You are at : Search > Articles Search Results

Articles Search Results

1313 Articles and 369 related Products found for access control

Wireless locks bring flexibility to electronic Access

Wireless locks bring flexibility to electronic Access

Editor / Provider: BY EIFEH STROM, a&s International | Updated: 7/22/2014 | Article type: Hot Topics

The many benefits of wireless locks are becoming more apparent as electronic access control continues to gain popularity. Without extra wires and cables, wireless locks can provide many different verticals with an electronic access solution that is not only more cost-effective, but allows for more flexibility as it is easier to implement and manage.

"7.4% estimated growth for global access control in 2014" ---Source: IHS

In 2014 alone, IHS estimates a growth of about 7.4 percent for the global access control market, including electronic locks (mechatronic, digital cylinder, and electromechanical). The rise in electronic access control adoption is paving the way for wireless access devices like wireless locks to come into play. Whereas electronic access control systems still require expensive cabling and wiring, wireless solutions provide a less price-inhibiting solution for prospective users. Without the need for extra or new cablin+g or wiring, wireless devices such as wireless locks are making electronic access control possible for those looking for a more efficient, convenient, and cost-friendly solution.

Type s of Wireless Locks
While there are several ways to differentiate between different types of wireless locks, one way is by how they communicate to the controlling software, according to Daniel Stewart, Product Integration Manager at Stanley Security, a division of Stanley Black & Decker. Naming three of the “key varieties” in the current market, Stewart noted that each standard has positive aspects and drawbacks. Ultimately, “The decision a user usually needs to make is one of convenience versus control.” Aside from communication standards, wireless locks can also be categorized by physical make-up. For example, for commercial use there are electronic cylinders, escutcheons, handles, and locks paired with RFID readers. They can also be customized with different credential readers including keypads, magnetic stripes, or multi-technology that can read both proximity and smart technology, explained Karen Keating, Portfolio Marketing Manager of Electronic Access Control at Allegion. “Wireless locks can combine all the hardware components required for a complete access control system into one integrated design that includes the electrified lock, credential reader, request-to-enter and -exit sensors, door positions switch, and more.” This type of integrated design can save both time and money when installing a system.

Who's Going Wireless?
The earliest adopters of wireless access products have been the higher education and healthcare markets. Both of these verticals have benefited immensely from wireless systems as both have thousands of doors that need to be secured without breaking the bank. Keating pointed out that wireless solutions solve many installation restrictions in healthcare, education, and historic buildings, which include limitations on where drilling and laying wire can happen. Aside from healthcare and education, Keating added, “Whatever the industry, wireless is becoming the prescription for getting more doors covered and extending the present access control system, especially when the facility requires something that is not too invasive and can be easily installed.” Chris Bone, VP of Access Control Solutions for EMEA at ASSA ABLOY, noted that “Large commercial applications of wireless access technologies are ideally suited to any premises that, firstly, have lots of keys and, secondly, have a wired access control system already in place.”

Why Go Wireless?
One of the biggest positives of wireless access control is that it is very affordable to install, according to Bone. Not only is it affordable to install but affordable to run, especially when compared to wired solutions. “Wireless locks are battery operated and only ‘wake up' when prompted by digital credential. Wired doors need to be permanently connected to main power and that makes them expensive,” added Bone. “Wireless access saves you money, and that, I think, is a major reason why demand is growing in every vertical.”

Not only can wireless locks save money, they can also save electricity. As pointed out, wireless locks are battery-operated devices. This, according to Stewart, reduces the electrical load that a building will be pulling to support the access control system. “Some end users have utilized wireless locks to fall in line with green initiatives that they have for their building structures.” This makes wireless locks a great solution for commercial buildings looking for energy savings and better energy efficiency. Savings from wireless solutions also allows integrators to help facility professionals extend the reach of their card-based systems at a cost that used to include extra materials and increased labor, stated Keating. “Wireless helps migrate the present access control system so that it can be used for more doors as well as mobile mustering, remote areas, gates, elevators, and other unique applications that have been heretofore impracticable to install or too expensive.”

Wireless Hurdles
Easier to install and more cost-efficient make installing wireless locks sound like a no-brainer; however, this is not the case. “The recent progress in microelectronics has enabled wireless technology adoption at a reasonable cost for lock manufacturers, but, still, there are debates about standards and interoperability of systems which causes most customers to refrain from making a decision,” said Rocco Vitali, Product Manager of Electronic Products at ISEO.

In addition to interoperability concerns, security remains a top reason for user uneasiness. In reaction to these concerns, Christoph Karl, Product Manager at EVVA, assured that providing high security access solutions is his company's top concern. “Thus we are only relying on high security encryption standards such as MIFARE DESFire EV1, HTTPS connections, end-to-end encryption, and high security smart cards.” Karl also stressed the need for potential users to “look behind the facade and find out about the security features” of wireless locks, as users are “quickly drawn by the looks of a product but that does not tell whether the lock will fend off illegal opening attacks.”

Misunderstandings, according to Stewart, such as the realization that wireless locks are not a real-time access control device, are also an obstacle. “Every wireless device is ‘offline' with its controller at some point,” he explained. “If it is not, the batteries used to power them would expire in days instead of months.” As a result, control of products and updates sent to them is dependent on when they communicate back to get this information. For this reason, wireless access devices are not suitable for perimeter security.

Future of Wireless Locks
Growth for wireless locks has been in the double digits, according to Keating. Regions such as Europe, the Middle East, Africa, and APAC are among those seeing a particular rise in demand. IHS attributes this to the need for “low-cost products that are valuable” in lower-end/underdeveloped markets. Although wireless locks are making a play for the security industry, they will, however, not be taking over mechanical locks any time soon. According to IHS, “Despite the growing popularity of access control systems driving the adoption of electronic locking devices, mechanical locks are not projected to falter any time soon.” Regardless, the many benefits of wireless locks make them a desirable choice in certain verticals and environments, such as higher education and healthcare. However, as wireless technologies mature, adoption by more verticals will continue. Additionally, the flexibility and adaptability of wireless locks will continue to drive growth, leading to a wider variety of wireless locks in the future.

Three Key Communication Standards for Wireless Locks
Daniel Stewart, Product Integration Manager at Stanley Security, a division of Stanley Black & Decker, outlined the three key communication standards most commonly used in today's wireless locks.

Wi-Fi: Wi-Fi locks utilize a user's existing wireless network installation to communicate with the controlling software. Deployment of Wi-Fi locks is easy for a user to do because there is very little infrastructure that would need to be added. The majority of users today have an existing Wi-Fi network with ample coverage of their buildings. Deploying Wi-Fi locks then allows the user to simply install the locks and connect them to the network. The downside to Wi-Fi locks is that it is a very power hungry protocol. This limits the frequency that the locks can communicate to the controlling software down to only a few times a day, in order to be able to maintain a reasonable battery life.

900 MHz: 900 MHz locks utilize a frequency outside of the majority of wireless devices today in order to maintain clear communication with the devices. In a typical 900 MHz configuration, the wireless lock communicates to a receiver that will translate the signals from the lock and output them to the control panels for the access system that communicate back to the software. The frequency wave and power behind a 900 MHz signal allow for long and more thorough penetration through a user's building, helping to maximize their investment by reducing the number of receivers that are needed. The downside here is the infrastructure that needs to be added to a facility to support the installation of these products. Wires need to be run between the receiver and the access control panels to facilitate their communication.

Zigbee (802.15.4): This is a low-power wireless protocol that utilizes the same frequency range as Wi-Fi. This protocol allows for channel selection outside of the standard Wi-Fi channels, though, to facilitate interoperability with the existing Wi-Fi devices — for example wireless computer networks — that a user may have in place. The protocol's low-power consumption allows these locks to communicate more often, as frequently as every minute, and maintain a reasonable battery life. The typical installation requires a receiver that will connect to a user's Ethernet network to communicate back to a controlling software. Range from the receiver to the wireless lock is comparable to the range that a user would have with a Wi-Fi lock from a wireless access point. The downside to these products is, again, the infrastructure that needs to be put in place to facilitate communication to the controlling software.

Wireless Lock 411 for Integrators
Wireless locks present a unique challenge to installation teams and users who are deploying them, according to Daniel Stewart, Product Integration Manager of Stanley Security, a division of Stanley Black & Decker. “This challenge results from an inability to physically see the wireless environment. With hardwired locks, it is relatively easy to troubleshoot the wire that runs between the device and the controller to identify any challenges. With wireless locks, the environment cannot be surveyed as easily.” An understanding of this is crucial in order to “adequately evaluate the frequency spectrums that their product uses for communication,” added Stewart. Additionally, because these wireless products are not inherently connected to the access system, updates, configuration changes, and commands sent to the locks may have a delay, which is important to realize. This needs to be taken into consideration when deploying a wireless lock solution. Karen Keating, Portfolio Marketing Manager of Electronic Access Control at Allegion, further pointed out that integrators need to do their homework upfront. “They have to understand the IT infrastructure. Are there additional costs that might be incurred for an additional node? There are advantages and disadvantages to every wireless approach out there. What do they need and what problems are they looking to solve? What is the initial budget? What is the ongoing cost budget? Make sure the solution is appropriate for the client.”

 

HID Global teamed Eid Passport supplying identity management system

HID Global teamed Eid Passport supplying identity management system

Editor / Provider: HID Global | Updated: 7/22/2014 | Article type: Security 50

HID Global announced that it has teamed with Eid Passport, a market leader in high-assurance identity management solutions and the largest commercial provider of vendor credentials at military facilities, to supply Eid Passport with its ActivID Credential Management System (CMS) for Eid Passport's new Personal Identity Verification – Interoperable (PIV-I) managed service.

Eid Passport's service is targeted at commercial, government and military organizations that require the highest levels of identity assurance to secure sensitive physical and logical assets. Recently, the U.S. Navy awarded a contract to provide credentialing support for the Navy Commercial Access Control System (NCACS), its contractors, vendors, suppliers and service providers who seek entry to naval facilities. To meet the needs of the U.S. Navy and other customers for its PIV-I service, Eid Passport has worked with HID Advantage Partner Axiad IDS to integrate ActivID CMS into its service for secure provisioning of the cards.

“We look forward to working with Eid Passport, which is a Level 4 PIV-I issuer – the highest level of identity assurance possible,” said Eric Widlitz, managing director of Identity and Access Management, North America with HID Global. “With the integration of HID Global's pivCLASS credentials and ActivID CMS with the Eid Passport's RAPIDGate Premier solution, Eid Passport is able to ensure that third parties working at high-security government installations have been thoroughly screened, vetted and issued a PIV-I credential before they arrive on site.”

Provisioning the cards using HID Global's ActivID CMS makes it easy to define and apply policies to manage data, applets, and digital certificates across the entire lifecycle of a card. ActivID CMS is easily integrated into an existing security infrastructure, and can scale to millions of credentials in complex, distributed environments with multiple user groups.

Top 3 myths of physical access control technology

Top 3 myths of physical access control technology

Editor / Provider: Ola Jonsson, Business Development Manager, Axis Communications | Updated: 7/21/2014 | Article type: Hot Topics

It is no exaggeration to say that network video has revolutionized the video surveillance market. Now the access control industry is on the verge of a similar development. Once again, it is the transition from analog to IP-based systems and with it the adoption of open standards which provides new opportunities and stimulates market growth.

Since the introduction of the first network camera in 1996, the market share of IP-based video surveillance systems has increased year by year. Today, network video solutions offer a host of benefits and advanced functionalities that cannot be provided by analog video surveillance technology.

There are a number of common misconceptions as the physical access control industry undergoes a similar transition from analog to IP-based technology. In the following, I will address the top 3 of these myths.

Myth #1 - It's not worth upgrading existing analog systems to IP-based technology
A typical analog access control system is dependent on having each device – card reader, handle, door lock, door position switch, etc. – hard wired with RS-485 cable into one central unit or central server. Besides being proprietary systems, which confines the end user to one single provider of hardware and software, these solutions often tend to be very complex and require expert personnel to handle installation and configuration.

Furthermore, when expanding analog systems the process is complicated by the need to consider that a typical central controller is built to accommodate a certain maximum number of doors, normally 4, 8, 16 or 32. Not only does this limitation make the system inflexible but also makes it difficult for the end user to match his requirements with products available, e. g. if there is a need for access control at for example 9 or 17 doors. This lack of flexibility also brings high marginal costs, which can make the addition of one extra door unjustifiably expensive.

Upgrading an analog access control system to IP-based technology therefore allows for more flexibility while lowering costs as the system needs to be expanded to include additional doors. IP networks can be used for more than one application. This way different security systems can use the same infrastructure and can be integrated with each other. Often remote monitoring and management of security systems is a key requirement. This can be easily implemented with IP-based solutions which feature web-based console access.

Myth #2 - Access control systems are only for large installations
Analog access control products and systems are normally designed and optimized for large installations with a lot of doors and maybe thousands of credentials (cardholders). The actual market looks very different. According to the Security Sales & Integrator Gold Book 2013, the average installation consists of 7 doors with less than 130 credentials. Only about 20% of the installations have more than 10 doors.

Without the need for hard wiring to a central control unit or central server, IP-based access control systems enable installations that are very flexible and scalable. This means not only a more versatile solution, but also a more cost efficient one. Freed from the constraints of enlarging the system in certain multiples, a network-based solution can – should it be necessary – be enlarged by one door, and one reader, at a time.

Additionally, IP-based technology enables “edge” solutions. An edge solution has one controller for each door, which is then connected to the existing local Ethernet through a regular network switch without the need for a central server for management. Since IP networks now are ubiquitous in offices, stores, factory plants and similar facilities the cost of adding an IP-based door controller would be minimal, as opposed to multiple serial connections wired back to a central server. Cabling work can be even further facilitated. By employing a PoE (Power over Ethernet) supported controller at each door the need for a separate power cable is eliminated, thereby reducing the total installation cost and time compared to that of an analog access control solution.

Myth #3 - Access control systems are proprietary solutions that can't be integrated with other security systems
Very much like in the video surveillance market the shift from analog to IP-based technology in the access control industry will cause a transition from proprietary systems to open solutions. And these solutions will most likely be based on international industry standards.

Open solutions and standardized interfaces are a prerequisite in any industry that wants to establish its own equivalent of "plug-and-play". There are many gains from such a development also in access control. It will allow end users to freely pick and choose between components – reader, door controller and software – that best satisfy their needs and preferences. This freedom of choice makes the system future-proof and means the end user no longer has to rely on a single brand or supplier. Equally important, it can also enable integration with other security related systems and third party applications, without the need for costly hardware boxes to provide the “bridge” between the different systems. For example, a very common request is to integrate physical access control with video. People entering a building will automatically trigger a camera; the live images can then be used for investigation of incidents or identity control.

In the network security systems market there is already a clear trend to develop open or standardized application platform interfaces (APIs), which can be used by all competing market participants on fair, reasonable and non-discriminatory terms. Naturally, this will increase supply and promote competition and bring a new level of innovation to the industry, while simultaneously making it even easier for end users, system integrators, consultants and others to take advantage of the different possibilities offered by IP-based solutions.

For example, the Open Network Video Interface Forum (ONVIF), which is a global and open industry standards body with the goal to facilitate the development and use of IP-based security products, announced in 2010 an extension of the organization's scope of standardization to cover physical access control. Ideally, access control devices from manufacturers that comply with the ONVIF standards will in the near future interoperate effortlessly and seamlessly with each other, as well as with other video surveillance products and systems conformant with the standard.

Future outlook
According to a market forecast by analyst firm ARC Advisory Group, IP-based access control systems will comprise more than 35% of the market in terms of shipments by 2016. A key factor will be that new buildings are increasingly being equipped with IP-based building control systems. This provides the basis for integration of previously often separate systems such as access control, intrusion detection, fire alarms or video surveillance.

Open standards and the ability to base different security systems on the same IP network architecture allows installers to build solutions based on products from various manufacturers. This way they can better meet customer demand, price projects more competitively and offer custom solutions to particular installation challenges and requirements. End users benefit from a future-proof and adaptable technology that can easily scale to their growing needs without being locked into any one manufacturer.

Birmingham Airport converted to IP surveillances with IndigoVision

Birmingham Airport converted to IP surveillances with IndigoVision

Editor / Provider: IndigoVision | Updated: 7/21/2014 | Article type: Infrastructure

When the Senior Executives at Birmingham Airport were laying out plans to increase passenger numbers and improve operational efficiency, it became clear that the existing system and infrastructure would be unable to meet these demands.

Background
When the Senior Executives at Birmingham Airport were laying out plans to increase passenger numbers and improve operational efficiency, it became clear that the existing system and infrastructure would be unable to meet these demands.

With six separate control rooms spread across the airport already, further growth would make it difficult to co-ordinate security efficiently.

The decision was made to streamline security operations, with a single control room monitoring the entire airport. This would require the deployment of a new security system, with IndigoVision's complete end-to-end solution as its backbone.

Solution
Most of the existing analogue cameras were replaced with IndigoVision Enhanced IP cameras, while the remaining analogue cameras were converted to IP using IndigoVision Encoders. Since all of these devices employ IndigoVision's world class video compression allowing video to be streamed over minimal bandwidth.

The ability to view and control cameras from any point onsite has allowed Birmingham Airport to reduce its number of control rooms from six to one, removing communication barriers and increasing operational efficiency.

In addition, IndigoVision's open integration means that other elements of the system such as access control and alarm management can be managed through IndigoVision's Control Center software.

“We're delighted with the new system, the return on investment was outstanding,” enthused Airport Control Centre Manager Chris Wilson, “After nine months, the IndigoVision system had paid for itself. With IndigoVision's Distributed Network Architecture we can easily increase camera numbers, aligning security with Birmingham Airport's long-term vision.”

Benefits
* World class video compression technology in both cameras and encoders delivers amazing video quality, at exceptionally low bandwidth. Cameras can be viewed and controlled wherever they are installed. 
* IndigoVision's Control Center management software seamlessly integrates with other security systems, such as access control and alarms, allowing management from a single user interface.
* IndigoVision's Distributed Networked Architecture (DNA) removes the need for a management server. Additional cameras are easily added to the system, with minimum configuration and no system downtime. With DNA, the system can manage up to 100,000 cameras.

Market demand spurs versatile commercial building solutions

Market demand spurs versatile commercial building solutions

Editor / Provider: a&s Editorial Department | Updated: 7/14/2014 | Article type: Hot Topics

In Asia, the commercial building market has relatively strong potential compared with other parts of the world as private funds, such as those in the U.S., have been showing great interest in the region in recent years. Some US private funds are either buying commercial properties in countries like Singapore or taking on new construction projects. Due to a great number of new constructions in Asia, the demand for integrated building automation (BA) systems are also on the rise.

INTEGRATED BA SOLUTIONS WITH SECURITY
In some developed economies like Singapore and Hong Kong, office buildings and financial buildings are common types of commercial structures. Office buildings can range from state-of-the-art skyscrapers housing regional headquarters of multinational corporations (MNCs) to mid-end buildings accommodating small and medium enterprises (SMEs). Financial buildings are those whose tenants are banks and financial institutions.

Office buildings used as regional head offices and financial buildings are the types that would resort to an integrated solution that bundles security and BA systems at the same time. As to the commercial building market in Asia, where building codes are not as clear as those in Europe or North America, what devices and functions should be included in an integrated system and how they should be done are largely dependent on the whims of building owners. But in general, the integrated BA solutions which highlight the improved energy efficiency and identity management is getting popular in these countries.

Identity Management in High Demand
The type of commercial buildings whose occupants are MNCs are required to protect physical and non-physical intellectual property, since the wealth of intellectual property, be it product prototypes, business letters, or customer information, can fall prey to break-ins and database infiltration. Moreover, the flow of of the outsourcing trend among some MNCs has caused a need for stringent security control. On the other hand, financial buildings that have safety deposit boxes, ATM machines, counters, and employee offices all within one construction also demand rigorous control as cash and client profiles require extra protection.

Therefore, a highly-integrated security solution focusing on identity management has become an answer to the protection of intellectual property, cash, and crucial client information. Identity management is an integrated solution that coordinates BA systems, security hardware, and oftentimes, biometric identification. Patrick Lim, Director of Sales and Marketing at Ademco (Far East) put it this way: “The management of identity using several ID technologies is important as not a single piece of information can properly authenticate an identity.”

What makes identity management so special in a highly-automated building is that as BA leaves the control of a building's access and other security matters to a computeroperated system, identity management, oftentimes with the help of biometrics, exerts a more humanized influence to the system.

Besides, identity management also works with a BA system to provide a customized environment for an individual. Lim took a CEO's office as an example. When a CEO steps into a building, the executive lift is already there waiting for him/ her and their office has been tuned to his/her preference upon arrival (e.g. the blinds are opened to allow in more sunshine).

Energy Efficiency Becomes Unique Selling Point
Both headquarters and financial buildings have added energy saving to in their integrated solutions. Ricky Law, Account Manager at Ensec Solutions, said lighting controls can go with access controls to achieve light saving functions, such as switching lights on and off with an access control card. Lighting controls can also be bundled with a building's heating, ventilation, and air conditioning (HVAC) systems for more energy savings.

New building projects in Asia's developed countries are also increasing demand for a highly automated security and energy saving systems. “Developers and engineering consultant firms [are] looking for energy saving and a more cost effective solution for building projects,” Law said, noting that the incorporation of more energy saving functions into an integrated automated security solution can be a selling point to new construction projects. In new constructions, energy saving functions like how lights and air conditioning systems should be controlled and preconfigured in the BA system have been considered in advance when buildings are under construction.

However, for SMEs, instead of occupying the whole or part of a commercial building, they are often only tenants of a floor or sometimes just a room. Energy saving “can be too rigid and creates inconvenience to tenants,” said Lim, referring to the complexity of integrating too many functions into existing building.

The re-modeling and re-deployment of pipes and wires in buildings can be a painstaking process, not to mention all SMEs in the building have to sit down, make negotiations, and reach agreements to get an integrated system done.

In addition, money is also an issue, Lim said. “The high cost of some of these systems can prevent smaller buildings and cost-sensitive organizations from adopting energy saving solutions,” he explained.

SECURITY PLATFORM SECURES MULTIFUNCTIONAL BUILDINGS
Developing countries are investing heavily in their shopping centers and retail stores as it is the most efficient way to bring cash in. Building fancy malls and enticing tourists to buy have become a fast lane towards economic growth for countries like Thailand, which is a self-proclaimed “shopping paradise.” The shopping industry in Thailand is so strong that one of the country's mall developers, Central Pattana Pcl (CPN), is actually expanding its business to other parts of Southeast Asia and building shopping malls in Malaysia in 2016, followed by more shopping centers in Indonesia and Vietnam, according to Reuters.

The vibrant shopping industry in Thailand has brought in the demand for multifunctional buildings, where shopping centers occupy the first few floors while companies and other type of offices take up the upper layers of the building. The massive flow of shoppers downstairs and office workers upstairs have created a special demand for security.

The latest security solutions in multifunctional buildings in Thailand are adopting a security platform, close to the concept of physical security information management (PSIM), integrating all security data obtained from surveillance monitoring devices at all entrances and elevator doors, according to Nuttawaj Chieobangyang, CEO at Coretech Corporation, a security solution distributor in Thailand. This allows for “easy control and checking of all events inside the building.”

The security platform can grant different levels of control according to different layers of activities in the building. It can set a tighter control for company offices upstairs and less control to shopping centers downstairs. Aloysius Loy, MD at ACTAtek, a service provider of web-based security solutions, stressed that a security platform is able to provide a more comprehensive picture of a building's security conditions as the solution organizes all security equipment in the building, such as video surveillance systems, glass breaker detection, fire alarms and smoke detection, and temperature control systems, putting all information into a single platform and displaying it on a touch screen monitor.

FIRE PREVENTION MAIN CONCERN IN VIETNAM
As one of Asia's rising economies, Vietnam launched its economic reform in 1986 and has since enjoyed economic growth second to China. The Vietnam government's GDP growth rate surpassed 7 percent during the 1990s and was even able to register an over 5 percent growth between 2009 and 2012 when world economy slumped into recession, according to the World Bank. Also since the 1990s, more than 30,000 private businesses have been created.

The revitalized economic conditions of Vietnam have reflected on the construction of new buildings, including those for commercial purposes. The Vietnam Country Report 2012 showed that construction demand for office buildings surged to 493,000 square meters in 2010 from 245,000 square meters in 2008.

Mid-end office buildings are the major commercial building type in Vietnam. Unlike commercial buildings in other parts of Asia that place emphasis on intellectual property or unauthorized trespassing, buildings in Vietnam stress fire prevention, according to Thomas Tran, MD at Citek, manufacturer of surveillance equipment.

Fire prevention is also the main theme of the building's integrated security solutions. Centered on fire alarms, a buildings' security system can combine with video surveillance, access control, and intrusion alerts, said Tran. Fire alarms can also be bundled with public address (PA) systems for evacuation purposes. “In addition to fire, unauthorized entries and malfunctions on supervisory control and acquisition data (SCADA) systems are also security concerns,” said Tran.

Integrated Solutions Vary Based on Demand
Different types of commercial buildings have been presented in Asia based on business activities. Regional headquarters, financial buildings, and smaller office buildings housing tenants like SMEs have been particularly noticable in Singapore and Hong Kong.

Thailand's tourist-driven industry has led to the construction of multifunctional buildings that combine shopping centers and offices. Vietnam has initiated massive construction projects, including office buildings for the country's growing number of enterprises. Each type has different demands as to how its security can be done. Types of commercial buildings may vary, but further integration of all systems in a building is a foreseeable trend in the future in most parts of Asia.

ASSA ABLOY secures the venue for the 2014 APEC summit

ASSA ABLOY secures the venue for the 2014 APEC summit

Editor / Provider: ASSA ABLOY | Updated: 7/10/2014 | Article type: Security 50

A comprehensive ANSI product package meets the high security and safety demands for the venue for the 2014 APEC summit in China.

Customer
In preparation for the 2014 APEC summit held in Beijing in April, the Chinese government has built an international conference and exhibition center, a boutique hotel and 12 VIP villas at Yanqi Lake, 50km northeast of downtown Beijing.

Challenge
As a very high-profile construction project, safety and security is of the utmost importance. The layouts of the villas are unique, adding to the complexity of designing an integrated hardware solution for the project. ASSA ABLOY specified ANSI products to ensure predictable performance, safety and security.

Solution
ASSA ABLOY supplied an ANSI product package that included 10,000 Yale hinges, 1,600 sets of Doormax locksets and 1,100 sets of Doormax door closers, 600 sets of Yale door concealed closers, 350 sets of exit devices and a 4-level master key system.

American Dynamics safeguards well-known broadcaster's home in London

American Dynamics safeguards well-known broadcaster's home in London

Editor / Provider: Tyco | Updated: 7/8/2014 | Article type: Residential & Consumer

As one of the U.K.'s premier broadcasters, Gabby Logan's job takes her around the world.

The former gymnast turned sports presenter began her broadcast career in 1992 as a radio personality, and then quickly expanded into television with Sky Sports, ITV and BBC. Gabby has covered the London Olympics for BBC and England's football team in the 2010 FIFA World Cup and Euro 2012. Gabby also served a short stint in Brazil covering England's football team in the 2014 FIFA World Cup, making a quick return to the UK to present from the 2014 Commonwealth Games in Scotland.

In addition to her life on the road as a broadcaster, Gabby also juggles her “other” roles as wife and mother, a regular columnist for The Times, the creator of a successful workout DVD called “Twin Results Workout”, and a dedicated patron to several charities, including the Disabilities Trust, Prince's Trust and Great Ormond Street.

As a busy professional, Gabby and her husband Kenny, an ex Scotland International Rugby star, realized that they needed to implement some type of system that allowed her to keep an eye on things at home while she took care of business on road. Whether gone for the day, or away on a trip thousands of miles from England, a home security system that incorporated video surveillance was the solution Gabby needed to stay connected to her family when Kenny was back at home in charge of the family and property.

Working with Vindex Systems in West Sussex, a specialist integrator of CCTV, access control and automatic number plate recognition solutions that works with both public and private sector clients, the Logans selected a system from Tyco Security Products' American Dynamics range that incorporated the VideoEdge Network Video Recorder (NVR) and Illustra 600 outdoor mini-dome cameras.

Using a monitor at home, Gabby and Kenny can actively watch the video from the cameras on the grounds, or view recorded video with the VideoEdge NVR. The system even allows the Logans to save snapshots of specific video images.

But the real selling point of the system was the ability, through an iPhone application, to watch live and recorded video from her home surveillance system from anywhere she may be. Now Gabby has the ability while on the road to check on her home, her family and any situations that may occur through the VideoEdge Go app.

VideoEdge Go is a full-featured video surveillance viewer that delivers added value to the system and enhances the day-to-day experience by facilitating remote monitoring and forensic investigating from anywhere.

The free, downloadable app works with Logan's iPhone or other Apple iOS device. And because the video is streamed via a wifi, 3G or 4G connection in H.264 rather than MJPEG, it takes up less space on whatever device she is using.

While England was competing in the World Cup in June, Gabby was onsite with the team, but also in touch with home through her surveillance system and the VideoEdge Go app.

HID Global and Assa Abloy secure 2014 FIFA World Cup

HID Global and Assa Abloy secure 2014 FIFA World Cup

Editor / Provider: HID Global | Updated: 7/8/2014 | Article type: Security 50

HID Global has announced that its access control products, along with door-opening solutions from parent ASSA ABLOY, are being used in various solutions across six of the 12 stadiums in Brazil now hosting the 2014 FIFA World CupTM football matches through July 13, 2014.

“We are very excited to be playing such an important role in protecting the safety and security of the fans, players and staff during this year's FIFA championship matches,” said Gustavo Gassmann, Sales Director, Brazil with HID Global. “Securing large-scale outdoor sporting venues is one of the industry's most difficult security challenges, but HID Global and ASSA ABLOY have extensive experience in this area. Working with our local integration partners, we have delivered secure solutions that are designed to provide robust protection for the people, equipment and infrastructure at these World Cup venues.”

HID Global and ASSA ABLOY products are being used at new stadiums in Fortaleza, Natal, Recife, Curitiba, and Brasilia, as well as at the legendary Maracan? Stadium in Rio de Janeiro, which will host the World Cup final on July 13 and both the opening and closing ceremonies for the 2016 Olympics. The two companies' products have also been recently deployed at the Arena do Grêmio in Porto Alegre and the Allianz Parque (formerly the Arena Palestra Itália) in Sao Paulo.

MOBOTIX video phone system secures 84 luxury apartments in London

MOBOTIX video phone system secures 84 luxury apartments in London

Editor / Provider: MOBOTIX | Updated: 7/7/2014 | Article type: Residential & Consumer

City harbour is a property development in the Cross-harbour area of the London Docklands close to South Quay and Canary Wharf. The multi-million pound site includes 7 blocks of luxury apartments situated just two minutes' walk from the Docklands Light Railway with easy access to Canary Wharf, the City and Lewisham.

The development was completed in 1997 and included, what was then, a high tech video entry phone system connecting each of the 12 apartments to the remotely opened front door in each block. The system allowed tenants to view and speak to a visitor before entry and provides both security and peace of mind.

However, over the intervening years, the analog video entry system has suffered several breakdowns while advances in technology has made the image quality less than acceptable to what is considered as high quality by modern standards.

Obsolete analog
Following another breakdown of the old analogue video system in July of 2012, Parc Properties, the management agency for the block began to investigate an alternative video entry phone system. A key requirement for the new system was to offer better quality digital video with more reliability. In addition, the new system needed to be accessible by the porter to provide an additional level of security for the development.

Parc Proprieties examined a number of video entry systems from several suppliers. “Future proofing was also a key requirement,” explains James Ingles, Property Manager for Parc Properties, “The entry system needs to be in place for ten to fifteen years and it was important that we found a system that could offer us reliability with the potential to offer additional value to the leaseholders.”

Integrated Solution
Unlike many of the competing bids for the project, NIMATA, a specialist in access technologies, proposed a solution based on MOBOTIX technology that also combined additional value through a partnership with a high speed broadband provider. The proposal offered MOBOTIX T24 video entry phone units at each door connected via an internal IP network to deliver bi-directional audio and colour high resolution video to a Grandstream IP based video phone within each apartment. From the video phone, tenants can see and communicate with any visitors and open the front door remotely.

In addition, by wiring each apartment with Ethernet connectivity, the project would also provide optional high speed internet connectivity to each tenant. “As this area does not have a high speed internet service, the proposed project by NIMATA, offered additional benefits to the leaseholders alongside improved security,” says Ingles.

As each leaseholder pays a contribution to a building sink fund through its service charges collected by Parc Properties, it was essential that the entry phone system offered good value. Through a consultation process and detailed examination of the competitive tenders, City Harbour Properties decided that the NIMATA proposal offered both the best value and overall suitability for the task.

Advanced Technology
The seven MOBOTIX T24 units used in the project include a high resolution digital camera, keypad and systems to interface with the door lock release mechanism. With 3.1 megapixels and internal memory, the hemispheric door camera records the entire entrance area from wall to wall and from floor to ceiling with no blind spots.

Each T24 also has a built-in SIP server to allow the camera to communicate with the video phone in each apartment. However, this basic SIP server only has a limited number of connections, so NIMATA developed its own SIP server appliance to interface with the T24 to manage up to a 1000 connections from a single video entry unit. This also has the advantage of allowing every apartment to contact any neighbor as well as the porter directly from the video phone without incurring any calling charges.

Decentralized Technology
MOBOTIX is the pioneer of a decentralized approach to CCTV which simplifies installation and operational considerations while improving overall security and reliability. In this decentralization architecture, all image processing, recording logic and decisions are made in the camera itself. This is in complete contrast to most other CCTV systems, where the camera typically has no real intelligence and relies on decision making and image processing taking place at 'the core‘ of the network via centralized software or DVR. As the camera can store video within the device and only needs to send video to a central repository at the discretion of the operator, building owners no longer require an expensive and complex monitoring station or dedicated wiring across the site.

With the project agreed, in August of 2012, NIMATA worked with external contractors to install the required CAT-5E structured cabling throughout the blocks and into each apartment. Working with fiber optic broadband provider Hyperoptic, the project also connected all 84 apartments with optional 1Gbs high speed internet access.

Tenants can now communicate with and view visitors in high resolution colour before releasing the main door. Via the video phone, tenants can also pan, tilt, and zoom the camera to get a better view of the surrounding area. The porter for the development can also view entry phone images from his cabin and communicate with visitors as well as scanning the area for any issues. Although the system offers a great deal of flexibility in viewing options, each camera and viewpoint is only accessible to authorized personnel from registered Video Phones, PC terminals and optional mobile devices.

Future proofed
“We take the security of the building occupants very seriously and the NIMATA video entry phone system has met our expectations around image quality and reliability,” says Ingles, “The system has been well received by our residents and also the accessibility of high speed internet is a major benefit for the whole development.”

The video entry phone system also has a number of potential upgrades including allowing visitors to leave video messages for tenants who are not available, for example if a tenant is out and a package needs to be delivered. In the future, the system can be upgraded to notify tenants and allow two way communications with a visitor via mobile devices such as smartphones or tablets.

“The system has performed well since installation and we now have the option to upgrade many of its elements as our requirements evolve – overall, it has been a very successful project,” Ingles adds. Based on the success at City Harbour, Parc Properties are now considering working with NIMATA to upgrade several other properties it has under management across London and the South East of England.

Access control management empowers verticals

Access control management empowers verticals

Editor / Provider: William Pao, a&s International | Updated: 7/3/2014 | Article type: Hot Topics

Regardless of the vertical, end users can benefit from access control management software, which not only helps keep companies/organizations safe but also contributes to more efficient operations and workflow. Determining what end users' primary focuses of management are and what they look for in their access control solutions is the first step towards successful deployment.

 

 

Education
Education, whether at a primary, secondary, or higher level, is often cited as one of the vertical markets that needs cutting-edge access control solutions the most, especially after campus violence has become more rampant in the U.S. A NAPCO Security Technologies white paper on school security points out that since 1980, there have been 137 fatal school shootings that killed 297 victims in America. However, safety aside, schools are also looking for ways to extract the potential of their students' ID credentials by integrating them with more functions. This is especially the case in colleges, where students are faced with the need to enter or exit school buildings or dorms as well as borrow books, make cashless payments, and reserve equipment. “They want to integrate all the above mentioned features together into their campus card,” said Tom Su, Sales Manager at Hundure Technology.

To achieve those objectives, schools are looking to integrate a variety of subsystems into their access control management software. “For higher education institutes, integrated subsystems include meal plans, vending, video, distress systems, and mass notification. For K-12, cost-effective lock-down capabilities and visitor management are also required,” said Richard White, VP and GM of Electronics at Allegion.

Integrating these systems into a seamless whole can result in many benefits, said Harm Radstaak, MD of Identity & Access Management for EMEA, HID Global. “They significantly improve safety and security for students, staff, faculty, and visitors. They also deliver cost savings and an easy migration path to future capabilities when needed,” said Radstaak, whose company was responsible for helping the Academy of Art University in San Francisco transition from a lock-and-key environment to an integrated access control system, which enables students to use their ID cards to not only open doors but also make secure purchases and gain access to Urban Knights athletic events.

“The university has realized a number of important benefits from its new access control system, including documented reductions in theft even as enrollment has increased, and an improved campus experience,” Radstaak said.

Healthcare

Another vertical that highly demands cutting-edge access control management software is healthcare, which is also faced with the need to secure a diverse group of people including patients, doctors/nurses, administrators, and volunteers, against a variety of emergency situations such as fires, earthquakes, or fights that break out from time to time at hospitals. Other focuses of management include granting emergency personnel expedited access to patients' wards or intensive care units, and protecting patients' data from theft or leakage to other parties.

Subsystems integrated into access control management software vary based on end users' specific needs and requirements. For example, access control integrated with visitor management makes sure that those without access rights stay away from critical areas such as radiology, pharmacy, and pediatric wards. Elevator controls, meanwhile, are valuable in allowing medical staff to reach certain floors in the quickest manner.

“Saving lives has absolute priority and requires unhindered access, and the access control management system must therefore be prepared for this eventuality,” said Nancy Wanders, Sales Manager of Global Clients at Nedap Security Management, adding with her company's solution, “the ER team has its own special cards. Held in front of any card reader they initiate elevator priority control. The elevator that is especially reserved for the emergency team is ordered to the appropriate floor. Only when this card is used, the elevator will go to the selected floor with priority.”

“The ER team often has its own special cards. Held in front of any card reader they initiate elevator priority control. The elevator that is especially reserved for the emergency team is ordered to the appropriate floor. Only when this card is used, the elevator will go to the selected floor with priority,” she said.

At the same time, the access control management system must converge with logical access control to make sure there is no theft or leakage of patients' data, which has become mostly digitized in an increasingly digital world. “With the right infrastructure in place, healthcare institutions can meet today's security and compliance needs while continually improving security and convenience, protecting patient privacy, and increasing the ongoing value of their investment,” Radstaak said.

 

Government

For government agencies, the focus of access control management is high-assurance and multi-factor authentication. “This would include technologies such as biometrics and encryption,” said Jason Ouellette, Product Line Director for Access Control at Tyco Security Products. “The need is to be highly secure and highly protected by nature of what is physically being protected.”

Among subsystems typically integrated with government access control management software are HR, visitor management, video, alarms, and encryption devices for communications that need to comply with FIPS standards. According to Ouellette, government users look for software that can handle high-assurance government credentials such as PIV, CAC, and TWIC, along with intrusion zone support. “The ability to handle high-assurance credentials allows highly important facilities, such as government buildings and embassies, to put into place an extra layer of security to keep the wrong people out while allowing the proper people access,” he said.

Users also want their management software to be able to change authentication levels based on the imminence of danger faced by government personnel. “Buildings such as government and municipalities require a high-assurance badge, but when the threat level is moved up, there is opportunity to increase the level of authentication as required to include a second factor such as a PIN or a biometric. Access control authentication changes as the need/threat changes,” Ouellette said.

All this contributes to a safer and more secure environment for government personnel, said Daniel McVeagh, Senior Product Manager for Access at Gallagher. “The benefit is ensuring government facility security cannot be easily compromised. We support a wide range of security and interoperability standards, ensuring government sites are well protected and can leverage their security system investment with integrations into others,” he said.

 

Corporate
In today's corporate world, companies are increasingly setting up offices and branches in multiple regions or even countries around the world. The need for multi-site management therefore arises. “They are looking for the ability to have local access control but with a global view. Typically they are set up so a central security station can see what is happening anywhere in the world,” said Tyco's Ouellette.

According to him, this type of installation gives users the flexibility to either own the security operation or outsource the monitoring through a managed access control offering. “Customers can determine what works best for them and determine what level of capital investment vs. operational cost is appropriate for them. Some customers may want to spend the money upfront, while others may find more flexibility with spending the money over a period of time,” he said.

A critical element for success in the corporate arena is the ability to tie access control management software with multiple subsystems including elevators, video management, RFID, key management and more, he added.

“With so many disparate offerings in the field today, the more options that can be supported, the better value the access control platform can provide to the end user,” Ouellette said. “A unified customer experience by offering a unified security platform from which to manage all of the security applications is quickly becoming a requirement for many customers looking for an easy way to manage their holistic security infrastructure. Toggling between multiple applications like video, access control, and visitor management is quickly becoming a thing of the past.”

 

Industry
Access control is vital in ensuring staff safety in an industrial setting, for example a factory or plant. “Securing critical areas is not just a security issue but also a life safety issue,” said Jeremy Krinitt, GM of Frontier Security.

For critical infrastructure such as power generation plants that may be the target of terrorist attacks, integrated access control and video systems are key. Other technologies that may be integrated with the access control management software include time and attendance, public address systems, perimeter protection systems, payroll systems, visitor management systems, wireless locking systems, and parking controls.

In an industrial setting, users often look for technologies and solutions that can withstand harsh environments, Krinitt said. Another user demand is access control management software with viable anti-passback technology to prevent misusage that is prevalent in this sector.

“They want a solution that does not allow any buddy clocking,” said Hundure's Su. “Our finger vein device has a high security feature that makes ID theft and buddy clocking impossible. After all, no one can copy finger vein patterns.” Users are also looking for software that can help enforce health and safety compliance, record employees' time of entry of exit, track their locations, and gather them in the event of emergency.

“If a machine explodes during maintenance work, our solution enables you to instantly activate the predefined settings and procedures you've defined for this type of situation,” Nedap's Wanders said. “You can easily control who's allowed access to the incident area. And you can get a quick overview of where your health and safety officers are and direct them to where they're needed. The solution also immediately blocks any zones that people shouldn't enter so everyone's led to the right assembly area, and you can quickly identify if anyone's missing and take appropriate action.”

 

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page