You are at : Search > Articles Search Results

Articles Search Results

1318 Articles and 369 related Products found for access control

Carrefour selects Suprema fingerprint recognition terminals

Carrefour selects Suprema fingerprint recognition terminals

Editor / Provider: Suprema | Updated: 7/31/2014 | Article type: Security 50

Suprema, one of the global providers of technology in biometrics and security, announced to provide fingerprint recognition terminal, BioEntry Plus, to Carrefour Supermarkets in Istanbul, Turkey, for a new system of access control and time & attendance.

A total of 500 units were provided by Meyer, a local partner of Suprema in Turkey. BioEntry Plus is a distributed IP system terminal with the high level security provided by biometrics, which provides higher flexibility and multiple installation options for different environments.

Carrefour Supermarkets in Istanbul made use of the RF (MIFARE) card based terminal and system for access control and time & attendance management. The system, however, was not fully supportive of efficient management of access control and time & attendance for the more than 5,000 employees working at stalls located across the country.

As stalls are scattered in various regions of the nation, the HR division of the company could not accurately check and confirm employees' time & attendance as well as access control for security. Above all, the company had difficulty in controlling the behavior of employees such as ‘Buddy Punching', which employees frequently practiced by card sharing. The card duplication was not only a matter of time & attendance but also a serious issue for security as RF cards can be easily duplicated and used by unauthorized persons. Additionally, the company needed to improve management and administration efficiency and productivity because of the frequent issuance of cards due to employee loss.

The company tried to change from a system based on RF card to a fingerprint based system in order to meet the challenges and improve efficiency and productivity in administration. Therefore, it undertook a system integration project to build up a new environment/system for access control and time & attendance management. A key to the project was the selection of the optimal product for fingerprint terminals, and so an evaluation comparison of various products available in the market. As a result of this evaluation, Carrefour finally decided to select BioEntry Plus, however, as it was evaluated to be superior in performance based on Carrefour's criterion. “We concluded that Suprema products guarantee the most powerful performance with matching algorithms featuring high verification rates and verification speeds.” explained Carrefour.

“We're very pleased to provide our products to Carrefour, a global leader in the global retail industry.” Said Young S. Moon, Vice President of Suprema. “Though the project is specifically for the supermarkets in Istanbul this time, we expect it will be a momentum to bring more opportunities of business expansion for partnership with Carrefour Group internationally in the future.”

G4S and ENTERTECH SYSTEMS partner Suprema to provide enterprise-level biometric solution

G4S and ENTERTECH SYSTEMS partner Suprema to provide enterprise-level biometric solution

Editor / Provider: ENTERTECH SYSTEMS | Updated: 7/31/2014 | Article type: Security 50

ENTERTECH SYSTEMS and G4S Technology have announced a technology partnership that combines ENTERTECH SYSTEMS identity management and Suprema biometrics with G4S security solutions, providing a robust offering to UK customers. ENTERTECH SYSTEMS is the official operating partner for Suprema in the United Kingdom, Ireland, United States, Canada and Puerto Rico.

G4S Technology is one of the foremost innovators and supplier within the security industry providing fully integrated Access Control, Video Management, Life Safety, Perimeter Protection and Alarm Management Systems. Providing an end to end solution, G4S Technology designs, develops, manufacturers, installs and maintains systems protecting small offices and colleagues through to complex government facilities and high security environments. Symmetry is the advanced Access Control and Video Management system from G4S Technology and is used by millions around the world on a daily basis.

“This new partner relationship fits perfectly with our own focus on excellence in technology and customer service,” says David Ella, VP of Technology and Marketing at G4S Technology. “With UK-based support from ENTERTECH SYSTEMS, our installers and customers can easily tap into the benefits of sophisticated Suprema biometrics.”

The integration of Suprema biometric devices and the ENTERTECH SYSTEMS BioConnect application with Symmetry provides more efficient, user-friendly access control for G4S customers. Instead of having to manage badge records in two different systems (one for the access control panel and another for the biometric templates), BioConnect seamlessly syncs users between the two systems. Using a simple enrollment window, they can search for a user/badge and add biometric templates.

Designed for organisations of any size and suitable for all applications, Symmetry delivers the latest technology in a proven, scalable, fully integrated system which can be managed from one easy to use software application. Unlike some other security systems, Symmetry features a wide range of advanced applications as standard including Visitor Management, Badge Production, interactive Graphical Maps as well as the most comprehensive Access Control solution with Anti-Passback and all the other features that would be expected by large organizations.

“Like us, G4S Technology understands the growing need to maximise efficiencies and reduce costs for customers through leading innovation and truly responsive customer service,” says Rob Douglas, CEO of ENTERTECH SYSTEMS. “We look forward to working with them to deliver next-generation biometric access control to the UK market.”

The Suprema line of biometric devices, which includes fingerprint detection, card and PIN readers and ENTERTECH SYSTEMS' BioConnect application, is now available through G4S Technology. Applicable Suprema biometric readers include BioStation T2, BioStation, BioEntry Plus, BioEntry W, BioLite Net and BioMini.

Out with Keys, in with Smartphones

Out with Keys, in with Smartphones

Editor / Provider: EIFEH STROM, a&s International | Updated: 7/29/2014 | Article type: Hot Topics

The idea of wireless locks is picking up in the residential sector as interest in smart homes grows. Taking advantage of this are several companies who have come out with smart locks for home use. By taking advantage of consumer desires for convenient, mobile solutions, smart locks are making their home debut.

Wireless locks are finding their footing in more verticals. That includes the residential sector, which is seeing some traction in wireless lock adoption. With the mobile trend playing a big role in the smart home and home automation market, as well as the desire for everything to be more convenient, keyless locks seem like a natural next step. Enter smart locks. As the popularity of smart homes continues to grow and the number of smartphone users continues to multiply, the convenience of being able to control everything from lighting to entertainment from a smart device has become more than just novelty: it's become a requirement.

Smart locks that use smart devices as keys may sound like a practical idea since physical keys are easily lost and copied; however, security concerns regarding automatic unlocking and lost phones, among others, makes some consumers nervous. So, is there a market for it? According to Chris Bone, VP of Access Control Solutions for EMEA at ASSA ABLOY, there seems to be. “In the residential sector, it's more about local attitudes to keyless entry,” pointed out Bone. “Scandinavia and parts of Asia, in particular, have been early adopters of wireless entry systems. But these new technologies are moving up the agenda everywhere. Mechanical keys are an old-fashioned technology and people are looking for new solutions that make sense in a digital world.” Currently the most talked about and/or most anticipated smart locks on the market include: the August Smart Lock, Goji Smart Lock, Lockitron, and Kwikset Kevo powered by UniKey.

Startups Cash In
Even though the market for smart locks is new, there is definitely a following of techies eager to get their hands on the technology. As a result, several startups have seen strong support by curious and anxious consumers. Startups like August, Goji, and Lockitron have all become well-known names in the smart lock realm. However, the newness of the smart lock idea is made apparent when trying to buy one from any of the aforementioned companies, as delays have plagued all three of the companies, not an uncommon occurrence for startups. Regardless, the promise of these products and their innovation are keeping home automation and smart home consumers intrigued.

Deadbolts Get Dresse d Up
There are several types of smart locks coming out for consumers to choose from. Things to consider when choosing a smart lock include preference for a lock made to fit over an existing deadbolt or one that replaces the deadbolt. Also, consideration of what type of deadbolt is already in place needs to be made if retrofitting is the chosen option, as certain solutions only work for single-cylinder deadbolts. For example, the August Smart Lock can only be retrofitted onto a single-cylinder deadbolt — the most common type of deadbolt found in North America — and is not compatible with mortise or Europeanstyle cylinders. For those not in North America or with other types of deadbolts, offerings like Goji's smart lock that replaces the existing deadbolt claims to fit most doors in the U.S. and Europe, according to their website. Questions regarding whether a certain smart lock will fit an existing door can be addressed by each individual company, all of which offer to assess whether or not their solution is compatible if a photo of the existing deadlock is emailed to their support team.

Smart Connections
Other things to consider when choosing a smart lock is the type of wireless communication protocol the lock uses. By using popular communication protocols such as Bluetooth low energy (Bluetooth LE), Z-Wave, and ZigBee, lock companies are looking to appeal to consumers by providing them with easy ways to connect with the protocols most commonly used in home automation and smart home devices.

Bluetooth LE
Like Classic Bluetooth, Bluetooth LE is able to maintain a similar communication range using the same 2.4 Ghz frequencies; however, compared to Classic Bluetooth the amount of power consumed by Bluetooth LE has been considerably reduced, making it ideal for home and security applications such as smart locks. However, one drawback is that Bluetooth LE, also known as Smart Bluetooth, is only available on newer smartphones. For example, Bluetooth LE is available on iPhone 4s, which debuted in October 2011, and newer models, but is only available on Android 4.3 and later, which was only released in July 2013. However, it is interesting to note that even though Bluetooth LE is still quite a new communication protocol, it is the most widely used for smart locks. In fact, August, Goji, Kwikset Kevo, and Lockitron all use the Bluetooth LE protocol. Moving forward, the number of compatible devices will only grow, making Bluetooth LE a good option for smart locks. Overall, popularity of the Bluetooth LE protocol is expected to continue growing, with ABI Research predicting the number of Bluetooth LE devices to reach 133 million by 2018.

Z-Wave
Z-Wave is one of the most popular wireless communication protocols used in the residential market. ABI Research noted that Z-Wave enjoys support from consumers, particularly in the DIY segment. The interoperability of Z-Wave's wide portfolio of vendor products gives consumers more choices regardless of the distribution channel or supplier, which is a huge plus. Again, though, despite widespread use with home automation and smart home devices, none of the previously mentioned four smart locks is Z-Wave compatible. The Danalock by Poly-Control, a Denmarkbased company, however, is Z-Wave compatible.

ZigBee
ZigBee, a global, open, low-power, wireless mesh networking standard, is one of the most popular when it comes to home devices. In 2012, ZigBee dominated IEEE 802.15.4 and claimed the top share of node shipments at 4.5 million, according to an August 2013 report by ABI Research. Despite its popularity among home automation and smart home devices, Goji's smart lock is the only one among some of the most talked about smart locks that offers ZigBee compatibility. This may come as a bit of a shock considering that ZigBee is one of the most commonly used communication protocols for home automation and smart home devices. However, considering that not even all ZigBee devices are interoperable, maybe it isn't so surprising.

No Smartphone? No Problem!
Just because the lock is smart does not mean a smartphone is required to use one. Both the Kwikset Kevo and Goji Smart Lock have key fobs available for those without compatible devices. The Kevo fob provides the same touch-to-open feature as an authorized smartphone via Bluetooth LE. A fob comes with the Kwikset Kevo lock and is pre-enrolled with the lock, allowing users to simply press and release the fob's enroll button to activate it, according to their website. In a similar fashion, Goji offers electronic Bluetooth fobs for purchase separately through their website.

Safety First!
As with any technology, concerns regarding the security and safety of smart locks have risen, giving some consumers pause. For the most part, security does not seem to be a major concern for these companies, assuring their products are secure. For example, Goji's website states it has implemented communication protocol and data storage security in accordance with bank industry standards and best practices, which includes public/ private key exchange, 256-bit encryption, and multiple layers of security. Additionally, Goji's mechanical lock is UL-compliant. Similarly, Lockitron and August assert that they use the same security protocols used in electronic banking and robust encryption. Does this mean that these locks are hack-proof? No, but nothing really is, and anyone wanting to hack them would have to go through a lot of trouble. One particular security concern for many is “What if a stranger comes to the door? Will the door auto-unlock when I approach the door?” Most companies say that the option to auto-unlock is optional and can be turned off. This “solution,” though, relies on the fact that users will remember to turn off the function once they are home. To address this problem, the Kwikset Kevo is equipped with the unique patentpending Inside/Outside Intelligence technology. This unique solution claims to be able to detect whether or not the authorized device is inside or outside the home before granting access. Therefore if the device is detected to be inside, approaching the door will not unlock it, preventing unauthorized access. Other common questions such as “What if my phone battery dies?” and “What if I lose my phone?” are also causing consumer distress. Smart lock makers have tried to make this “problem” a non-problem by allowing user to access their accounts through other smart devices or call a customer service line so they can deactivate lost keys. This is exactly the approach Goji took; a simple phone call to Goji's call center or logging into one's account via another smartphone allows a person to disable access to the lost phone.

Don't Throw Your Mechanical Key Just Yet
Smart locks are new and innovative, but new is the key word here. Like any new technology, time is needed to work out the kinks and for the technology to mature. Integration will eventually have to be better addressed as out of the four smart locks mentioned, only the Goji Smart Lock is compatible with one of the two most widely used communication protocols for home use; although, the Kwikset Kevo powered by Unikey has plans to eventually provide ZigBee and Z-Wave compatibility. While compatibility with ZigBee and Z-Wave maybe in the works for the others, other compatibility issues exist as well. Lockitron claims to work with any smartphone, saying older phones can use Lockitron through text message commands, but Lockitron has been experiencing massive delays in shipments, so reviews are still sparse. Goji specifies compatibility with “modern” iPhones — 4s and newer — and Android 4.4 phones with Bluetooth 4.0 ability, but that still leaves out a wide range of smartphones. Similarly, the Kwikset Kevo app is currently only available for download on Apple products including iPhone 4s and newer, as well as newer generations of iPod Touch and iPad; however, an app for Android and Blackberry is underway. Despite these things, in a world where everything is getting smarter and convenience is becoming a standard, smart locks, in time (maybe a long time), could be the next big thing. Until then, don't throw out your mechanical keys just yet.

 

Shanghai Metro adopts TDSi EXpert solution

Shanghai Metro adopts TDSi EXpert solution

Editor / Provider: TDSi | Updated: 7/29/2014 | Article type: Infrastructure

With successful installations already in full operation on Shanghai Metro's Line 6 and Line 9, security specialist Beijing STY turned again to access control specialist TDSi's products, in partnership with its distribution partner in China, ZDX, to provide a fully integrated security solution for installation on Line 7.

Shanghai Metro is one of the newest and fastest growing rapid transit systems in the world, with 329 stations and over 538km of track running both above and underground making it one of the longest in the world. On average, well over six million passengers use the system everyday – with potential future expansion set to see that number increase.

Line 7 connects the Baoshan District with the city center and Pudong District. Significantly, it also provided a vital link to the site of the World Expo, which was hosted by Shanghai in 2010.

Beijing STY, in conjunction with TDSi and ZDX, had already developed and supplied fully integrated access control solutions for Lines 6 and 9. Each Line is served by over 40 stations as well as its own Operational Control Center (OCC), with around 2,000 doors secured and controlled by TDSi's systems on each line.

Commenting on the program, TDSi's Managing Director, John Davies said: “The Shanghai Metro is a very significant and high profile infrastructure program, representing one of the largest access control projects across the whole of China. With two lines having already been in operation using TDSi solutions for over a year, we were delighted that Beijing STY chose to use TDSi products and services again for the project on Line 7. The project win and implementation are a prominent demonstration of Beijing STY's security expertise and knowledge, along with the performance and quality of our systems, in very demanding conditions.”

The access control solution for the project features TDSi's EXpert controllers, EXgarde Enterprise software platform and MIFARE smart card readers.

Specified for its proven performance in high capacity applications, EXpert delivers a fully featured and networkable system. Each controller has a capacity of up to 48,000 cards and provides fast and effective access control to projects such as the Shanghai Metro, which has consistently high volumes of users passing through multiple access points.

The OCC and each station's controllers are programmed via EXgarde Enterprise, TDSi's advanced access management software application. Each station is capable of operating independently of the server in cases where communications are lost - a key requirement in the specification for this particular project.

Featuring database replication for powerful disaster recovery capabilities and total peace of mind, EXgarde Enterprise allows all real-time events and system parameters to be stored both at the main server in the local OCC and at each individual station.

However should communications be lost between the center and any of the individual stations, changes and events are stored at the local stations until communications to the main server are re-established, at which point, the databases are re- synchronized.

EXgarde Enterprise allows the system to be managed centrally, even where the Wide Area Network (WAN) may be of variable quality, effectively removing the risk of single point failure.

TDSi MIFARE smart card readers are employed throughout each Line. Providing true contactless technology, the readers provide an extremely cost efficient, highly reliable solution that also allows for straightforward expansion in the future—for example, allowing the same access control card to be used for cashless vending and car park management, offering users a true, one-card solution.

Hikvision receives Lenel Factory certification

Hikvision receives Lenel Factory certification

Editor / Provider: Hikvision | Updated: 7/25/2014 | Article type: Security 50

Hikvision Digital Technology has been recertified by Lenel Systems International for the interface of its latest Internet protocol (IP) camera series and high-definition (HD) speed domes with the most recent versions of the Lenel OnGuard access control system.

This expanded certification provides live video viewing, motion detection, tampering detection, audio input and alarm input/output from Hikvision IP cameras and speed domes available with OnGuard systems.

“Hikvision has completed required factory testing at Lenel to validate the functionality of its interface to the OnGuard system. This integration benefits our customers to combine their access control and Hikvision video surveillance systems,” said Gidon Lissai, director of strategic alliances, Lenel. “We look forward to their continued involvement in the Lenel OpenAccess Alliance Program.”

“The certification allows customers to access a bevy of advanced features from various Hikvision camera models that interface with an OnGuard system,” said Keen Yao, international marketing director, Hikvision. “Therefore, we are able to offer them more enhanced and value-added IP video surveillance solutions to help grow their business.”

Hikvision IP cameras and HD speed domes include the easy-to-use two-line HD IP series, 4-line professional Smart IPC series and 30x Smart Tracking PTZ domes, providing users versatile solutions for different surveillance application needs.

Wireless locks bring flexibility to electronic Access

Wireless locks bring flexibility to electronic Access

Editor / Provider: BY EIFEH STROM, a&s International | Updated: 7/22/2014 | Article type: Hot Topics

The many benefits of wireless locks are becoming more apparent as electronic access control continues to gain popularity. Without extra wires and cables, wireless locks can provide many different verticals with an electronic access solution that is not only more cost-effective, but allows for more flexibility as it is easier to implement and manage.

"7.4% estimated growth for global access control in 2014" ---Source: IHS

In 2014 alone, IHS estimates a growth of about 7.4 percent for the global access control market, including electronic locks (mechatronic, digital cylinder, and electromechanical). The rise in electronic access control adoption is paving the way for wireless access devices like wireless locks to come into play. Whereas electronic access control systems still require expensive cabling and wiring, wireless solutions provide a less price-inhibiting solution for prospective users. Without the need for extra or new cablin+g or wiring, wireless devices such as wireless locks are making electronic access control possible for those looking for a more efficient, convenient, and cost-friendly solution.

Type s of Wireless Locks
While there are several ways to differentiate between different types of wireless locks, one way is by how they communicate to the controlling software, according to Daniel Stewart, Product Integration Manager at Stanley Security, a division of Stanley Black & Decker. Naming three of the “key varieties” in the current market, Stewart noted that each standard has positive aspects and drawbacks. Ultimately, “The decision a user usually needs to make is one of convenience versus control.” Aside from communication standards, wireless locks can also be categorized by physical make-up. For example, for commercial use there are electronic cylinders, escutcheons, handles, and locks paired with RFID readers. They can also be customized with different credential readers including keypads, magnetic stripes, or multi-technology that can read both proximity and smart technology, explained Karen Keating, Portfolio Marketing Manager of Electronic Access Control at Allegion. “Wireless locks can combine all the hardware components required for a complete access control system into one integrated design that includes the electrified lock, credential reader, request-to-enter and -exit sensors, door positions switch, and more.” This type of integrated design can save both time and money when installing a system.

Who's Going Wireless?
The earliest adopters of wireless access products have been the higher education and healthcare markets. Both of these verticals have benefited immensely from wireless systems as both have thousands of doors that need to be secured without breaking the bank. Keating pointed out that wireless solutions solve many installation restrictions in healthcare, education, and historic buildings, which include limitations on where drilling and laying wire can happen. Aside from healthcare and education, Keating added, “Whatever the industry, wireless is becoming the prescription for getting more doors covered and extending the present access control system, especially when the facility requires something that is not too invasive and can be easily installed.” Chris Bone, VP of Access Control Solutions for EMEA at ASSA ABLOY, noted that “Large commercial applications of wireless access technologies are ideally suited to any premises that, firstly, have lots of keys and, secondly, have a wired access control system already in place.”

Why Go Wireless?
One of the biggest positives of wireless access control is that it is very affordable to install, according to Bone. Not only is it affordable to install but affordable to run, especially when compared to wired solutions. “Wireless locks are battery operated and only ‘wake up' when prompted by digital credential. Wired doors need to be permanently connected to main power and that makes them expensive,” added Bone. “Wireless access saves you money, and that, I think, is a major reason why demand is growing in every vertical.”

Not only can wireless locks save money, they can also save electricity. As pointed out, wireless locks are battery-operated devices. This, according to Stewart, reduces the electrical load that a building will be pulling to support the access control system. “Some end users have utilized wireless locks to fall in line with green initiatives that they have for their building structures.” This makes wireless locks a great solution for commercial buildings looking for energy savings and better energy efficiency. Savings from wireless solutions also allows integrators to help facility professionals extend the reach of their card-based systems at a cost that used to include extra materials and increased labor, stated Keating. “Wireless helps migrate the present access control system so that it can be used for more doors as well as mobile mustering, remote areas, gates, elevators, and other unique applications that have been heretofore impracticable to install or too expensive.”

Wireless Hurdles
Easier to install and more cost-efficient make installing wireless locks sound like a no-brainer; however, this is not the case. “The recent progress in microelectronics has enabled wireless technology adoption at a reasonable cost for lock manufacturers, but, still, there are debates about standards and interoperability of systems which causes most customers to refrain from making a decision,” said Rocco Vitali, Product Manager of Electronic Products at ISEO.

In addition to interoperability concerns, security remains a top reason for user uneasiness. In reaction to these concerns, Christoph Karl, Product Manager at EVVA, assured that providing high security access solutions is his company's top concern. “Thus we are only relying on high security encryption standards such as MIFARE DESFire EV1, HTTPS connections, end-to-end encryption, and high security smart cards.” Karl also stressed the need for potential users to “look behind the facade and find out about the security features” of wireless locks, as users are “quickly drawn by the looks of a product but that does not tell whether the lock will fend off illegal opening attacks.”

Misunderstandings, according to Stewart, such as the realization that wireless locks are not a real-time access control device, are also an obstacle. “Every wireless device is ‘offline' with its controller at some point,” he explained. “If it is not, the batteries used to power them would expire in days instead of months.” As a result, control of products and updates sent to them is dependent on when they communicate back to get this information. For this reason, wireless access devices are not suitable for perimeter security.

Future of Wireless Locks
Growth for wireless locks has been in the double digits, according to Keating. Regions such as Europe, the Middle East, Africa, and APAC are among those seeing a particular rise in demand. IHS attributes this to the need for “low-cost products that are valuable” in lower-end/underdeveloped markets. Although wireless locks are making a play for the security industry, they will, however, not be taking over mechanical locks any time soon. According to IHS, “Despite the growing popularity of access control systems driving the adoption of electronic locking devices, mechanical locks are not projected to falter any time soon.” Regardless, the many benefits of wireless locks make them a desirable choice in certain verticals and environments, such as higher education and healthcare. However, as wireless technologies mature, adoption by more verticals will continue. Additionally, the flexibility and adaptability of wireless locks will continue to drive growth, leading to a wider variety of wireless locks in the future.

Three Key Communication Standards for Wireless Locks
Daniel Stewart, Product Integration Manager at Stanley Security, a division of Stanley Black & Decker, outlined the three key communication standards most commonly used in today's wireless locks.

Wi-Fi: Wi-Fi locks utilize a user's existing wireless network installation to communicate with the controlling software. Deployment of Wi-Fi locks is easy for a user to do because there is very little infrastructure that would need to be added. The majority of users today have an existing Wi-Fi network with ample coverage of their buildings. Deploying Wi-Fi locks then allows the user to simply install the locks and connect them to the network. The downside to Wi-Fi locks is that it is a very power hungry protocol. This limits the frequency that the locks can communicate to the controlling software down to only a few times a day, in order to be able to maintain a reasonable battery life.

900 MHz: 900 MHz locks utilize a frequency outside of the majority of wireless devices today in order to maintain clear communication with the devices. In a typical 900 MHz configuration, the wireless lock communicates to a receiver that will translate the signals from the lock and output them to the control panels for the access system that communicate back to the software. The frequency wave and power behind a 900 MHz signal allow for long and more thorough penetration through a user's building, helping to maximize their investment by reducing the number of receivers that are needed. The downside here is the infrastructure that needs to be added to a facility to support the installation of these products. Wires need to be run between the receiver and the access control panels to facilitate their communication.

Zigbee (802.15.4): This is a low-power wireless protocol that utilizes the same frequency range as Wi-Fi. This protocol allows for channel selection outside of the standard Wi-Fi channels, though, to facilitate interoperability with the existing Wi-Fi devices — for example wireless computer networks — that a user may have in place. The protocol's low-power consumption allows these locks to communicate more often, as frequently as every minute, and maintain a reasonable battery life. The typical installation requires a receiver that will connect to a user's Ethernet network to communicate back to a controlling software. Range from the receiver to the wireless lock is comparable to the range that a user would have with a Wi-Fi lock from a wireless access point. The downside to these products is, again, the infrastructure that needs to be put in place to facilitate communication to the controlling software.

Wireless Lock 411 for Integrators
Wireless locks present a unique challenge to installation teams and users who are deploying them, according to Daniel Stewart, Product Integration Manager of Stanley Security, a division of Stanley Black & Decker. “This challenge results from an inability to physically see the wireless environment. With hardwired locks, it is relatively easy to troubleshoot the wire that runs between the device and the controller to identify any challenges. With wireless locks, the environment cannot be surveyed as easily.” An understanding of this is crucial in order to “adequately evaluate the frequency spectrums that their product uses for communication,” added Stewart. Additionally, because these wireless products are not inherently connected to the access system, updates, configuration changes, and commands sent to the locks may have a delay, which is important to realize. This needs to be taken into consideration when deploying a wireless lock solution. Karen Keating, Portfolio Marketing Manager of Electronic Access Control at Allegion, further pointed out that integrators need to do their homework upfront. “They have to understand the IT infrastructure. Are there additional costs that might be incurred for an additional node? There are advantages and disadvantages to every wireless approach out there. What do they need and what problems are they looking to solve? What is the initial budget? What is the ongoing cost budget? Make sure the solution is appropriate for the client.”

 

HID Global teamed Eid Passport supplying identity management system

HID Global teamed Eid Passport supplying identity management system

Editor / Provider: HID Global | Updated: 7/22/2014 | Article type: Security 50

HID Global announced that it has teamed with Eid Passport, a market leader in high-assurance identity management solutions and the largest commercial provider of vendor credentials at military facilities, to supply Eid Passport with its ActivID Credential Management System (CMS) for Eid Passport's new Personal Identity Verification – Interoperable (PIV-I) managed service.

Eid Passport's service is targeted at commercial, government and military organizations that require the highest levels of identity assurance to secure sensitive physical and logical assets. Recently, the U.S. Navy awarded a contract to provide credentialing support for the Navy Commercial Access Control System (NCACS), its contractors, vendors, suppliers and service providers who seek entry to naval facilities. To meet the needs of the U.S. Navy and other customers for its PIV-I service, Eid Passport has worked with HID Advantage Partner Axiad IDS to integrate ActivID CMS into its service for secure provisioning of the cards.

“We look forward to working with Eid Passport, which is a Level 4 PIV-I issuer – the highest level of identity assurance possible,” said Eric Widlitz, managing director of Identity and Access Management, North America with HID Global. “With the integration of HID Global's pivCLASS credentials and ActivID CMS with the Eid Passport's RAPIDGate Premier solution, Eid Passport is able to ensure that third parties working at high-security government installations have been thoroughly screened, vetted and issued a PIV-I credential before they arrive on site.”

Provisioning the cards using HID Global's ActivID CMS makes it easy to define and apply policies to manage data, applets, and digital certificates across the entire lifecycle of a card. ActivID CMS is easily integrated into an existing security infrastructure, and can scale to millions of credentials in complex, distributed environments with multiple user groups.

Top 3 myths of physical access control technology

Top 3 myths of physical access control technology

Editor / Provider: Ola Jonsson, Business Development Manager, Axis Communications | Updated: 7/21/2014 | Article type: Hot Topics

It is no exaggeration to say that network video has revolutionized the video surveillance market. Now the access control industry is on the verge of a similar development. Once again, it is the transition from analog to IP-based systems and with it the adoption of open standards which provides new opportunities and stimulates market growth.

Since the introduction of the first network camera in 1996, the market share of IP-based video surveillance systems has increased year by year. Today, network video solutions offer a host of benefits and advanced functionalities that cannot be provided by analog video surveillance technology.

There are a number of common misconceptions as the physical access control industry undergoes a similar transition from analog to IP-based technology. In the following, I will address the top 3 of these myths.

Myth #1 - It's not worth upgrading existing analog systems to IP-based technology
A typical analog access control system is dependent on having each device – card reader, handle, door lock, door position switch, etc. – hard wired with RS-485 cable into one central unit or central server. Besides being proprietary systems, which confines the end user to one single provider of hardware and software, these solutions often tend to be very complex and require expert personnel to handle installation and configuration.

Furthermore, when expanding analog systems the process is complicated by the need to consider that a typical central controller is built to accommodate a certain maximum number of doors, normally 4, 8, 16 or 32. Not only does this limitation make the system inflexible but also makes it difficult for the end user to match his requirements with products available, e. g. if there is a need for access control at for example 9 or 17 doors. This lack of flexibility also brings high marginal costs, which can make the addition of one extra door unjustifiably expensive.

Upgrading an analog access control system to IP-based technology therefore allows for more flexibility while lowering costs as the system needs to be expanded to include additional doors. IP networks can be used for more than one application. This way different security systems can use the same infrastructure and can be integrated with each other. Often remote monitoring and management of security systems is a key requirement. This can be easily implemented with IP-based solutions which feature web-based console access.

Myth #2 - Access control systems are only for large installations
Analog access control products and systems are normally designed and optimized for large installations with a lot of doors and maybe thousands of credentials (cardholders). The actual market looks very different. According to the Security Sales & Integrator Gold Book 2013, the average installation consists of 7 doors with less than 130 credentials. Only about 20% of the installations have more than 10 doors.

Without the need for hard wiring to a central control unit or central server, IP-based access control systems enable installations that are very flexible and scalable. This means not only a more versatile solution, but also a more cost efficient one. Freed from the constraints of enlarging the system in certain multiples, a network-based solution can – should it be necessary – be enlarged by one door, and one reader, at a time.

Additionally, IP-based technology enables “edge” solutions. An edge solution has one controller for each door, which is then connected to the existing local Ethernet through a regular network switch without the need for a central server for management. Since IP networks now are ubiquitous in offices, stores, factory plants and similar facilities the cost of adding an IP-based door controller would be minimal, as opposed to multiple serial connections wired back to a central server. Cabling work can be even further facilitated. By employing a PoE (Power over Ethernet) supported controller at each door the need for a separate power cable is eliminated, thereby reducing the total installation cost and time compared to that of an analog access control solution.

Myth #3 - Access control systems are proprietary solutions that can't be integrated with other security systems
Very much like in the video surveillance market the shift from analog to IP-based technology in the access control industry will cause a transition from proprietary systems to open solutions. And these solutions will most likely be based on international industry standards.

Open solutions and standardized interfaces are a prerequisite in any industry that wants to establish its own equivalent of "plug-and-play". There are many gains from such a development also in access control. It will allow end users to freely pick and choose between components – reader, door controller and software – that best satisfy their needs and preferences. This freedom of choice makes the system future-proof and means the end user no longer has to rely on a single brand or supplier. Equally important, it can also enable integration with other security related systems and third party applications, without the need for costly hardware boxes to provide the “bridge” between the different systems. For example, a very common request is to integrate physical access control with video. People entering a building will automatically trigger a camera; the live images can then be used for investigation of incidents or identity control.

In the network security systems market there is already a clear trend to develop open or standardized application platform interfaces (APIs), which can be used by all competing market participants on fair, reasonable and non-discriminatory terms. Naturally, this will increase supply and promote competition and bring a new level of innovation to the industry, while simultaneously making it even easier for end users, system integrators, consultants and others to take advantage of the different possibilities offered by IP-based solutions.

For example, the Open Network Video Interface Forum (ONVIF), which is a global and open industry standards body with the goal to facilitate the development and use of IP-based security products, announced in 2010 an extension of the organization's scope of standardization to cover physical access control. Ideally, access control devices from manufacturers that comply with the ONVIF standards will in the near future interoperate effortlessly and seamlessly with each other, as well as with other video surveillance products and systems conformant with the standard.

Future outlook
According to a market forecast by analyst firm ARC Advisory Group, IP-based access control systems will comprise more than 35% of the market in terms of shipments by 2016. A key factor will be that new buildings are increasingly being equipped with IP-based building control systems. This provides the basis for integration of previously often separate systems such as access control, intrusion detection, fire alarms or video surveillance.

Open standards and the ability to base different security systems on the same IP network architecture allows installers to build solutions based on products from various manufacturers. This way they can better meet customer demand, price projects more competitively and offer custom solutions to particular installation challenges and requirements. End users benefit from a future-proof and adaptable technology that can easily scale to their growing needs without being locked into any one manufacturer.

Birmingham Airport converted to IP surveillances with IndigoVision

Birmingham Airport converted to IP surveillances with IndigoVision

Editor / Provider: IndigoVision | Updated: 7/21/2014 | Article type: Infrastructure

When the Senior Executives at Birmingham Airport were laying out plans to increase passenger numbers and improve operational efficiency, it became clear that the existing system and infrastructure would be unable to meet these demands.

Background
When the Senior Executives at Birmingham Airport were laying out plans to increase passenger numbers and improve operational efficiency, it became clear that the existing system and infrastructure would be unable to meet these demands.

With six separate control rooms spread across the airport already, further growth would make it difficult to co-ordinate security efficiently.

The decision was made to streamline security operations, with a single control room monitoring the entire airport. This would require the deployment of a new security system, with IndigoVision's complete end-to-end solution as its backbone.

Solution
Most of the existing analogue cameras were replaced with IndigoVision Enhanced IP cameras, while the remaining analogue cameras were converted to IP using IndigoVision Encoders. Since all of these devices employ IndigoVision's world class video compression allowing video to be streamed over minimal bandwidth.

The ability to view and control cameras from any point onsite has allowed Birmingham Airport to reduce its number of control rooms from six to one, removing communication barriers and increasing operational efficiency.

In addition, IndigoVision's open integration means that other elements of the system such as access control and alarm management can be managed through IndigoVision's Control Center software.

“We're delighted with the new system, the return on investment was outstanding,” enthused Airport Control Centre Manager Chris Wilson, “After nine months, the IndigoVision system had paid for itself. With IndigoVision's Distributed Network Architecture we can easily increase camera numbers, aligning security with Birmingham Airport's long-term vision.”

Benefits
* World class video compression technology in both cameras and encoders delivers amazing video quality, at exceptionally low bandwidth. Cameras can be viewed and controlled wherever they are installed. 
* IndigoVision's Control Center management software seamlessly integrates with other security systems, such as access control and alarms, allowing management from a single user interface.
* IndigoVision's Distributed Networked Architecture (DNA) removes the need for a management server. Additional cameras are easily added to the system, with minimum configuration and no system downtime. With DNA, the system can manage up to 100,000 cameras.

Market demand spurs versatile commercial building solutions

Market demand spurs versatile commercial building solutions

Editor / Provider: a&s Editorial Department | Updated: 7/14/2014 | Article type: Hot Topics

In Asia, the commercial building market has relatively strong potential compared with other parts of the world as private funds, such as those in the U.S., have been showing great interest in the region in recent years. Some US private funds are either buying commercial properties in countries like Singapore or taking on new construction projects. Due to a great number of new constructions in Asia, the demand for integrated building automation (BA) systems are also on the rise.

INTEGRATED BA SOLUTIONS WITH SECURITY
In some developed economies like Singapore and Hong Kong, office buildings and financial buildings are common types of commercial structures. Office buildings can range from state-of-the-art skyscrapers housing regional headquarters of multinational corporations (MNCs) to mid-end buildings accommodating small and medium enterprises (SMEs). Financial buildings are those whose tenants are banks and financial institutions.

Office buildings used as regional head offices and financial buildings are the types that would resort to an integrated solution that bundles security and BA systems at the same time. As to the commercial building market in Asia, where building codes are not as clear as those in Europe or North America, what devices and functions should be included in an integrated system and how they should be done are largely dependent on the whims of building owners. But in general, the integrated BA solutions which highlight the improved energy efficiency and identity management is getting popular in these countries.

Identity Management in High Demand
The type of commercial buildings whose occupants are MNCs are required to protect physical and non-physical intellectual property, since the wealth of intellectual property, be it product prototypes, business letters, or customer information, can fall prey to break-ins and database infiltration. Moreover, the flow of of the outsourcing trend among some MNCs has caused a need for stringent security control. On the other hand, financial buildings that have safety deposit boxes, ATM machines, counters, and employee offices all within one construction also demand rigorous control as cash and client profiles require extra protection.

Therefore, a highly-integrated security solution focusing on identity management has become an answer to the protection of intellectual property, cash, and crucial client information. Identity management is an integrated solution that coordinates BA systems, security hardware, and oftentimes, biometric identification. Patrick Lim, Director of Sales and Marketing at Ademco (Far East) put it this way: “The management of identity using several ID technologies is important as not a single piece of information can properly authenticate an identity.”

What makes identity management so special in a highly-automated building is that as BA leaves the control of a building's access and other security matters to a computeroperated system, identity management, oftentimes with the help of biometrics, exerts a more humanized influence to the system.

Besides, identity management also works with a BA system to provide a customized environment for an individual. Lim took a CEO's office as an example. When a CEO steps into a building, the executive lift is already there waiting for him/ her and their office has been tuned to his/her preference upon arrival (e.g. the blinds are opened to allow in more sunshine).

Energy Efficiency Becomes Unique Selling Point
Both headquarters and financial buildings have added energy saving to in their integrated solutions. Ricky Law, Account Manager at Ensec Solutions, said lighting controls can go with access controls to achieve light saving functions, such as switching lights on and off with an access control card. Lighting controls can also be bundled with a building's heating, ventilation, and air conditioning (HVAC) systems for more energy savings.

New building projects in Asia's developed countries are also increasing demand for a highly automated security and energy saving systems. “Developers and engineering consultant firms [are] looking for energy saving and a more cost effective solution for building projects,” Law said, noting that the incorporation of more energy saving functions into an integrated automated security solution can be a selling point to new construction projects. In new constructions, energy saving functions like how lights and air conditioning systems should be controlled and preconfigured in the BA system have been considered in advance when buildings are under construction.

However, for SMEs, instead of occupying the whole or part of a commercial building, they are often only tenants of a floor or sometimes just a room. Energy saving “can be too rigid and creates inconvenience to tenants,” said Lim, referring to the complexity of integrating too many functions into existing building.

The re-modeling and re-deployment of pipes and wires in buildings can be a painstaking process, not to mention all SMEs in the building have to sit down, make negotiations, and reach agreements to get an integrated system done.

In addition, money is also an issue, Lim said. “The high cost of some of these systems can prevent smaller buildings and cost-sensitive organizations from adopting energy saving solutions,” he explained.

SECURITY PLATFORM SECURES MULTIFUNCTIONAL BUILDINGS
Developing countries are investing heavily in their shopping centers and retail stores as it is the most efficient way to bring cash in. Building fancy malls and enticing tourists to buy have become a fast lane towards economic growth for countries like Thailand, which is a self-proclaimed “shopping paradise.” The shopping industry in Thailand is so strong that one of the country's mall developers, Central Pattana Pcl (CPN), is actually expanding its business to other parts of Southeast Asia and building shopping malls in Malaysia in 2016, followed by more shopping centers in Indonesia and Vietnam, according to Reuters.

The vibrant shopping industry in Thailand has brought in the demand for multifunctional buildings, where shopping centers occupy the first few floors while companies and other type of offices take up the upper layers of the building. The massive flow of shoppers downstairs and office workers upstairs have created a special demand for security.

The latest security solutions in multifunctional buildings in Thailand are adopting a security platform, close to the concept of physical security information management (PSIM), integrating all security data obtained from surveillance monitoring devices at all entrances and elevator doors, according to Nuttawaj Chieobangyang, CEO at Coretech Corporation, a security solution distributor in Thailand. This allows for “easy control and checking of all events inside the building.”

The security platform can grant different levels of control according to different layers of activities in the building. It can set a tighter control for company offices upstairs and less control to shopping centers downstairs. Aloysius Loy, MD at ACTAtek, a service provider of web-based security solutions, stressed that a security platform is able to provide a more comprehensive picture of a building's security conditions as the solution organizes all security equipment in the building, such as video surveillance systems, glass breaker detection, fire alarms and smoke detection, and temperature control systems, putting all information into a single platform and displaying it on a touch screen monitor.

FIRE PREVENTION MAIN CONCERN IN VIETNAM
As one of Asia's rising economies, Vietnam launched its economic reform in 1986 and has since enjoyed economic growth second to China. The Vietnam government's GDP growth rate surpassed 7 percent during the 1990s and was even able to register an over 5 percent growth between 2009 and 2012 when world economy slumped into recession, according to the World Bank. Also since the 1990s, more than 30,000 private businesses have been created.

The revitalized economic conditions of Vietnam have reflected on the construction of new buildings, including those for commercial purposes. The Vietnam Country Report 2012 showed that construction demand for office buildings surged to 493,000 square meters in 2010 from 245,000 square meters in 2008.

Mid-end office buildings are the major commercial building type in Vietnam. Unlike commercial buildings in other parts of Asia that place emphasis on intellectual property or unauthorized trespassing, buildings in Vietnam stress fire prevention, according to Thomas Tran, MD at Citek, manufacturer of surveillance equipment.

Fire prevention is also the main theme of the building's integrated security solutions. Centered on fire alarms, a buildings' security system can combine with video surveillance, access control, and intrusion alerts, said Tran. Fire alarms can also be bundled with public address (PA) systems for evacuation purposes. “In addition to fire, unauthorized entries and malfunctions on supervisory control and acquisition data (SCADA) systems are also security concerns,” said Tran.

Integrated Solutions Vary Based on Demand
Different types of commercial buildings have been presented in Asia based on business activities. Regional headquarters, financial buildings, and smaller office buildings housing tenants like SMEs have been particularly noticable in Singapore and Hong Kong.

Thailand's tourist-driven industry has led to the construction of multifunctional buildings that combine shopping centers and offices. Vietnam has initiated massive construction projects, including office buildings for the country's growing number of enterprises. Each type has different demands as to how its security can be done. Types of commercial buildings may vary, but further integration of all systems in a building is a foreseeable trend in the future in most parts of Asia.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page
Sign Up for Free
Weekly e-Newsletters
  • Headline
  • Trending Tech
  • Hot News
  • Product Highlights
  • Success Stories

Featured Suppliers