Visitor management systems - News
The five LEGIC components Connect, Mobile SDK, reader IC, smartcard IC as well as key and authorisation management are seamlessly working together to provide a powerful technology platform for secure ID and IoT applications. For example, for BLE mobile ID, use Connect to deploy ID rights onto mobile devices running an app which is built on LEGIC’s mobile SDK (Android or iOS). The mobile ID rights can then be easily accessed by a reader incorporating a LEGIC reader IC. All three of these L...
The SM-6300 is LEGIC’s latest reader IC to secure ID and Internet of Things applications. Thanks to the embedded certified secure element (SE), the new reader chip is also ideal for ID and IoT applications with the highest security. Another advantage of the SM-6300 is the very compact “System-in-Package” design. ID and IoT solutions The SM-6300 includes a tamperproof hardware secure element (SE), where all key material is stored. This enables a wide range of innovative ID an...
The SM-4200 and SM-4500 reader ICs support all common RFID standards based on 13.56 MHz. Their compact size and patented wake-up circuitry make them the right choice for all kind of applications. Integrated key storage In addition to LEGIC advant and prime, the SM-4200 and SM-4500 support many third-party technologies. With their integrated key storage and MIFARE key derivation, secure usage and full compatibility with existing MIFARE installations can be achieved. Combine and manage applica...
LEGIC’s Security Chipset SC-4300 is the latest member of the proven LEGIC 4000 series reader ICs. This innovative, state-of-the-art reader chipset supports various RFID standards as well as BLE and NFC to communicate with smart devices. Multi-technology reader chipset Exploit the possibilities of LEGIC Connect and extend your reader´s RFID capability. Together with the central LEGIC Trusted Service and the LEGIC Mobile SDK for managing data on smart devices, the SC-4300 is part of...
LEGIC’s trusted service Connect enables everyone to securely use mobile services on smart devices – at the touch of a button. Mobile services like mobile access, sharing economy, cashless payment or identification serve new individual or corporate concepts in daily life. Those concepts address the increasing need for efficiency and individuality as well as customer loyalty – all by integrating users via a simple app download. Security against cybercrime LEGIC Connect is a un...
LEGIC’s CTC smartcard ICs are the perfect choice for migration to LEGIC advant. Combined on a CTC, three RF standards can communicate with the reader IC and are protected against attacks by means of modern encryption algorithms. LEGICs CTC (Cross-Standard Transponder Chip) is the solution for a flexible migration to LEGIC advant. The CTC platform enables users to move between installations with different RF standards. Depending on security requirements, individual areas can be selectivel...
Professional grade access control technology developer and manufacturer Essex Electronics recently announced the release of the revolutionary iRox-T Turnstile Reader. The iROX-T is a multi-technology reader designed for high-security turnstile systems. It provides streamlined migration for upgrading to the most secure credential technologies by closing the gap to growing security threats with powerful, cost-effective embedded HID iCLASS SE technology that supports a wide range of credentials. T...
Viakoo, the provider of reliable system and data verification solutions, is demonstrating innovative new offerings for physical security service assurance and sustainable cyber hygiene at GSX 2018 (Booth #2943). Viakoo is showcasing two of their newest software solutions for the intersection of physical and cyber security: the new Camera Firmware Update Manager (CFUM), and the new IoT Tracker. “Many businesses are excited about upgrading or installing a new video surveillance system, but...
StoneLock, a global provider in the design and manufacture of enterprise-level facial recognition identity management solutions, announced at Global Security Exchange (GSX), the introduction of the StoneLock GO edge reader, the latest innovation in StoneLock facial recognition for enterprise physical access, and the next generation of the StoneLock True Frictionless Solution. StoneLock GO is a revolutionary biometric edge reader designed from the ground up to address the toughest authentication...
Vanderbilt, a global provider of state-of-the-art video, access control and intrusion security systems, announced it has added more functionality to its Vanderbilt Security Management System (SMS) software through a new integration with Allegion. The integration expands the reach of Vanderbilt's SMS to secondary doors through Allegion's Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options in a variety of markets, including enterprise, K-12 and university facilities. The Allegion...
AMAG Technology announces the release of Symmetry Control Room. Control Room provides a single operational window for situational awareness and managing video, alarms and events. It will integrate with AMAG’s entire Symmetry portfolio, which includes video, visitor, identity, incident management, intrusion and access control, as well as best-of-breed manufacturers that are part of the Symmetry Preferred Partner Program. Monitoring Symmetry’s platforms through Control Room delivers r...
Lenel, a provider in advanced security systems, offers an extensive set of new features and utilities with the introduction of OnGuard version 7.5. The enhanced OnGuard 7.5 access control solution deepens Lenel’s focus on unification, mobility, cybersecurity and cloud compatibility with platform updates, including enriched browser clients and a next-generation visitor management suite - all adding to its already substantial capabilities. Lenel is part of UTC Climate, Controls & Securit...
Business doesn’t stand still, but security feels static. Whether mechanical keys or wired door locks, access control doesn’t always have the flexibility a changing environment needs. When is the right time to expand an access control system? And what’s the best way to do it? Extending coverage for traditional access control is expensive and intrusive, but there is an alternative. If one wants to forget about keys and the hassles of key management, wireless locks are the fast a...
Matrix, manufacturer and believer of ‘Made in India’ Telecom and Security solutions, has been a host of a number of its maiden event Insight. This event has been conducted and used as a platform to spread the company’s reach in different markets, getting in touch with partners and prospective system integrators. Matrix Insight Indonesia 2018 Matrix is all set for yet another Insight event in Indonesia. The event will be hosted at the Shangri-La Hotel, Kota BNI, Jln. Jend. Sud...
Sequr, a cloud-based mobile access control trusted by customers such as UPS, announced Sequr Access Sync to automate perimeter security for modern buildings and offices. Sequr Access Sync intelligently connects organisations’ physical and cyber security systems to provide highly granular access management while easing administrators’ work. Physical and cyber security have historically been handled separately using different tools. In the cyber arena, everything from the CEO’s...
Security expert Abloy UK is inviting healthcare professionals to stand 239 at the Health & Care Innovation Expo 2018, to discuss innovative technologies that improve key management and security across all areas of hospital estates. Held at Manchester Central, the Health & Care Innovation Expo is the biggest NHS-led event in the calendar, running for two days on 5 and 6 September 2018. The healthcare environment can be extremely demanding, with pressure to fulfil compliance, impro...
In real life people usually don’t want to get into the drama of being seen as someone other than themselves. The misrecognition problem is not only time consuming, dignity compromising but also, in lots of cases, life threatening, if certain dangerous people are not correctly identified in time. This mistake is no longer affordable in today’s context, whether for an individual, a group or society as a whole. Fortunately, the facial recognition technology has matured, and the securit...
VisitorPoint from Maxxess is a smart visitor management solution that offers an easy but powerful upgrade for a wide range of users. For those needing to replace a basic signing-in book for the first time, VisitorPoint is an attractive, user-friendly solution with a choice of useful features. And for larger organisations looking for a multi-site visitor management solution, it provides control and audit features that are future proof, flexible, and designed to complement security, fire and buil...
The advent of cloud technology and the move toward a digitally connected world is leading towards massive growth in the way data gets generated, stored and managed. The demand for cloud based solutions is rising and the market is growing rapidly. COSEC VYOM is a People Mobility Management solution, based on cloud technology that allows users to use application, hardware and infrastructure as a service. Cloud based time and attendance system addresses solutions to the outlined issues of producti...
Hikvision, global supplier of innovative video surveillance products and solutions, is pleased to announce that it has won the bronze Protector & Wik award in the Video Surveillance category. The accolade was bestowed upon its DeepinView Indoor Dual-Lens People Counting camera (iDS-2CD6810F/C). The award is judged by the readers of the magazine and its website, making this a ‘people’s choice’ success. DeepinView Indoor Dual-Lens People Counting camera Hikvision’s Pe...
A North West demonstration venue launched by eyevis UK has generated £3million of new businesses and provided a boost to the local economy. The control room video wall and audio-visual experts launched the facility at the Business First Burnley Business Centre in 2016 so potential customers could see their ground-breaking technology in action. The control room video wall and audio-visual experts launched the facility at the Business First Burnley Business Centre in 2016 New demonstratio...
K-12 schools and higher education campuses face a number of challenges, not the least of which is the basic principle of safeguarding students, staff and faculty from emerging threats. They must strive to strike a balance between building a safe and secure environment and maintaining a welcoming one. A combination of policies and procedures for stakeholders to follow can be instrumental in achieving these goals, but it's not enough to simply lay down strategies. Manufacturers and integrators mus...
ACT365 aids the installers’ job for simple and quick installations and performing maintenance tasks remotely. When managing ACT365, the installer can view its interface from any internet-ready-device. Valuable details such as controller status, system health, possible tampering incidents, door forced, and door ajar are provided remotely, avoiding the necessity of on-site call-outs. This deliverance of ultimate control is an important context. In the 21st century, with smartphone technolog...
Attendance on Move, a feature of COSEC APTA – the mobile application of Matrix COSEC for employees, facilitates automatic attendance marking of the user. This feature works on the GPS coordinates or Wi-Fi signals received from the respective employee’s mobile device. The HR/Admin will be required to pre-define a location and save it in the Location Master of COSEC Web. As a result, whenever the user enters/exits the pre-defined location, his or her attendance gets automatically mark...
Schneider Electric, the provider of digital transformation of energy management and automation, announced the release of the latest version of EcoStruxure Access Expert, its integrated security solution. The latest edition of Access Expert is a single integrated system that allows data and controls for many building functions to be accessed within a single interface. The platform can connect systems throughout the building, including lighting controls, power monitoring, building analytics, UPS...
Data centres are a challenging domain, the success of which depends on security of client data. Most data centres store data for more than one organisation. It is very crucial for the data centres to prevent any unauthorised access of data. Matrix offers a solution whereby data racks are secured biometrically, with records of every access along with its duration. Only authorised person can access specific racks for the stipulated time using biometric verification. The solution is available in...
Boon Edam Inc., a provider of security entrances and architectural revolving doors, is demonstrating significant growth and momentum in both their product offering and their business operations this year at ISC West 2018 (booth #8037). With the expansion of their Enterprise Customer Group, a range of new integrations, and the growing adoption of anti-tailgating and piggybacking entrance tech by Fortune 50 Global companies, the company is advancing its position as the market leader in the Americ...
At ISC West 2018 on booth (#26065), Genetec Inc. (“Genetec”), a technology provider of unified security, public safety, operations, and business intelligence solutions, will unveil AutoVu Flexreader, a new offering that brings powerful ALPR (automatic licence plate recognition) capabilities to suitable IP video surveillance cameras supported by the Genetec Security Center unified platform. AutoVu Flexreader enables organisations to move beyond simple plate capture and use existing I...
AMAG Technology, a global access control, video management, identity management and visitor management solutions provider, hosted its annual Eagle Awards celebration on Thursday, April 12 in Las Vegas where it honored its top performing resellers for 2017. The resellers were recognised for their outstanding sales efforts and commitment to selling AMAG’s Symmetry security solutions. “We are grateful for our loyal partners and their commitment to selling and supporting AMAG and our ex...
HID Global, a worldwide provider of trusted identity solutions, is driving the connected workplace with new HID Location Services for workplace optimisation capabilities that help ensure the safety of building occupants, facilitate compliance and increase operational efficiencies. The company has added robust features to its HID Location Services portal to help organisations better understand who is in a building at any given time. The latest converged credential incorporates access control and...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download