management and PSIMs. Nedap had one of the few double-decker booths at Security Essen Vertical markets in focus As vertical markets go, retail was big, and several players were offering some type of retail solution. Retail – along with banking, finance and transportation – was among Hikvision’s vertical markets of choice. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server SeeTec’s retail solution combines EAS with business intelligence and heat mapping. Dahua’s retail offerings include people counting and emotion detection, which can correlate with weather data, for example. Genetec also showcased a range of retail solutions. Technology improvements announced at Security Essen include FLIR's more robust FB6 series thermal line, Promise Technology's SMARTBOOST technology improved playback performance, and Videotec's cameras with better night performance. The extended 50m range of Optex's intrusion detection laser sensor reduces the need for cameras. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server. The Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart Signs of the U.S. congressional ban There were signs at Security Essen of an impact of the recent U.S. ban on use of Hikvision and Dahua equipment in government installations, although both big Chinese manufacturers maintained a high profile at the German show. For example, the Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart. Chinese camera manufacturer Uniview were keen to stress that they are not owned by Chinese government (neither is Dahua). Uniview’s all-IP camera line offers high resolution, low-light, multisensor and fisheye options, and AI software provides facial recognition, object detection, and fire and smoke detection at the edge. The company aims to increase its global presence with more international branch offerings and international factories.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
As increasing digital engagement powers forward in the hospitality industry, SALTO Systems has joined forces with the KeezApp technology platform to offer hotels an unrivalled guest experience. Property management systems The KeezApp platform provides a range of solutions for any property that hosts guests and is able to integrate with most PMS (Property Management Systems) on the market. Guests can check in from anywhere, receiving a virtual key straight to their smart phone and getting an alert when their room is ready for occupation. The front desk is then alerted when the guest has used the mobile key to enter their room even for doors equipped with offline electronic locks. The virtual app provides for access to all permitted areas of the hotel during their stay and when the time comes to check out, guests can again use KeezApp removing the need to queue at reception. KeezApp – SALTO software integration KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE Additional tools include live chat with the front desk. This provides a better, more efficient way for guests to talk and interact with the front desk whether they are in the hotel or out and about. Guests can also choose different departments to contact such as reception, concierge, housekeeping or room service depending on their needs. KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE. SALTO Hospitality add-ons include functionalities such as mobile keys (BLE), group check-in; real-time re-rooming and real-time extended stay. These plus other key hotel features make it easy to control all the offline and online rooms and back-of-house doors from different front desk guest workstations. SALTO electronic locks Both companies are driven by the opportunity for hotels to provide a superior guest experience to their clients, whether by offering mobile functionalities or superior management standards like quick check-in and check-out, online billing, live chat with reception, housekeeping and concierge or auto Wi-Fi connection for guests. SALTO welcomes new partnerships with industry leaders like KeezApp that will result in improved hospitality management and the guest experience. SALTO also continuously adds integrations with other technology providers so that those in the hospitality industry have a choice when it comes to which platform, they use to control SALTO’s robust line of electronic locks and supporting products.
Critical infrastructure requires locks that are proven, tested and trusted. Sometimes electronic locking is the right choice; at other times, mechanical locking does the job. With CLIQ mechatronic locking technology, one water utility combined both in a single, secure system controlled by powerful, intuitive CLIQ software. O des Aravis is responsible for water capture, storage quality, analysis and delivery of around 700,000m3 annually to homes and businesses in the Aravis Mountains region of France. PROTEC2 CLIQ key-based access control with programmable, battery-powered keys now secures 30 opening points across their premises. These robust locking devices are suited to protecting high-security openings, including a potentially dangerous room with high-tension electrical cabling and equipment. They are already deployed at critical infrastructure sites all over Europe. Controlling and modifying access rights The mechatronic CLIQ system enables the utility’s facility managers to control, modify and trace every important accessThe mechatronic CLIQ system enables the utility’s facility managers to control, modify and trace every important access. They know who goes where, and when. They are aware of activity affecting all critical doors; it is even impossible to leave one unlocked. Because CLIQ is a flexible, key-based system, O des Aravis can also retain some mechanical locks at the site, operated by the same secure keys and with the same PROTEC2 high-security disc cylinders. CLIQ software makes it easy and intuitive for O des Aravis to manage their entire locking system. “The programming software platform is very simple to use. We can easily grant or forbid access rights to any user,” explains Laurent Schutz, Water and Sanitation Process Manager. CLIQ Web Manager software The CLIQ Web Manager software is built to help companies like O des Aravis manage complex workflows. System administrators can program, amend or delete keys remotely. It’s straightforward to generate time-stamped audit trails for any lock or key, to track access in detail. The Web Manager can generate attendance reports for staff and contractors. Yet despite all these features, the CLIQ Web Manager requires minimal IT investment: it runs in the cloud and is accessed via an encrypted connection to a standard web browser. On demand audit trails of lock/key If a key is lost, a security manager can deactivate it instantly with a couple of clicksAt O des Aravis, comprehensive audit trails for any lock or key are available on demand. These also sync automatically when a user key is updated or revalidated. If a key is lost, a security manager can deactivate it instantly with a couple of clicks, ensuring buildings and clean water supplies are not put at risk. “There is very good communication about software updates,” says Laurent Schutz. “It is highly professional.” We live in a world of diverse threats to our critical infrastructure. For Aravis Mountains residents, winter skiers and summer hikers, these refreshing alpine waters are safely locked down — thanks to CLIQ wireless access control.
Abloy UK and security company Barry Brothers have supplied and installed a CLIQ Go electronic cylinder solution to a communal garden in Kensington, London to provide its subscribers with reliable and secure access. The garden’s previous access control system had proven to be unreliable, at times allowing members of the public unauthorised access which often resulted in damage in the area. Also, previous subscribers had maintained ingress and egress to the garden by retaining their key after their subscription had lapsed. Multiple access requirements Located in an enclosed area, the garden is secured with an external gate that is fully exposed to the elements. The resident committee required a durable locking solution to cope with such conditions, with the technology to control multiple access requirements; to allow subscribing resident’s access to the gardens, and a team of contractors and committee members with higher access permission to enter the internal compound to enable maintenance of the gardens. The new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements Sam Moxey, technical sales and project manager at Barry Brothers, London’s longest serving security company, specified the new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements. Excellent feedback The CLIQ Go App moves security to a new dimension, enabling controlled security from a mobile device and the ability to easily revoke access permission of non-subscribed individuals. Features include the ability to schedule access to areas and to provide contractors with time-limited access. If a key is lost, access can also be revoked using the CLIQ Go App, all managed from a cloud-based system. The system has been installed for six months with excellent feedback from the committee and subscribers. Membership subscriptions have increased and savings have also been achieved because of the reduced number of locksmith callouts. Sam Moxey, Barry Brothers, Said, “I wanted to ensure that the solution we specified would perform as required and finally resolve what had become an ongoing issue for the committee. Having worked with Abloy UK for a number of years, I had no hesitation in recommending CLIQ Go. It was very easy to set up and the programming of the CLIQ Go locks and keys was achieved easily, fitting with my busy workload.”
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio to extend its installed Gallagher Command Centre access control system. The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates—they needed the right wireless solution. Wireless locking technology Aperio wireless locks are battery powered, and so use much less energyUEA’s needs included more than just security, stylish component design and affordability. Crome Court was specifically designed to minimise environmental impact, including CO2 emissions. Any access control system was expected to contribute to that goal. The university chose Aperio wireless locking technology from ASSA ABLOY. Aperio wireless locks are battery powered, and so use much less energy than wired magnetic security locks. They only “wake up” when a credential is presented to the reader. On campus training “We decided to offer Aperio to upgrade and extend our system at UEA because of its outstanding reputation within the security industry,” explains Jason Boyce, sales manager at Gallagher. “Having worked with us for 6 years, Gallagher knew we would deliver,” adds David Hodgkiss, national sales manager at ASSA ABLOY UK. Installation was quick and easy, aided by training delivered on campus by specialist ASSA ABLOY technicians. “We found ASSA ABLOY’s service faultless,” says Wayne Dyble, installation and support manager at Check Your Security, UEA’s service provider. Environmentally advanced profile There’s no need for expensive and time-consuming work changing the locks Crome Court’s secure doors are fitted with Aperio E100 online escutcheons. Students open them with programmable RFID smart cards, instead of cumbersome mechanical keys. If a keycard is lost, it is straightforward for UEA facilities staff to cancel it and issue a replacement—using a simple web-based interface or mobile phone. There’s no need for expensive and time-consuming work changing the locks. UEA also aimed to build Crome Court with an environmentally advanced profile. Here, too, Aperio delivered. Wireless locks are battery-operated and emit much less CO2 than wired magnetic locks. In fact, in carbon terms, Aperio locks emit 0.16 percent of the total emissions produced by standard wired locks. Flexibility is another Aperio asset: additional doors can be brought into the same integrated Gallagher system whenever needed. “We hope to roll out Aperio across all new and existing residential estate,” says Christine Beveridge, head of campus services at UEA.
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access control devices to become an integral part of a security system for assets and people with the highest level of protection. They sought locks to offer a durable, secure and flexible alternative to standard mechanical security. They found an easy, electronic way to administer a powerful, user-friendly system based on battery-powered physical keys and secure, advanced microelectronics. Flexible high-security locking Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissionsCreval chose eCLIQ key-based wireless access control for its banking premises. Bank doors across the Lombardy region are guarded by more than 30 durable eCLIQ cylinders, putting Creval managers in complete control of entrance security. eCLIQ is a scalable electronic extension of the CLIQ access control system deployed in critical infrastructure sites across Europe. Cylinders are fully electronic, protected against manipulation and with 128-bit AES encryption built into both lock and key microelectronics. Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissions. Time-limited access rights Creval’s security manager is now able to grant access based on scheduled times and specific doors, and right down to the level of the individual site user. It is also straightforward to set time-limited access rights for a user key, increasing security if a key is lost. Audit trails and event logs are collected to the same, fine-grained degree. Key management is easy with software operated from a local PC or securely on the web via a standard browser. In the unlikely event a key is misplaced, Creval administrators simply delete its validity from the system. “We are satisfied with the results of the new access control system,” says Claudio Brisia, Logical Security Manager at Creval headquarters in Sondrio.
ASSA ABLOY Access Control, a UK division of ASSA ABLOY, the provider of door opening solutions, has partnered with NetNodes to deliver assured and secure access to a huge new innovation centre in London. Based at Queen Elizabeth Olympic Park, Plexal is a new £15 million project, acting as a base for an ‘innovation community’ that brings together startups, enterprises and academics all under one roof. Plexal sits within the larger Here East complex, which is transforming the former press and broadcast centres for the London 2012 Olympics Games into new spaces for technology companies, universities, startups and creatives. Aperio technology integrated with DoorFlow In total, 59 Aperio L100 wireless high-security door locks were installed across the siteThe innovation hub has been fitted with Aperio wireless, access card-based locking technology, which is fully integrated with DoorFlow, an online platform for managing and auditing building access created by NetNodes. In total, 59 Aperio L100 wireless high-security door locks were installed across the site. These lock solutions provide Plexal with the highest levels of physical protection and transmit comprehensive information on door status to DoorFlow in real time. A further 31 HiD R10 mobile access locks were also provided where wired solutions were necessary, such as for the main office entrances, and for elevators. For organisations looking to invest in a new access control system, Aperio is an effective, straightforward alternative to a wired, high-end solution. It was installed quickly and easily at the Plexal site without cabling and will drastically reduce the innovation hub’s maintenance costs and energy consumption going forward. Cost-effective security upgrade Aperio can upgrade existing mechanically locked doors and wirelessly connects them to new or existing access control systemsAperio can also upgrade existing mechanically locked doors and wirelessly connects them – online or offline – to new or existing access control systems. This can be achieved with minimal modification to doors and premises, offering a cost-effective and simple security upgrade. John Herbert, Facilities Manager at Plexal, said: “What really appealed to me about ASSA ABLOY Access Control’s products was the aesthetics. We have a futuristic-style open plan design here at Plexal – our offices are predominantly glass-fronted, so we needed an effective stylistic design which was not only robust but adaptable too. We foresee change in the not-too-distant future and are delighted at our options to modify.” Discreet and adaptable locking solution Stewart Johnson, Director at NetNodes, explains: “Aperio offers a hardware solution that is well-suited to our online platform, DoorFlow. Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption. We are delighted to partner with NetNodes to deliver an easily integrated access control system for this new innovation centre in central London"“The open-plan layout of the space and the high glass doors installed throughout the site meant Plexal needed an access control solution that was discreet and adaptable, with Aperio perfectly meeting these demands. Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment. This also minimises future installation costs, offering a cost-effective and straight-forward access control upgrade.” Integrated access control system David Hodgkiss, National Sales Manager for ASSA ABLOY Access Control, adds: “We are delighted to partner with NetNodes to deliver an easily integrated access control system for this exciting new innovation centre in central London. With up to 800 entrepreneurs using the space to devise, create and launch new products and services, Plexal required a solution that was tried and tested. Aperio enables easy access around the site while providing assured security. “Aperio is a fantastic hardware partner to door security software, such as NetNodes’ DoorFlow. It has been great to work with NetNodes on this project, and we expect to work together on many more successful installations in the future too.”