You are at : Search > Articles Search Results

Articles Search Results

1500 Articles and 372 related Products found for access control

2015 Access control: Simplify electronic access with wireless locks

2015 Access control: Simplify electronic access with wireless locks

Editor / Provider: William Pao, a&s International | Updated: 3/6/2015 | Article type: Hot Topics

While wireless locks aren't new, adoption is set to grow, especially in places where running wired access control is difficult or isn't even an option. “Dormitories and college campuses are good places for wireless locks,” Kotwicki, Northeast Regional Sales Manager, AMAG said. “For medicine cabinet in hospitals and things like that, I do see wireless technology continuing.”

Ease of installation and low cost are indeed two primary benefits of wireless locks. “Wireless locks are battery operated and only ‘wake up' when prompted by a digital credential. Wired doors need to be permanently connected to mains power, and that makes them expensive,” said Thomas Schulz, Marketing and Communications Manager for EMEA at Assa Abloy.

As for the home, wireless locks are also seeing increasing installations. According to IHS, CAGR for locks in smart homes will exceed 50% over the next five years.

“Early adopters are there already: We sell thousands of residential digital locks every month in Scandinavia, for example,” said Schulz. “And you only need to attend mainstream technology shows like the CES to see that consumer interest in digital ‘smart home' products is growing fast.”

However, for home usage to popularize, several issues still need to be addressed, especially with regard to the confidence of consumers who have long accepted mechanical locks and keys as the norm. “Are homeowners comfortable giving up the traditional brass lock and key, and do they have the confidence wireless locks provide at least the same levels of security?” asked von Franquemont, Product Marketing Manager, EMEA, Honeywell Security.

Lack of familiarity is another issue. “What happens if the home owner ignores the battery warning and it loses power — they can't then gain access. Access control will enter the domestic market but not for a few years until a number of these types of issues are resolved,” said Sussman, Technical Director, TDSi.

Currently, there are competing wireless lock standards in the industry. These include the Standard Offline Access Application created by Assa Abloy, Nedap, and others, as well as those that groups like the Physical Security Interoperability Alliance (PSIA) are working on. “The majority of electronic hardware and software providers have expressed strong interest to establish standardization in order to ease the adoption of wireless locks and electronic access solutions in general,” said Aikin, Business Leader of Electronic Locks, Allegion.

Allegion partners with Zhenro Group in China

Allegion partners with Zhenro Group in China

Editor / Provider: Allegion | Updated: 3/6/2015 | Article type: Security 50

Allegion, a global provider of security products and solutions, announced that Allegion Security Technologies (China) Co., Ltd., the subsidy of Allegion in China, has successfully signed a two-year strategic cooperation agreement with Zhenro Group, headquartered in Fujian Province of China. And the first delivery has been completed by the end of 2014. According to the agreement, during the following 2 years, all new developed high-end houses by Zhenro Group will be installed with Allegion's Schlage SEL 300 or Schlage SEL-2.0 Series Electronic Anti-Burglary locks on the entrance doors, and the owners will experience the brand-new intelligent life.

Zhenro Group is one of the top large-scale comprehensive developers in China with the capability of asset management and capital operation. Zhenro Group, taking the role as Vice President Enterprise of the China Real Estate Industry Association, has been listed in the China National 1st Class real estate development enterprises and Top 35 of China real estate development enterprises. At present, Zhenro Group has set up subsidies successfully in Economic Zone on the West Coast of the Taiwan Strait, Economic Zone of Central China and Beijing-Tianjing-Hebei region of China, with the business coverage of 12 cities in China, such as Shanghai, Fuzhou, Nanjing, Suzhou, Nanchang, Changsha, Tianjing, Xi'an, Putian and so on. Zhenro Group's selection on Allegion's smart e-locks for the entrance doors, not only guarantees life safety and property safety of owners, but also improves owners' life quality.

Mr. William Yu, Senior Vice President and President of Asia Pacific, Allegion, appraised the co-operation with Zhenro Group, "Allegion successfully signed strategic cooperation agreement with Zhenro Group is significantly important, because it not only enhances the new developed houses' quality by Zhenro Group, but also strengthens Allegion's confidence to offer great products and service to residential developers. From the day running the business in China, Allegion has been offering all kinds of safety and security solutions and service for different kinds of commercial buildings, public facility buildings and transportation hubs to ensure the safety of people's living, working and travelling. We will continuously introduce more advanced residential security products for the Chinese customers to bring intelligent life experience. “

Allegion is a provider of the world's leading security products and solutions that in more than 120 countries in the world to provide electronic and mechanical security products and solutions to residential and commercial markets, it has 25+ international well-known security brands and covering almost all security links that from residential and commercial locks, door closers, exit devices, electronic access control systems and workforce productivity systems.

Allegion's Schlage SEL 320 Series Electronic Anti-Burglary locks have been certified with the Grade B of GA374-2001 China National Anti-Burglary Standard and the Grade A of GB12955-2008 90-minute fire resistance test and 200,000 times the cycle life test. In addition, its standard anti-burglary lockcase design and three refined casting stainless steel deadbolts make the lock safer. With tamper alarm function, once there is any external tamper on its surface, it will automatically trigger an alarm, then lead to effectively prevent the unauthorized personnel dismantling to open the door. The humanized functions of SEL 320 Series will bring you a new experience with joy. For example, vacation mode function could cater to your flexible unique requirements, while RTC time management function could define some person's limited access time period, such as you can define the limited access time of some card or some password used by nanny into your home. One action exit function simplifies the complex door opening actions of the traditional mechanical locks, without locking and knob turning to open, which shortens the door opening time and offer you more time to run away from the danger to the safe zone.

Nedap integrates SimonsVoss locking systems into AEOS

Nedap integrates SimonsVoss locking systems into AEOS

Editor / Provider: SimonsVoss | Updated: 3/5/2015 | Article type: Security 50

The companies Nedap and SimonsVoss now offer a completely integrated solution regarding access control for the AEOS security management platform of Nedap.

With the SmartIntego system integration product line, SimonsVoss has scored its most recent coup: by partnering with Nedap and integrating into AEOS – Nedap's software-based platform for security management – access control gets an additional customer benefit. "The customer is now able to integrate SimonsVoss locking systems through protocol-based integration into its AEOS system and thus manage the entire system from a web-based user interface. The complexity of management is reduced. The user can continue to work on the user interface he is already familiar with and accustomed to, without the need to install any additional software. This was previously not possible," says Oliver Quaisser, sales manager for the SmartIntego product line, about the partnership. "Another advantage is that our SimonsVoss SmartIntego Products, such as digital locking cylinders SI or SmartHandle SI, have wireless installation, making complex reconstruction unnecessary for building operators," adds Quaisser.

With this combination SimonsVoss and Nedap are meeting their customers' need for an integrated solution. "Nedap is an international company operating in the same markets as SimonsVoss. Due to the demand from Nedap and SimonsVoss customers alike, it was sensible to integrate SmartIntego into the AEOS system," says Albert Dercksen, R&D Manager of Nedap Security Management, explaining the collaboration.

2015 Access control: ACaaS as an alternative to traditional systems

2015 Access control: ACaaS as an alternative to traditional systems

Editor / Provider: William Pao, a&s International | Updated: 3/5/2015 | Article type: Hot Topics

Administering access control can be a burden, and the industry is taking steps to address this concern. More than ever before, suppliers and integrators are looking at new ways to improve the end user experience, and access control as a service (ACaaS) fits this model.

“Like all other products, access control will increasingly move to the cloud. This will eliminate the need for expensive on-site equipment and the associated labor and cabling costs,” said Paul Bodell, CEO of ECKey Smartphone Access Systems. “More companies will move to selling access control on a subscription and usage basis as opposed to a one-time installation with annual software upgrades model.”

Brivo Labs highlighted the success that ACaaS has brought to the company. “Our business, which is over 90 percent hosted access control, grows a minimum of 30 percent a year, and we don't see it slowing down,” said Lee Odess, Vice President of Marketing. IHS, meanwhile, forecasts there will be about 1.8 million total doors of ACaaS in the Americas by 2018.

According to IHS, geographically dispersed enterprises are looking more for cloud-based solutions, especially hybrid offerings — a mix of onsite management, monitoring, and hosted infrastructure. As a result, hybrid may see more growth as large systems adopt ACaaS, IHS said.

Must-know: How to choose the right combination of VMS and VCA

Must-know: How to choose the right combination of VMS and VCA

Editor / Provider: Israel Gogol, Freelancer, a&s International | Updated: 3/3/2015 | Article type: Tech Corner

As video content analytics (VCA) becomes ubiquitous, end users are faced with more and more options regarding their choice of systems. Should they opt for an open platform or choose a bundled solution? What are the implications of different technologies used in VCA? a&s looks at several issues that can help choose the right system.

End users today can choose between vendors that offer their own VMS and proprietary video analytics or a VMS vendor that integrates third party analytics. “There are credible arguments for either option but the devil is in the details,” explains Dr. Sadiye Guler, Founder and CEO of Massachusetts-based intuVision.

“For systems integrators and users, having a combined VMS and VCA solution - if nothing else - is convenient. On the other hand, having the flexibility to choose the most suitable VCA product for requirements at hand is only possible if a VMS system can integrate with multiple third party VCAs; we all know there is no silver-bullet VCA solution that suits every application,” added Guler.

An open platform VMS allows for a mix-and-match approach to best answer end-user needs.

“Best of breed approaches offer more flexibility and there are many specialized VCA solutions available. VCA providers often have profound knowledge of vertical applications and offer adaptations of their VCA solutions for larger installations,” said Joacim Tullberg, Product Manager for Video Management Systems at Axis Communications.

“By choosing an independent, open platform VMS that integrates with multiple third-party video analytics, customers have many more options available than one single vendor with their own VMS and VCA could ever have - the open platform VMS even allows video analytics from multiple vendors to be used together, for example, license plate recognition (LPR) and face recognition. Another example: I have seen some customers request smoke or flame detection capabilities,” said Reinier Tuinzing, Strategic Alliances Manager for the Americas at Milestone Systems.

Furthermore as new technologies and algorithms are developed, an open platform allows the end customer to remove one analytics vendor and replace with another that better meets their needs over time and as new innovations come to market. An open platform VMS also enables integration with multiple third-party systems like laser perimeter detection and access control software, along with the video analytics. The opportunity for end users is that they have many vendors with many capabilities to choose from.

When selecting a vendor, the end user must be very specific about what they want to do with the analytics. “For instance, what do you want to do with the LPR? Are you going to connect to the regional motor vehicle database or the national database; will you build your own database for a home owner association, or are you looking to build your own database for a hotel; is this for cars running at speed or in a parking lot; will the cameras be situated on a pole or at bumper level? All the factors will help you to select the right vendor,” added Tuinzing.

Users who buy from two vendors need to review the level and quality of the integration between the two systems. They should also explore the track record of the two vendors working together by looking at reference customers, and verify the companies' support models.

For example, “at Verint, we provide a solution from one of the best VCA suppliers, and at the same time, we take full responsibility over the integration and the pre-/post-sale support, in effect supplying a one-stop shop for our customers,” said Guy Shahmoon, Senior Director of Product Management at Verint Systems.

Most VMS are designed to work with their own VCA and/or third party software, however there are some advantages when the customer uses VCA from the same vendor, such as: deeper integration and a lower total cost of ownership, explained Doron Girmonsky, Head of Technology and Innovation for Security Group at NICE Systems.

When coming from the same vendor, VMS and VCA integration is more profound. More information can be used since the solution has the “internals” of the analytics, such as object parameters (size, directions, etc.), common routes, etc. From a cost perspective, the analytics can run on the same server as the VMS and does not require additional servers. Having less servers is an important cost saving factor, added Girmonsky.

The advantage for a VMS vendor who integrates with third-party VCA is that each developer is specialized in their respective field. However, full integration is not guaranteed, especially when new features and updates are introduced. Having multiple vendors in the solution poses a challenge when identifying the source of problems, stated Maor Mishkin, Product Champion of Video Analytics at DVTel. On the other hand, a potential downside of closed solutions would be that the VMS or VCA could not be switched if either had a problem, added Mishkin.

“Users who buy a solution from one vendor with proprietary VCA must make sure that the analytics solution is comprehensive and supports many types of rules, is easy to install and calibrate (this is a key factor), and provides accurate results. Customers should ensure that the company intends to continue to develop and support analytics as part of their core technology offering,” detailed Shahmoon.

End users should always seek out the combination that works best for their specific application and environment. For example, video analytics designed for perimeter security needs are very different than those that are ideal for the retail environment. When it comes to video analytics, there is no one-size-fits-all solution, so it is important for users to work closely with their integration partners to select a solution that works well for their unique needs. Also, users should feel free to evaluate various systems to ensure their chosen analytics solution is highly reliable, summarized Mishkin.

FLIR thermal cameras help to protect the perimeter of Oubaai Golf Estate

FLIR thermal cameras help to protect the perimeter of Oubaai Golf Estate

Editor / Provider: Sponsored by FLIR Systems | Updated: 3/2/2015 | Article type: Residential & Consumer

South Africa's Garden Route is world famous. It is a popular and scenic stretch of the southern coast of South Africa. It includes towns such as Mossel Bay, George, Knysna, Oudtshoorn, Plettenberg Bay and Nature's Valley.

The area is renowned for its magnificent mountains, indigenous forests, lakes, lagoons and rivers. It is along the Garden Route, in Heroldsbay that the spectacular Oubaai Golf Resort is situated. Recently, The Oubaai Homeowners Association, as part of a five year integrated security plan, has installed 6 FLIR Systems thermal imaging cameras to form part of its active protection plan for its residents, members and guests.

Oubaai Golf Course: designed by Ernie Els
The Oubaai Golf Estate is an exclusive residential development set in the heart of the spectacular Garden Route in South Africa. The development comprises of 450 residential units consisting of 128 Village apartments and 322 single residential properties. Inside Oubaai, the Hyatt Regency Group is constructing a luxurious 100 bedroom hotel which is to open in 2010.

Oubaai Golf Club is a Championship Golf Course designed by the South African golf superstar Ernie Els. Els is one of the most successful golfers in the history of the game, having won more than 60 tournaments since turning professional in 1989, including two US Opens and an Open Championship, and a record seven World Match-play titles. Ernie has occupied a place in the world's top-10 for over 730 consecutive weeks, more than any other currently active golfer. Els himself has placed Oubaai as his favorite course in the world. Oubaai is a beautiful piece of real estate. There are spectacular views of the Outeniqua mountains, the Gwaing river and its' sweeping valleys and the Indian ocean. The estate borders on the Indian Ocean and the Gwaing river just 18km from the picturesque town of George. Herolds Bay, the nearby beach is famous for body boarding, swimming, surfing and sunning.

Security is of extreme importance
“Although the Garden Route is a relatively safe area to live, definitely compared to other parts of South Africa, at Oubaai we do not want to take any risk.”, explains Mr. Louis Olivier, Estate Manager at Oubaai. “We want all residents, their guests, and all people that come here to enjoy a round of golf at our magnificent course, to feel safe and secure. Therefore we have taken all the necessary security measurements and installed state-of-the-art security equipment.”

A complete security network
“Security at Oubaai starts with ones arrival at the main entrance.”, says Andre Steenkamp Regional Manager of Holbert Boikanyo Technologies, initiator and co-designer of the Oubaai Security System. “Not only are CCTV cameras installed at the entrance but biometric readers are in place to ensure accuracy of the access control function. No one enters Oubaai before their fingerprint is taken. If they are not a resident and/or a bona fide registered guest on the system, they may not enter. We will notify the people they are coming to visit and they need to confirm that they are expecting a visitor.”, Andre explains.

Different technologies for perimeter security
“But securing an estate of this magnitude means more than just installing equipment at the entrance gate. Without installing ugly fencing, we want to be sure that the entire perimeter is monitored and that we are aware of everyone that is approaching the estate's boundaries. In order to secure the perimeter, I did a thorough study and compared different technologies. Although cost is important when evaluating different systems, my main goal has always been to provide Oubaai with a good solution. In my opinion, saving money on security is not always the best option.”, Andre continues.

“Although we are using fences at some parts of the perimeter this is not always the ideal solution. Fences are costly to install since much civil works are required. Furthermore, they are not always the most aesthetic solution at a luxury estate like Oubaai. We also need to keep certain areas of the fence open since animals need to be able to move freely from one area to another. They do not care about whose property the land is and need to be able to roam around freely.”

“Furthermore, if you want to see what is happening around the fence, it needs to be complemented by CCTV cameras. In order to see during the night, CCTV cameras need light. Installing light poles everywhere around the fence is definitely not the correct way to go for an estate like Oubaai. Lighting is considered to be too intrusive by the residents.”

Infrared illumination
“Another technology application we have looked at to secure the perimeter, definitely during the night, is infrared illumination.” Infrared illuminators beam infrared radiation into the area in front of a camera. The infrared beamers are often placed around the lens of the camera. The infrared radiation is reflected by objects and human beings and converted to an image which can be displayed on a screen.

“The initial cost is reasonable but you need to take into account that you need to replace the beamers regularly. Furthermore, if you want some good range performance, you need to install powerful beamers which consume a lot of power.”, Andre continues.

“And infrared illumination has another major disadvantage. Oubaai is situated close to the sea and we are very often faced with very foggy conditions. When you switch on the infrared illuminators they worsen the effect of the fog. You can not see anything anymore.”

Radio Frequency Intruder detection (RAFID)
“Another technology I looked at is RAFID.”, says Andre.

RAFID uses two specially designed cables – one transmitting a radio wave, while the other receives that wave. Changes in the amount of signal passing between the transmitter cable and receiver cable are analyzed by a signal processor. If the amount of signal changes, this means that someone or something is between the two cables and an alarm will go off. Due to the difference in the signal strength, the system can detect whether these changes are due to the presence of a human, a small animal, … “RAFID is a more aesthetical solution than fences but it is a fairly expensive system. Not only are full civil works needed to install the cables, once in operation the system requires a lot of maintenance. And although the system can make a difference between a man and a small animal entering the security perimeter, a lot of false alarms can happen. This means that the RAFID needs to be complemented with a CCTV system so that an operator can determine if an alarm is false or not.”, Andre explains.

Thermal imaging cameras
“I first came into contact with Mr. Tinus Diedericks of Timeless Technologies when I was gaining information about a scanning system that can penetrate fog. Also this technology was not exactly what I was looking for and furthermore it is extremely expensive.”

“Tinus explained me that he is a distributor of FLIR Systems thermal imaging cameras in South Africa and demonstrated the cameras at Oubaai. I was extremely impressed and learned more about the technology. That the cameras are performing well during a clear night was immediately clear to me but I was especially interested in their performance in foggy weather conditions.”

“Together with Andre we made an initial study of how many cameras would be needed to secure the perimeter.”, explains Mr. Diedericks of Timeless Technologies. “Andre's initial plan was to install a large number of fixed mounted, short range cameras along the area. We looked at it together and quickly found out that it would be better to install a limited number of longer range performance thermal imaging camera of which the majority needed the be installed on a pan/tilt. Although we needed to use more expensive thermal imaging cameras to do this, the total investment would be a lot cheaper. Furthermore, since we needed less cameras we did not have to install so many poles to install the cameras on. This again saved money. ”

FLIR Systems thermal imaging cameras secure the perimeter
“Today we have completed the first phase of the installation.”, Andre Steenkamp continues. “Along a big part of the perimeter we have installed multiple FLIR Systems thermal imaging cameras.”

“Three FLIR Systems PTZ-50 MS thermal imaging cameras are installed. The PTZ-50 MS contains a thermal imaging camera and a daylight camera. Both are mounted on a robust pan/tilt so that we can look at every direction we want. They provide excellent range performance since they can detect a man-sized target at a distance of practically 800 meters.”

“At a longer stretch of the perimeter, we decided to install a FLIR Systems PTZ-35x140 MS thermal imaging camera. The PTZ-35x140 MS is equipped with two thermal imaging cameras. It detects man-sized targets at a distance of over 2 kilometers and has the ability to zoom in on suspect activities. It also contains a daylight/lowlight camera which we can use during the daytime. We have installed the PTZ- 35x140 MS in the center of the perimeter. Since it is installed on a pan/tilt, we have the ability to see whatever direction we want. We can see the fence, accross the fairway towards the river, as well as a high risk area along the sea. ”

“For two very short stretches along the perimeter we opted for a fixed mounted PatrolIR thermal imaging camera. It is always overlooking the same area. Although its range performance is a lot less than the one of the other installed cameras, it is exactly what I need to guard two very short lines along the perimeter.”

“Most of the thermal imaging cameras are installed on a pole. Thanks to excellent range performance of the FLIR Systems thermal imaging cameras we did not need to install too many of them. Aesthetics are important here at Oubaai. In order to avoid installing poles as much as possible, two of the thermal imaging cameras have been installed on a house. We communicated with the owner, and he preferred that we installed the cameras on his house instead of on a pole. Not only does he not have a mast blocking his view, it is probably the best protected house in the estate as well.”

Thermal imaging, more than security only
“The main reason for purchasing the FLIR Systems thermal imaging cameras was securing the Oubaai estate. Once they were installed it became clear however that they can have another, sometimes live saving, capabilities.”

“Just underneath Oubaai is the sea. People tend to stand on the rocks while fishing. They sometimes forget that the sea is dangerous. Tides can come up very quickly and big waves can be formed. These waves can easily hit people of the rocks, into the sea."

"When an accident happens and we are aware of it, we can easily turn the PTZ-35x140 MS in the direction of the sea. We will communicate with the National Sea Rescue Institute (NSRI) which sails out with special rescue boats to save the person. We can spot the person floating in the water with the thermal imaging camera, almost 2km away and direct the crew of the boat in the right direction.”

Thermal imaging cameras work in all weather conditions
When asked about the performance of the thermal imaging cameras in foggy weather conditions, Andre is very clear. “The performance of thermal imaging in foggy conditions is extremely good.

Although the thermal image is slightly obstructed by the fog and we are not getting the same high quality image that we see during clear weather conditions, we still get good range performance. A person walking around in the fog will be hotter than the cold surroundings. Since the thermal imaging cameras are producing an image based on the small temperature differences they are detecting, we can clearly see people walking around. We might not see all the detail, but we will certainly see that a person is there. And that is the most important thing.”

“For detecting intruders in total darkness, in practically all weather conditions, there is no better technology than thermal imaging. Different estates have come to Oubaai already to look at the performance of the FLIR Systems thermal imaging cameras and they were amazed when they saw the clear images they produce. Some other estates along the Garden Route are thinking about installing thermal imaging as well.”

Feeling save at Oubaai
“Sometimes when I walk through Oubaai I see houses with the doors wide open. Sometimes expensive material is just standing unprotected in gardens. When we notify the owners that they forget to close their home they are often very surprised. They do not normally do this. To me, it is however the best proof that all the security we have at the gate and alongside the perimeter works. The FLIR Systems thermal imaging cameras definitely contribute a lot to the safety and security we have here at Oubaai.”, Andre concludes.

Holbert was the first technology installer to utilise FLIR Systems thermal imaging cameras on estates of this magnitude, within the Republic of South Africa. The system is user friendly and maximizes the technical aspects without compromising on the staffing quotient, ie. enough guards, but not too many, which is the design approach that Holbert follows in its estate solutions. The relationship between Timeless Technologies and Holbert Boikanyo Technologies is very unique where the distributor and integrator join forces in the research, design, project management and implementation of a tailor made solution for the customer. As the systems and technologies are installed and implemented, Holbert aligns itself with an organization that can monitor the system and utilise the imaging to its maximum outputs, ie. specific control centre operations. This ensures a total turnkey solution and peace of mind to the customer.

Suprema biometric time and attendance deploys in Caribou Coffee, UAE

Suprema biometric time and attendance deploys in Caribou Coffee, UAE

Editor / Provider: Suprema | Updated: 3/2/2015 | Article type: Security 50

Suprema, a global provider of technology in biometrics and security, has announced the deployment of a biometric time and attendance solution across Caribou Coffee chains in the United Arab Emirates. The project involves management of more than 300 employees across 50 locations throughout the region by automating the process of manual data capturing.

Al-Sayer Holding, a major trading company in charge of Caribou Coffee's aggressive global growth strategy in the Middle East and Turkey, was looking for an automated method for data collection. The preexisting method of manual time & attendance data capturing posed a number of problems such as unreliability, backtracking issues, and difficulties in further processing. A solution in which data can be collected automatically with the ability to integrate with the internal resource management software was required.

BioLite Net is a compact IP fingerprint terminal with access control and time & attendance features. The device is highlighted by IP65 rated protection against dust and water which makes it suitable for both indoor & outdoor use. The device features simple user interface for quick easy access to the device and is ideal for applications that require basic user interaction and a variety of installation environments.

The solution will collect reliable data that will be centralized in the corporate office and uses the benefits of an automatic biometric system to efficiently manage a dynamically altering workforce.

2015 Access control: Mobile access picks up steam

2015 Access control: Mobile access picks up steam

Editor / Provider: William Pao, a&s International | Updated: 3/2/2015 | Article type: Hot Topics

Using the mobile phone to authenticate has become increasingly popular, and this trend is set to continue down the road. One major advantage is that using the phone carries a “care” factor. “The average person is more aware of their phone and its location than any other article they carry with them, including their wallet or key ring,” Brad Aikin, Business Leader of Electronic Locks, Allegion said. “Consumers take better care of their mobile device than any other article they carry with them.”

The home remains a sector with high growth potential for mobile access, for no other reason than the technology being able to create an automated environment in addition to providing access. Using the mobile device to turn lights or PCs on and off, for example, can now be done at the home, and this trend is set to continue.

Right now, there are two competing mobile authentication technologies, namely near-field communication (NFC) and Bluetooth low energy (BLE). Each has its unique characteristics and is expected to drive the market.

NFC: More and More Ubiquitous
NFC is now featured on the iPhone 6 as well as a variety of brands including Alcatel, Asus, BlackBerry, Nexus, HTC, Kyocera, and LG. “With an increasing majority of phones on the market today including NFC functionality within them, it is only a matter of time before the usage increases for access control as well,” Aikin said.

However, applications are limited and mostly center around mobile payment, in particular Apple Pay. “Overall, NFC-enabled devices are only one part of the equation. Administering the new services and creating new policies will also need to be addressed,” Blake Kozak, Senior Analyst, IHS said.

BLE: Not to Be Ignored
Another area to be looked at is Bluetooth low energy, also known as Bluetooth Smart, which many say offers advantages over NFC. “For NFC, you've got to be within a few centimeters of the reader, so it works very much like your traditional plastic card,” Jason Ouellette, Product Line Director for Access Control at Tyco Security Products said.

That's different with BLE, which can detect multiple objects with 30, 40, or even up to 50 feet of range, not to mention the availability of Bluetooth-enabled phones. “You are talking about 3 billion devices that are out there today, that are Bluetooth Smart-enabled, without the use of any special chips. So all we're doing is leveraging an enormous network of devices that are already out there,” Ouellette said.

Applications include controls in smart homes, where lighting and air conditioning can all be adjusted with the mobile device. Medical applications are available as well, allowing users to check their various bodily functions on their phones. NFC or BLE, a major issue that needs to be addressed is security, in particular the interception of data. “I think ‘eavesdropping' is the most important issue to be dealt with,” said Norana Johar, COO, FingerTec. “People can ‘listen' to whatever data you are sending.” “When the mobile device is used in a security solution, there needs to be further levels of encryption,” said Rene von Franquemont, EMEA Product Marketing Manager at Honeywell Security. “The way the mobile credential is securely enrolled to the mobile device and how the activation process is set up in both the mobile device and the access control system requires more work.”

GEUTEBRUCK launches Easy Server G-Scope/6000

GEUTEBRUCK launches Easy Server G-Scope/6000

Editor / Provider: GEUTEBRUCK | Updated: 2/27/2015 | Article type: Security 50

G-Scope/6000, the Easy Server in the G-Scope video management family, is a fully functional server, "out of the box". It is as easy to install and to use as a PC. When the reliability of server technology is required, but the level of complexity and flexibility need to remain easily manageable, GEUTEBRUCK's G-Scope/6000 is the perfect fit. Just take it easy.

Its performance meets the high standards of the G-Scope family. The 64-bit G-Core video engine combined with the integrated GPU acceleration guarantees 3 times faster image processing, while the dual database architecture ensures rapid access to memory images and a high level of protection against tampering. Integrated video analysis rounds out the package: Activity Detection for motion-triggered recording or also for motion detection in indoor areas along with scene validation for monitoring the cameras are standard features. Options such as powerful video analysis for outdoor security applications and automatic number plate identification for access control expand the features to meet any wishes.

Reliability and redundancy are an integral part of the Easy Server: Redundant power supply, SSD for the operating system and integrated RAID system provide a level of availability equivalent to that of an IT server. With its high level of expandability, the G-Scope/6000 can fulfill demanding tasks with just a single device: 8 hard disk slots provide storage capacity for up to 42TByte in RAID5; up to 64 IP and 16 analog camera inputs make it possible to secure larger objects. The G-Scope/6000 can of course be integrated into any network, to secure even larger areas or distributed sites, for instance.

2015 Access control: Experts pinpoint growth sectors

2015 Access control: Experts pinpoint growth sectors

Editor / Provider: William Pao, a&s International | Updated: 2/24/2015 | Article type: Hot Topics

IHS estimates the overall growth for the access control industry will be 8.8% in 2015, although that figure is likely to change since this is only the beginning of the year, cautioned Blake Kozak, Senior Analyst at IHS.

Regionally, North America will continue to grow, although not by the same margin as last year. “I do think there will be some shifts in the trend, so this year growth may be a little lower in North America, and higher growth is expected especially in APAC and Latin America,” said Jason Ouellette, Product Line Director for Access Control at Tyco Security Products.

Mike Sussman, Technical Director at TDSi, echoed that comment. “The market is booming internationally, particularly in Africa and Southeast Asia as these markets develop commercially. Even in the U.K., the construction industry's growth is picking up pace after the lull of the late 2000s,” he said. While access control has applications in different sectors, growth is set to be particularly noticeable in certain vertical markets. These include:

Education: Demand in education continues to be strong given school violence and educators' efforts to attract foreign students. “With so many schools, universities, and colleges that have yet to implement holistic access control solutions in their premises, this could be the area of growth for the access control industry this year,” said Norana Johar, COO at FingerTec.

Healthcare: Another area is healthcare, which “continues to see strong growth, especially for electronic locks, to protect patient records, storage closets, drug carts, lockers, among others,” said Kozak.

Residential: Residential security is booming in North America as electronic locks and video are helping to drive the smart home adoption. As for other regions, “although the EMEA and Asia have yet to see this trend, there has been high demand for luxury condos and apartments, especially in parts of Southeast Asia,” Kozak said.

Utilities: Utilities will continue to see strong adoption, especially in many developing countries that are looking to renew their focus on infrastructure development over the next five to 10 years.

SMBs: Demand from small and medium businesses is also growing. “Our belief is in SMBs, which will mainly be driven by two factors,” said Lee Odess, VP of Marketing at Brivo Labs. “First, upfront costs for the system are declining, and second, awareness and demand for the service by this segment are increasing.”

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page