Nedap Identification Systems - Experts & Thought Leaders
Latest Nedap Identification Systems news & announcements
Nedap is proud to introduce uPASS Go: the next-generation reader in long-range vehicle access control. As the latest addition to Nedap’s esteemed uPASS product line, uPASS Go establishes a new standard in managing vehicle entry for basic gates, like car parks, gated communities, and staff parking zones. Designed to blend significant commercial appeal with the latest technological advancements, uPASS Go transforms the landscape of vehicle access control to be smarter, more secure, and exceptionally efficient. Cost-effective solution for vehicle access points Nedap's uPASS Go is the successor of the uPASS Reach, widely recognised as the most cost-effective solution for vehicle access points. uPASS Go leverages cutting-edge UHF RFID technology to provide reliable vehicle identification from up to 10 metres (33 feet). uPASS Go leverages cutting-edge UHF RFID technology to provide reliable vehicle identification This product is perfectly suited for managing access in environments such as car parks, gated communities, and staff parking zones. It seamlessly integrates with existing access control systems, supporting key industry-standard interfaces like Wiegand, OSDP, and TCP-IP protocols. Features like a new mounting bracket and service hatch simplify the installation process, enhancing operational convenience. Demands of modern security "With uPASS Go, we're setting a new benchmark in the field of vehicle access control. Its user-centric design simplifies the installation process, makes it easy to implement and convenient to use." "It meets the stringent demands of modern security professionals and offers a forward-thinking solution to access challenges," Edwin Grobbink, Product Manager at Nedap. Smooth traffic flow at vehicle access points The uPASS Go benefits from the longstanding expertise in passive UHF solutions As part of Nedap's extensive uPASS product range, the uPASS Go benefits from the longstanding expertise in passive UHF solutions. uPASS Go ensures quick and secure identification of vehicles, which helps maintain smooth traffic flow and creates a welcoming entry experience. The reader is designed to be adaptable, providing robust security across vehicle access points like car parks, gated communities, and staff parking zones. Proven expertise and value Drawing on more than 30 years of experience in automatic vehicle identification, Nedap has designed the uPASS Go to be both cost-effective and technologically advanced. This combination makes it an ideal choice for access control points where affordability and high functionality are required. Nedap's commitment to sustainability and user-friendliness makes the uPASS Go a continuation of the legacy of innovation in access control technology. Explore the full potential of uPASS Go Discover how uPASS Go can streamline vehicle access control by visiting the product page.
Invixium, a global pioneer in biometric access control and workforce management solutions, announces its participation at ISC West 2024. At the show, Invixium will exhibit its full line of NDAA-compliant, made-in-Canada, modern, and rugged biometric solutions that are specifically designed to thrive in the most unclean, hazardous, extreme, and harsh working conditions prevalent in the industrial and critical infrastructure sectors. Addressing security challenges As an integrated biometric solutions provider, Invixium has earned a global reputation for its adeptness in swiftly addressing real-world security and productivity challenges faced by its customers distinguishing itself from other players in the physical access control industry who often engage in product features and data sheet wars. “Approximately, 75% of the working population work in harsh and non-clean industries," said Shiraz Kapadia, CEO & President at Invixium. Biometric products and software Shiraz Kapadia continues, "Our biometric products and software are purposely engineered to operate in such environments where it’s needed the most." “With 35,000 devices deployed across the toughest sites with large workforces, we’re safeguarding refineries, airports, manufacturing plants, data centres, construction sites, and critical infrastructure,” added Kapadia, enforcing the breadth of Invixium’s impact. IXM WEB 3.0 IXM WEB 3.0 adds IXM VISITOR streamlining guest security with fast, paperless registration options Attendees at the show can experience Invixium’s new all-in-one software platform, IXM WEB 3.0. With advanced layered encryption at its core for data protection, it offers a revamped UI/UX, powerful analytics, and enterprise-grade visitor management. In addition to IXM TIME – A comprehensive workforce management module, IXM LINK – Integration to the industry’s best access control software, IXM WEB 3.0 adds IXM VISITOR as part of this platform, streamlining guest security with fast, paperless registration options and a customisable dashboard. TITAN Complementing its top-tier software would be TITAN, the most rugged face recognition access control solution equipped with multi-factor authentication purpose-built for harsh industries, TFACE, a highly versatile and slim dual biometric device for enterprises, and others. Invixium’s software makes it easier for system integrators to implement biometric solutions quickly and accurately; significantly speeding up deployment and setup time. The company has established a long list of integration partners including LenelS2, Genetec, Honeywell, ACRE Security (DNA Fusion, Feenics, and AccessIt!), Galaxy Control Systems, Gallagher, Paxton, Nedap, Siemens, Schneider Electric, and more. Custom-made approach Invixium advocates that a one-size-fits-all approach does not work when it comes to security solutions. Recognising the inherent diversity across industries, Invixium champions a non-traditional, unique, custom-made approach, understanding that the security needs of a convenience store diverge greatly from those of an oil and gas facility. Invixium’s solutions attend to the distinct requirements of critical infrastructure sectors, including oil and gas, data centres, correctional facilities, research labs, pharmaceuticals, airports, higher education, and manufacturing. Within these verticals, safety and security are indisputably a non-negotiable priority. Attendees will be able to engage in live demos and discuss their project requirements with Invixium’s team of biometric experts at booth #23103.
Nedap, a global pioneer in security solutions announced the launch of a SaaS access control system that brings convenience and security together in one solution. Access AtWork® meets the needs of companies looking to replace their outdated on-premises systems with modern and easy-to-use software that provides better insights with less effort and smaller investment. Managing physical access Complementary solutions in access control for organisations of all sizes: With 46 years of experience in access control, Nedap introduced the world’s first web-based on-premises solution, AEOS in 2000. AEOS is currently used by over 25% of Europe’s top brands, particularly those organisations in critical infrastructure. The launch of Access AtWork® signifies a shift in Nedap’s history of tackling the most complex security projects, also opening doors for small to medium-sized enterprises wanting to unburden their IT teams, while managing physical access across multiple sites. Addressing access management challenges With both AEOS and Access AtWork® in our portfolio, we are even better positioned to help organisations" “Access AtWork® is the perfect addition to our portfolio,” said Daniël Nijkamp, Proposition Lead of Access AtWork®, adding “With both AEOS and Access AtWork® in our portfolio we are even better positioned to help organisations solve their access management challenges, no matter their size, complexity, or preference in software delivery." When convenience and security come together Access AtWork® has a unique authorisation model that enables administrators to manage access based on hierarchical teams and zones, concludes Daniël Nijkamp. Daniël Nijkamp said, “The combination of this smart authorisation engine with a highly intuitive interface makes it easy for multiple administrators to manage access across different sites without the need for expert training.” GDPR compliant In addition, this solution is GDPR compliant and offers top-notch security measures, including redundant and secure hosting of data in certified data centres within the European Union. As organisations evolve and expand, Access AtWork® adapts effortlessly, and the subscription-based model reduces upfront costs, provides predictable fees, and automated updates, and lowers maintenance requirements.
Insights & Opinions from thought leaders at Nedap Identification Systems
Time for an indepth review of IFSEC 2019 in London. This show had fewer exhibitors than previous shows, and the ‘vibe’ was definitely more low-key. Fewer exhibitors meant larger aisles and plenty of room to breathe, and the slower pace provided time for exhibitors to reflect (often negatively) on the return on investment (ROI) of large trade shows. There was little buzz on the first day of the show, but spirits picked up on the second day (when, not coincidentally, some exhibitors served drinks to attendees at their stands). Enterprise security solutions One eye-catcher was smart wireless security provider Ajax Systems’ stylish black stand Many exhibitors compared IFSEC unfavourably to ISC West in the United States and even to Intersec in Dubai. Others seemed willing to be lured back to Birmingham (previous location for IFSEC) to participate in the upstart competitor, The Security Event, next spring. However, not all the IFSEC 2019 reviews were negative. Vaion made the most of their small stand toward the back of the hall. They experienced brisk traffic right up until the end of the show. Happy with the response, the provider of real-time enterprise security solutions reportedly has already committed to IFSEC 2020. Other exhibitors also made the most of their space at IFSEC; one eye-catcher was smart wireless security provider Ajax Systems’ stylish black stand. Vaion made the most of their small stand toward the back of the hall Latest new products Nedap launched a new product, AEOS 2019.1, that is five time faster and more stable than its predecessor. It uses HTML5 – no more reliance on Adobe. Feedback has been good. The company has also increased its integration of open security standards (OSS). Traka showcased smart lockers, which are modular, scalable, and staff can easily replace broken equipment. Product features can be adapted to specific sectors (i.e., retail, prisons). Traka spends 30% of its revenue on research and development, developing their own engineering. The company has seen massive growth in the UK and Europe. Hanwha Techwin lured visitors into the center of their stand with drinks and ice cream, surrounded by the latest new products. Hanwha promoted their investment in a manufacturing facility in Vietnam and showcased Wisenet cameras with enhanced 4K images, digital auto tracking, and less motion blur for clearer images. Video verification product A multi-sensor model captures wide areas with a single camera. Hanwha also offered some value-priced cameras that feature easy self-install and are swappable. Optex launched a new product called ‘the Bridge’, a video verification product that bridges CCTV on a digital video recorder (DVR) to intruder alarms. Hanwha showcased Wisenet cameras with enhanced 4K images UK Surveillance Camera Commissioner Tony Porter announced ‘Security By Default’, a set of minimum requirements that will guarantee users that network video security products are as secure as possible in their default settings right out of the box. Hikvision promoted their support for Secure by Default and expressed hopes the initiative would be embraced by other companies and create a new best practice for camera cybersecurity. Hikvision also promoted their retail solution, which includes on-site redaction for GDPR compliance, shelf detection incorporating artificial intelligence, and use of heat mapping to analyse customer foot traffic. Generating revenue Safety and Security Things (SAST), another IFSEC exhibitor, is in the process of creating an ‘app store’ for the security market. Striving to achieve critical mass with participation by a wide range of systems integrators and manufacturers, SAST has a goal of launching to the public in Q1 next year in time for ISC West. Hanwha Techwin is among the players that have already joined the alliance A pilot version will debut this autumn, and they already have 26 apps and six camera manufacturers toward that goal. With a staff of 120, mostly based in Munich, SAST expects to begin generating revenue in 2020 and to grow rapidly. An investment by Bosch is financing start-up operations. Open Security & Safety Alliance (OSSA) is creating standards and a platform to enable the sale of apps in the security market. Large industry players Hanwha Techwin is among the players that have already joined the alliance, and OSSA is seeking to add other large companies, such as Axis, Genetec and Hikvision. Engaging integrators, app developers and software providers as well as camera manufacturers will generate widespread support to ensure the initiative succeeds. Although currently most OSSA members are based in the EU and Asia, it is a global organisation open to any company in the world. Many large industry players are now missing from the IFSEC show floor; the most noticeable new abstainer this year was Milestone. And the downturn seems likely to continue: Exhibitors were largely noncommittal about returning next year, although organisers were urging them during the exhibition to sign up for 2020.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download