Near Field Communication
The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why?
Continental Access, a division of NAPCO Security Technologies, Inc., is pleased to introduce Michael Venoit as the new Continental Access Vice President of Sales. Michael Venoit comes to Continental Access with a successful track record of strategically driving sales and growing revenue in security and access control, having previously worked for several well-known industry manufacturers. Managing Continental Access accounts We are happy to welcome Michael aboard, he’s got great energy...
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this we...
photonicSENS, a pioneering supplier of single-lens 3D cameras for next-generation depth perception has collaborated with Qualcomm Technologies, Inc. to accelerate the commercialisation of its industry-leading single lens 3D camera technology. Beneficial features With a complete reference design based on the Qualcomm® Snapdragon™ 888 5G Mobile Platform, smartphone manufacturers can benefit from dramatic enhancements in-depth map resolution for front-facing applications like enha...
The Security Industry Association (SIA) has announced the 2021 winners of the SIA New Product Showcase Awards, the flagship awards program presented in partnership with ISC West recognising innovative security products, services, and solutions. Top among the winners – who were recognized June 17 during a virtual awards show – was Lumeo, receiving the 2021 Best New Product Award. SIA New Product Showcase Since its inception in 1979, the SIA New Product Showcase has been the securit...
Built to withstand all access control needs, the tough new SALTO Neoxx electronic padlock takes security beyond normal expectations. SALTO Systems has invested years of working with some of the best minds in the security industry, their community of security specifiers and installers, to build the most reliable and smartest electronic padlock on earth. SALTO Neoxx Padlock With exceptional attention to detail, premium materials, and all SALTO technology inside, their latest padlock, SALTO Neox...
2N, internet-enabled intercoms, and access control systems company, has launched the new 2N® IP Style intercom with a next-generation platform supported by an Axis processor. Sleek design with a touchscreen display The 2N® IP Style sets new standards in access control simplicity, performance, and aesthetic appeal, and will meet the specific needs of owners of modern residential and office buildings. 2N® IP Style’s attractive, large 10” touchscreen LCD provides a complete, detailed view of incoming visitors. To ensure its durability, it is protected by scratch-resistant 4-mm tempered glass. Users will also benefit from the ‘smartphone-style' touchscreen display with instant response and smooth animations. In another breakthrough, the 2N® IP Style has also been designed to deliver different office and residential screen capabilities in one. In this way, it can meet the differing needs of commercial office and luxury developments. Visitor identification via WDR technologies The 2N® IP Style gives the building owner or user all the decision-intelligence they need at their door Drawing on the processing power of Axis’ Artpec 7 chip and the flexibility benefits of edge IP devices, the 2N® IP Style gives the building owner or user all the decision-intelligence they need at their door. Because of this new chipset, the intercom platform can handle multiple simultaneous full HD streams and provides a full-colour picture without any artificial light. Its 5MPx camera’s incorporation of Wide Dynamic Range (WDR) technologies ensures full image quality and identification of the visitor, even in darkness or uneven lighting conditions outside. In these ways, this intercom sets a new benchmark for ease of use and building security. Fast and easy access control Based on feedback from security and installation companies, 2N has also developed a new installation mechanism for the new intercom. The patented tilt-out system allows installers to use both hands to work with the cables, making installation faster as well as easier. Michal Kratochvíl, CEO of 2N Telekomunikace, said, “The 2N® IP Style revolutionises access control for modern apartments and office buildings. The intercom incorporates the best camera, the best video transmission, and display, and has a quality user interface which can be activated by a simple tap of a smart device – all wrapped in a timeless design.” WaveKey access technology The new intercom unit allows faster and simpler access because it supports the widest range of access control technologies – including the latest and fastest Bluetooth-enabled mobile access technology, WaveKey, as well as all card technologies. It also has a smart PIN keypad. With WaveKey access technology implemented in the intercom, the 2N® IP Style supports Touch, Tap in App, and Motion modes. The Motion mode means that if a user has an authorised application on their mobile device, the unit’s camera registers any movement from that person in a 170° field of view and automatically opens the door. High building security & easy access With a certification of IP65 and IK08, the 2N® IP Style is well suited to outdoor and harsh environment applications Michal Kratochvíl added, “Developers and users of luxury homes and high-end offices expect the highest standards in building security and ease of access. We are meeting, and indeed exceeding, these needs with the new 2N® IP Style, which redefines the performance, capabilities, and aesthetic appeal of access control units.” “The new intercom draws on our 30-year record in access control unit design and unrivalled expertise in open standards integration. Through that commitment to cutting-edge devices and setting industry benchmarks, the 2N® IP Style brings together the power of Axis’ Artpec 7 processor, beautiful glass panel housing, and the speed and simplicity of Bluetooth with WaveKey access technology.” “We believe the 2N® IP Style will become the intercom of choice for forward-looking developers for many years to come. Applications The 2N® IP Style unit is designed and manufactured with a commitment to open protocols so, as with other intercoms from 2N’s portfolio, it can be integrated with the best in high-performance third-party systems. Manufactured in the Czech Republic from hard-wearing materials, and with a protection certification of IP65 and IK08, the 2N® IP Style is well suited to outdoor and harsh environment applications.
As lockdown restrictions ease and public mobility increases, new research reveals three-quarters (75%) of people have health, safety, and security concerns when visiting their nearest city, signaling a need for new security innovations and greater public reassurance on their return to UK cities. Following high profile cases such as the disappearance of Sarah Everard, the London Bridge terror attack, and recent road cyclist deaths, the public has a heightened awareness of the safety and security issues cities present, according to a new report into public perception of smart cities by video management solution provider Milestone Systems. Security concerns in the city Despite ONS reporting a total crime reduction of 4% in England and Wales in the 12 months ending in June 2020, more than a third (37%) of the British public cited petty crime, such as mugging and pickpocketing, as a security concern when in a city setting. One in four (25%) Britons stated vandalism is a primary concern for them, and a similar proportion (24%) listed pedestrian safety as a worry when navigating their nearest city. Terrorism threat Although the UK's terrorism threat level was downgraded from "severe" to "substantial" in February 2021 by Home Secretary Priti Patel, following a "significant reduction" in the momentum of attacks in Europe, terrorist activity remains a worry for almost a fifth (17%) of the public. Terrorism was of markedly less concern to those over 65 than any other age group (8% vs average of 17%), but for all other safety concerns, there was a surprising consistency across both age groups and genders. Improving safety and security The existence and benefits of smart technology in cities needs to be better communicated to the public To mitigate these concerns, smart technology is already being deployed in cities across the world to improve safety and security. Increased bandwidth afforded by the rollout of 5G and the internet of things has given local authorities new tools to improve public services such as crime-fighting. In Glasgow, for example, there is an effective multi-faceted state-of-the-art traffic and public safety management system that uses data and video analytics to improve responses to issues in the city, but Milestone’s research suggests that the existence and benefits of smart technology in cities needs to be better communicated to the public. Smart city technology Neil Killick, UK General Manager at Milestone Systems said, “Many local authorities have been investing heavily in recent years in cutting-edge smart technology to improve public services and tackle safety and security concerns highlighted by our report. However, the research found that less than a third (29%) of people say that they believe smart city technology could contribute to enhanced safety and security.” “This demonstrates a need for more public education around how smart technology improves safety in cities and also suggests that local authorities need to continue to find new ways to improve day to day life for their city’s residents and visitors.” “The sector is advancing rapidly and products are available to tackle a wide range of city-based safety concerns so it is important to improve understanding so that citizens give their full support to smart city technology and feel safer and more confident when in urban areas.” Public awareness Increasing the public’s awareness of technology advancements for safety purposes must be done in a way that demonstrates its benefits. Developments such as limiting video network blind spots, improving poor-quality images, and supplementing visuals with data collected from interconnected devices, give law enforcement more reliable and thorough data to use in investigations. Thus, enabling instances of theft and civic disturbances to be monitored, reacted to more rapidly, and prevented, curbing the safety concerns of the public. Traffic management systems Department for Transport figures reveal the vast majority of accidents occur in towns and cities Also among the top five concerns for the public when returning to UK cities was driver safety (17%). Department for Transport figures reveal the vast majority of accidents occur in towns and cities, with 2,881 accidents per 1 million people happening in the capital city region, higher than any other region. One in six (14%) Britons cite cyclist safety within their top concerns when returning to the UK’s busy cites, supporting London Mayor Sadiq Khan’s plans for 160 miles of 'safer cycle routes. However, London’s low-traffic neighbourhoods (LTNs) have come under criticism from the emergency services who state the new traffic management systems have reduced response times. This suggests that alternatives are needed to balance the needs of the public and of emergency services, such as smart sensors and cameras that collate real-time data to detect the quickest and most traffic-free route for emergency vehicles to take. Smart video and sensor technology Neil Killick continued, “As well as helping to protect the public in the context of crime, smart video and sensor technology can be used to manage traffic and roads within cities, reducing congestion and providing local authorities with constant, real-time analytics, as seen in Glasgow.” “This enables relevant authorities to identify potential danger spots, manage roads and bike lanes within a city and plan optimal emergency service routes. The use of interconnected devices, sensors, and video technology allows for a deeper understanding of how the city is being used so that necessary improvements can be implemented based on data-driven decisions to better public safety.”
SALTO Systems, a manufacturer of electronic access control solutions, has named Ron Shaffer as the North America Vertical Business Leader-Education. "From my first day in 2006 to now, SALTO continues to be a technology leader within the world of access control. I have held many positions during my time with SALTO and am still amazed with the depth of SALTO’s product line, attention to detail, and commitment to research and development. I’m excited to be part of the next phase as vertical business leader for K-12 and higher education," said Shaffer. Access control positions SALTO North America Director of Marketing & Vertical Business, Steve Burk, said access control for education not only makes students, staff, and campuses more secure, it will also drive operational efficiencies, not to mention that it can also be a very attractive draw for students and staff. Ron’s technological knowledge of access control positions him well to be the customer’s trusted adviser" “Ron’s technological knowledge of access control positions him well to be the customer’s trusted adviser and to develop solutions for them that deliver the value they expect. We look forward to great things from Ron as we expedite our growth in this important vertical.” Access control positions Shaffer has previously served SALTO as a Business Development Manager and Solutions Architect Technology Director. Prior to joining SALTO, Shaffer was a Training and System Implementation Manager for Onity and a Technical Onsite Trainer for TESA Entry Systems. He has earned management certification from Emory University; network & communications management from Devry Institute of Technology; and A+ computer certification and network+ certification from New Horizons Computer Learning Centres.
Bird Home Automation, manufacturer of IP video door stations launched the first hybrid IP intercom D1812 for upgrading Doorking telephone intercom systems. The new model adds DoorBird IP technology to installations of the Doorking 1812 series while keeping their analog telephone intercom system running. State-of-the-art intercom system The electronic core and the stainless-steel front panel in DoorBird design are easily installed via Power over Ethernet (PoE) and fit the existing Doorking 1812 housing perfectly. As a result, the new upgrade allows homeowners to have state-of-the-art access control and intercom system with minimum effort. Advanced features The D1812 hybrid upgrade includes numerous high-tech features, remotely configurable via the free DoorBird app and with no licensing fees of any kind: 1080p camera with ultra-wide-angle 180 hemispheric lens and night vision Free Cloud recording RFID reader, 13.56 MHz with MIFARE DESFire support, remotely manageable 4D motion sensor Power over Ethernet (PoE) Wi-Fi enabled, 2.4 GHz if a network cable is not used Wiegand protocol support (26, 30, 31, 34 and 44 bit) Illuminated keypad with up to 500 remotely manageable PIN codes Individual schedules, e.g., to trigger relays or smart home commands upon certain events Geofencing for automatic gate opening when returning home Open API for third-party integrations such as Control4, URC, RTI, Crestron etc Support for NVRs such as Synology, Luma, Lilin, Qnap and IC Realtime The DoorBird D1812 integrates into Doorking 1812 Classic Surface Mount, 1812 Classic Flush Mount, 1812 Plus Surface Mount, and 1812 Plus Flush Mount. All DoorBird intercoms are developed, designed, and carefully manufactured in Germany and comply with the highest security standards.
Allegion US, a globally renowned provider of security products and solutions, has announced that it has received federal government approval for its Schlage Multi-Technology (MT-485) Readers, when paired with the LenelS2 OnGuard version 7.6 access control system. Schlage MT Readers Schlage’s MT Readers simplify access control solutions by recognising magnetic stripe, proximity, Schlage smart card and NFC-enabled smart devices with a firmware update, ensuring a seamless transition to high-security smart technology in the future. The readers are fully OSDP compliant, when ordered with RS-485 and have an open architecture platform, which is designed to work with industry standards and common access control system interfaces, fitting a variety of placement needs. LenelS2 OnGuard version 7.6 access control system LenelS2 OnGuard version 7.6 access control system offers rich feature and operability enhancements The LenelS2 OnGuard version 7.6 access control system offers rich feature and operability enhancements, while also extending its cloud compatibility, integration capability and convenience. LenelS2 is the first partner to complete certification for the Government Service Administration’s (GSA) Approved Product List (APL), with the OnGuard system paired with Allegion’s Schlage MT Readers. This integration allows for expanded access to key government clients. Easy-to-deploy, interoperable solution “As federal agencies are only permitted to procure qualified products and services listed on the GSA APL, we’re happy to be able to offer this integration that provides an easy-to-deploy, interoperable solution for government facilities,” said Terry Collins, Director of Government Sales at Allegion. Terry adds, “The integration is FIPS 201-2 compliant for easy procurement, with a quick-connect design for easy installation, OSDP for efficient software updates and meets the highest testing standards in place.” Security standards compliance Following rigorous government and third-party security vulnerability and interoperability testing for the Federal Identity, Credential and Access Management (FICAM) program, the integrated solution meets the commercial compliance, consistency and alignment requirements for the functional needs of the government ICAM implementer. The Schlage Mullion Reader and Single Gang Reader are now on the APL and have been authorised for use by the federal government. Federally approved integration “Our government clients demand the highest standards, which drives us to continually innovate with leading players like Allegion, to offer the very best in access control,” said Derek Greenland, Director of Federal Government Solutions at LenelS2. This federally approved integration is part of the next wave in Allegion's mission to work with major providers in the government sector, to spearhead smart lock and mobile access adoption, making seamless, all-encompassing security the new standard.
Glenn Fletcher has returned to NVT Phybridge as Director of Sales for the European region. Mr. Fletcher will provide leadership to the European Sales team while continuing to bring value to partners and customers. Prior to his leave of absence in January of 2019, Mr. Fletcher was instrumental in leading his sales team to success and growing revenues in the EMEA region. Under Mr. Fletcher’s leadership, the EMEA sales team worked on several major digital transformation projects for UK Rail, HMPS, and the HS1 project. “Having Glenn return to lead our EU team provides great continuity with our staff and customers,” said Steven Fair, EVP of Global Sales, NVT Phybridge. “Glenn has an incredibly unique ability to leverage existing partnerships to exceed sales expectations in the region.”
If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organisations up and down the country. By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years. There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s only been sped up by the pandemic. It’s true that many businesses are still very much focused on remote working, although many are now starting to implement new-and-improved strategies that are better suited to protect the workforce moving forward. Mobile ID systems As the next normal becomes clearer, businesses will be reviewing procedures such as access control, occupancy monitoring, reducing touch points and tracking visitors. Mobile ID systems are ideally suited to this task. But what are the key reasons for considering such a setup in 2021? But why is this new technology so well-suited to future-proof your physical access system, and why is it becoming so popular? Eradicating outdated legacy credentials Have you seen just how vulnerable outdated Proximity card technology can be? Low-frequency 125kHz cards can be cloned in a matter of seconds with the use of cheap, readily available tools. Despite their weaknesses, they are still used by a huge majority of businesses – big and small. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential Replacing such a system with a mobile-enabled system is one of the best ways to increase security ten-fold. Thanks to a cloud-based infrastructure, mobile ID offers best-in-class security and cryptography. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential. Bluetooth Smart and NFC (Near Field Communication) make them the best product to operate such a credential via a secure app. If you’re looking for best-in-class security in 2021, mobile access is most definitely the way forward. Removing touch points across the business Reducing touch points and the adoption of touchless facilities has become a key priority for businesses in the wake of COVID-19. Even as businesses start to return to the office and operate a home/office split, it will be imperative that unnecessary contact is kept to an absolute minimum between staff. The traditional issuance of identification and access control credentials can pose problems in this regard. Facility and security managers who are responsible for onboarding and processing ID have done the process face to face. Mobile access makes it possible to carry this process out without people coming into direct content. First, the security manager has access to a secure portal, allowing them to create, manage and edit credentials anywhere. They can upload and remotely transfer mobile ID and access control credentials directly to users’ smartphones over the air. Via the secure app, users can view and see their credentials and immediately begin using it for ID and access control by simply placing their smartphone over card readers. Enabling a more flexible way of working The way in which we work has changed for good. Even as people more people return to the office in 2021, a majority of businesses will be operating a home/office split indefinitely. This once again reinforces the need for a smarter, more adaptable onboarding system. Implementing mobile ID is the perfect way of doing this: over-the-air delivery of credentials and security data is now a given, helping businesses create the perfect balance between the home and the office. No longer do people have to come into the office for the onboarding process. Increasing convenience and user experience More often businesses are realising the value mobile ID can have for enhancing the work experience as well as security Ok, so mobile ID is the perfect way of increasing security and adapting workplaces to a post-COVID way of working. And we’ve not even touched on the most obvious advantage yet: Convenience. How many times have you forgotten your ID card? We’re sure it’s more times than you forget your smartphone. These powerful processors have become intertwined with the way we carry out tasks on a daily basis. They’re so vital that people will soon notice if they’ve forgotten it. From an employee’s perspective, mobile ID and access control is simple, convenient and extremely user-friendly. More and more businesses are realising the value mobile ID can have for enhancing the work experience as well as security. From the employer’s perspective, mobile ID means it’s easier for administrators to manage access and credentials. Future-proofing access control now will ensure that in the longer term, mobile ID is well worth the investment. The annual expenditure of printing ID cards and purchasing credentials can be vast, while reissuance costs can also quickly add up for larger organisations. These issues are a thing of the past for businesses using mobile ID. Mobile ID perfect tool for 2021 and beyond Until mobile ID, new and improved credentials’ main focus was on increasing security. Mobile ID not only delivers that, but it also provides a more convenient way of accessing the office in a way that’s perfectly suited to returning to the office in 2021. If there was ever a time to upgrade, now is the time. Summing up, mobile access is changing the way we access the office by: Eliminating weak links in security systems such as outdated legacy card technologies Eradicating the need for touch points across multiple areas of the workplace Enabling a smarter, more flexible approach to onboarding Increasing convenience – for both employers and employees.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organisation’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organisations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorised staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organisation will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organisation. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organisation’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organisations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorised person into a facility. Deploying video cameras, sensors Some organisations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimise throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorised persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control centre that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualisation tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focussing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customisation of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organised to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyse data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System helps in tailgating mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy enrolment and deployment Enrolment in the system is easy. Companies can deploy a separate enrolment station, or any reader can be used for enrolment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrolment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting intent from positioning of eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
An American sports broadcasting network wanted to modernise to an IP communication solution without disrupting its 24/7 operations. The organisation was relying on a digital phone system that was obsolete and becoming increasingly inefficient and costly. However, the existing phone system was supported by a single-pair UTP infrastructure that was not ready to support the new IP devices. While the customer wanted to modernise to IP, they were not interested in the risk, complexity, and business disruption that would result from ripping out the existing infrastructure and replacing it with new CAT5/6 Ethernet cabling. Need for cost-effective solution Strict company policy mandated 24/7 operational uptime, which meant there was no allowance for the disruption that the re-cabling would cause. The network needed an innovative solution to overcome its infrastructure barriers and complete its digital transformation Additionally, the enormous cost associated with infrastructure requirements was not in the budget’s scope, creating additional barriers and challenges to deploying the new IP communication solution. The sports broadcasting network needed an innovative solution to overcome its infrastructure barriers and complete its digital transformation project. PoLRE switch The customer’s IT Director met with the NVT Phybridge team at an industry event and discovered the PoLRE® (Power over Long Reach Ethernet) switch. The enterprise-grade PoLRE switch delivers fast Ethernet and PoE over single-pair UTP cable with up to 1,200ft (365m) reach; that’s four times the reach of standard Ethernet switches. The IT Director was impressed with the technology and organised a proof of concept to test the solution in a live environment. Features and benefits After a few simple setup steps, the PoLRE switch transformed the customer’s existing and proven single-pair UTP infrastructure into a robust Power over Ethernet network to support the new IP communication solution. After experiencing the features and benefits of the PoLRE switch first-hand, the customer was confident that the technology would overcome the digital transformation barriers. “The NVT Phybridge PoLRE® switch is a pretty straightforward process. The big advantage for us was delivering outstanding service, which was critical for the success of the project,” said Richard Smith, Product Sales Specialist, GSP America. Saved costs on digital transformation The customer significantly accelerated its digital transformation project by deploying the new IP solution The sports broadcasting network saved over $500,000 in infrastructure costs using the NVT Phybridge PoLRE switches. The customer significantly simplified and accelerated its digital transformation project, deploying the new IP communication solution without disrupting its regular business operations. The PoLRE switch’s extended reach capabilities simplified LAN design and ongoing network management, as the customer was able to support the new IP phones exactly where they were needed without additional IDF closets. “It’s a pretty straightforward process,” said Richard Smith, Product Sales Specialist, GSP America. “The big advantage for us was delivering outstanding service, which was critical for the success of the project”. The customer was able to avoid the traditional rip-and-replace upgrade method, using Modern LAN principles to improve the outcome of the project significantly.
It can be a challenge to find an ideal electronic lock for every opening, and then to manage them all within a single, integrated solution. All too often, security procurement involves difficult compromises: A system that works perfectly for one door or department leaves another where the same solution doesn’t quite meet its needs. Range of access control solutions A newly built commercial premises in Banská Bystrica, Slovakia, power-tool manufacturer Makita stocks and distributes batteries, and runs wholesale supply logistics. They searched for a single, intuitive system to control every access point — now and in the future. Yet, as at many other sensitive commercial sites, not every door or opening is the same. Makita needed an access control solution with a comprehensive range of devices — to secure escape doors, entrances, interior doors, and more. “The diversity of access control devices available for the Incedo™ system was a decisive factor,” says Makita’s Richard Cimerman. Device management from a single system Makita Slovakia has a totally flexible, futureproof Incedo access solution designed to grow with their business ASSA ABLOY Opening Solutions’ Incedoä platform connects security software and hardware within a single, seamless ecosystem. The range of Incedo-enabled devices and award-winning door hardware convinced Makita — for this site and for future premises and refurbishments around Slovakia. The new Banská Bystrica facility has an Incedo system controlling access through main entrances, fire doors, and emergency exit doors, as well as interior doors fitted with Aperio® wireless electronic escutcheons. User-friendly Incedo Business software manages and monitors everything together from a single control panel. It filters and restricts employee and visitor access to specific areas of the plant. Secure key credentials The modular, platform-based Incedo solution incorporates wired and wireless door locking devices from across the ASSA ABLOY range; card, token and secure mobile key credentials that can be used interchangeably; and a growing range of third-party security solutions. Should Makita upgrade to Incedo Plus management in the future, their own system could manage CCTV and alarms alongside access and door entry. When security demands change at Makita Banská Bystrica, their Incedo system can adapt. With Incedo software, Makita can switch between local and Cloud managed solutions whenever they choose. System size is scalable up or down, anytime and on-demand, as security needs or space usage change. Makita Slovakia has a totally flexible, futureproof Incedo access solution designed to grow with their business.
McKinney ISD relied on an aging analogue phone system that was out-of-date, end-of-life, and no longer supported. The school district wanted to upgrade to an IP communication solution across 37 separate buildings. The school board already had a Fibre backbone that connected each of the buildings. However, the IP devices would also need power, meaning every classroom would require an MDF closet. This solution was not viable due to high costs, network complexity, network security, and safety concerns. Additionally, many endpoint locations were well outside the 330ft (100m) reach limitation of standard switches. McKinney ISD considered laying new cable, but the $1.1 million price tag was far too high, the deployment times too long, and the project’s return on investment in jeopardy. The school district needed an innovative solution to modernise communication within the defined budget and time frame. Solution NVT Phybridge PoLRE switch delivers Ethernet and PoE over a single pair of UTP wire with up to 1,200ft (365m) reach Due to the school district’s challenges, Cisco suggested the PoLRE switch to overcome the digital transformation barriers. The NVT Phybridge PoLRE switch delivers Ethernet and PoE over a single pair of UTP wire with up to 1,200ft (365m) reach, which is four times the reach of standard switches. Cisco was confident in the PoLRE switch and coordinated with NVT Phybridge subject matter experts to present a tailored solution to the customer. McKinney ISD registered for a free, no-obligation proof-of-concept to test the PoLRE switch in its environment. After a few simple setup steps, the PoLRE switch transformed the existing single-pair UTP cabling infrastructure into a power-packed IP backbone with more than enough bandwidth to support the Cisco IP devices. The school district was impressed with the solution and told its technology provider, CDW, to incorporate the PoLRE switch into the proposal. Result McKinney ISD took a proactive approach to find new and better ways to achieve its digital transformation goals without high costs, complexity, or disruption. CDW used the NVT Phybridge PoLRE switch to deploy over 3,300 phones without ripping and replacing the existing and proven voice infrastructure. Deploying across the 37 locations was quick and straightforward thanks to the PoLRE switch’s repeatable, predictable, and scalable deployment methodology, which further increased time and cost savings for the customer. Authority Comments The PoLRE switch allowed to modernise without having to deal with the construction “Deployment was quick and simple for the installation team,” said Jeannie Newman, Central US Sales Manager, NVT Phybridge. “Our Technical Support Team did an amazing job assisting with configuration over the phone.” “The installation was really smooth,” said David Spann, CIO, McKinney Independent School District. “The PoLRE switch allowed us to modernise without having to deal with construction. We did our homework. Re-using our existing cabling and turning it into a more secure transmission model was a huge win for us and a huge win for our taxpayers. This really was a win for everyone.” McKinney ISD used the PoLRE switch to achieve incredible results: Reduced infrastructure costs by more than $1.1 million Reduced the total deployment time by three years Avoided putting IDF closets in the classrooms Prevented over 10 tons of cabling e-waste
SmartSec Solutions, a specialist front of house security provider, has been appointed by Colliers International to oversee security at the prestigious 10 Old Bailey, London. SmartSec has been working with Colliers for almost three-years across other London-based properties including at Idle Lane, Southampton Street, King Street, and Bartholomew Lane and this appointment adds to SmartSec’s growing corporate portfolio. High-profile security service The three-year contract, will see SmartSec provide high-profile security service The three-year contract, starting in May 2021, will see SmartSec provide high-profile security service to welcome tenants and visitors as well as protecting assets, property and the occupiers. 10 Old Bailey is an eight-storey building across 86,625sq ft. St Paul’s Underground station is within 5 minutes of the building providing access to the Central Line. Thameslink and Blackfriars are also in close proximity. Solid customer service Rachel McMahon, Colliers International Facilities Manager, said: “SmartSec’s staff are fantastic. They are great communicators and have always displayed that wow-factor. I know that I can approach Dele Ogunlaru and his team and speak openly and candidly to them. This personalised service is invaluable to Colliers and is what separates SmartSec from any other security provider I have previously worked with.” Dele Ogunlaru, Director, Compliance & Key Accounts, comments: “First class security underpins everything. However, it’s also about solid customer service, good communication, and welcoming building tenants and visitors coming through that front door. We are the first person they see at the start of the day and often the last person they see when they leave. It’s about making a visit to the building an enjoyable experience, and that starts with the officer on the front desk.”
ISONAS Inc., an IP access control and hardware solution provider and part of the Allegion family of brands announced that the ISONAS™ Pure IP™ access control solution has been deployed at Our Lady of Perpetual Help Parish in Grove City, Ohio. The parish is comprised of seven buildings, which include the church, preschool, elementary school, rectory, storage garage, athletic building, and modular classrooms. The parish grew from around a dozen visitors daily to more than 80 people visiting the church every weekday morning and more than 500 people visiting over three separate services each weekend recently. Controlling Access The elementary school has grown to host more than 300 students and 50 staff members and volunteers, with the preschool adding another 40 students and staff members to the campus tally. With 28 exterior doors encompassing the fully renovated church, school, and preschool, the parish needed a substantial security upgrade. The new system needed to not just limit access, but also control it. A main challenge at the parish was being able to control access at all seven buildings and provide an environment with improved personal security for their staff, students, and patrons. The security system the parish had in place consisted of a few standalone keypads and electric locks on a couple of doors with no centralised management or communication. Upgrading Security With an influx of people accessing the parish and its facilities, both the facilities director and the maintenance/technology specialist at the parish were ready to find the right access control solution. The new system needed to not just limit access, but also control it. After careful consideration and research, the parish selected the ISONAS™ Pure IP access control solution for their security upgrade. ISONAS introduced the parish to its local certified independent security integrators, Systems 28. “Working with ISONAS on this project was a tremendous experience from start to finish, and we were thrilled to be brought on board to handle this security upgrade,” said Scott Hoover, sales estimator at Systems 28. “As a certified independent ISONAS systems integrator, we were proud to install this unique solution at our local parish and help make our community safer.” ISONAS RC-04 reader controller The parish also liked the fact that an on-site server was not required with the ISONAS solution The project consisted of installing 24 ISONAS RC-04 reader controllers, with 21 deployed on exterior doors and three on interior doors in a month’s timeframe. The parish chose the ISONAS solution for a myriad of reasons, with one main factor being the ability to use power over the ethernet for the card readers and electric locks. The parish also liked the fact that an on-site server was not required with the ISONAS solution, as having a cloud-based server was critical to managing access remotely for multiple buildings. ISONAS Pure Access software “We are extremely happy that the parish selected ISONAS as the right solution for their security upgrade and look forward to providing capabilities to easily expand the system in the future,” said Jonathan Mooney, ISONAS sales leader. The ISONAS system is extremely user-friendly and much more convenient Along with the ISONAS hardware, the ISONAS Pure Access software was deployed for its remote access capabilities. Pure Access™, ISONAS’s software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. Remote access functionality “The ISONAS system is extremely user-friendly and much more convenient than the previous ‘stand-alone’ system we had in place prior to this upgrade,” said Kevin Radwanski, facilities director at Our Lady of Perpetual Help Parish. “We especially like the remote access functionality, as it has been great for us to be able to lock and unlock doors remotely during regular times and emergency situations like the global pandemic.”
Access IS, part of HID Global, is delighted to celebrate the successful launch of contactless payments across the Stockholm region by SL (Storstockholms Lokaltrafik). Building on the successful mass deployment of Access-IS ticket readers and validators back in 2019, the latest upgrade to the system sees Access-IS devices in train gates and ticket offices as well as bus mounted validators being upgraded to permit full cEMV contactless payment capability. Contactless ticketing Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read Stockholm is leading the way with this deployment of contactless ticketing across a true multi-modal transit network. Barcode and NFC tickets, as well as bank and credit cards by VISA, Mastercard or American Express are all presented to a single, intuitive-to-use, point of presentation. Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read, meaning passenger throughput is maximised for a great user experience and reduced operational costs. Access IS transit validators and readers Common to many Transit Authorities, SL continues to operate its ‘Accesskort’ proprietary closed loop ticketing scheme in tandem with the new upgrade. However, plans are in place to migrate ‘Accesskort’ to a new SL transit (EMV technology) closed loop card, which will be read/processed on the Access-IS reader, making a single point of presentation for all tickets and payments. All of the Access IS transit validators and readers are non-proprietary, open architecture units, which free the city to use any software backend system they desire. Access IS and SL partnership When Access IS first started to work with Storstockholms Lokaltrafik (SL), it was the beginning of a journey to modernise ticketing across Stockholm. At any ticket reader on buses, metro barriers, commuter trains and boats, rail or tram platform, or with the tram conductor, passengers can now simply tap to make a payment using all major payment schemes, as well as Apple Pay, Samsung Pay, Google Pay via their mobile devices’ digital wallet. A single tap buys them a single trip, priced at SEK 38, the same as the SL app, the ticket machines, or the ‘SL Accesskort’. Initially the system has gone live with adult tickets, but concession tickets for pensioners, students or children will follow. Contactless cards for passengers For passenger security, SL does not see debit card numbers or card account The ticket becomes valid the moment a passenger taps on their contactless card for the first time, at the start of their journey and remains valid for 75 minutes. All of a passenger’s journeys are tallied up and debited as a single payment the following day, making travel payments easy to understand and simple to track for the passenger. For passenger security, SL does not see debit card numbers or card accounts, but uses a technology where the correct card number is exchanged for a random number. This means that SL cannot see which person the payment card is linked to. Deployment of contactless transit payments Speaking about the project, Charlotte Modig, Payments and Cards Senior Business Manager for SL Stockholm said, “As we modernise our ticketing system to be leading edge, the learning curve for all involved is steep. Close cooperation between SL and Access has managed to overcome challenges and deliver a service we are all rightly proud of.” Speaking about the project, Cliff Hunter, Head of Sales for Access IS said, “Our relationship with SL goes from strength to strength with a great deal learnt on all sides during this ‘the largest of its kind’ deployment of contactless transit payments.” Cliff adds, “We champion software agnostic transit products to give operators flexibility in how they implement their mobile ticketing and payment schemes.”
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?