STid - Experts & Thought Leaders

Latest STid news & announcements

Genetec unveils secure I/O module for access control

Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced the introduction of a new I/O module to its portfolio of high-assurance access control system offerings.  Developed by STid, a pioneering manufacturer of highly secure access control technologies, the new I/O module enables European customers to meet the most stringent cybersecurity compliance regulations. Cybersecurity capabilities From the credential and reader to the controller and software, every element of the Genetec and STid high assurance access control system utilises encrypted protocols and advanced cybersecurity capabilities. This ensures a secure access control deployment and provides maximum protection against the ever-evolving cybersecurity threat landscape. The high assurance Genetec access control system, combined with the STid I/O module, is ideal for government entities, high-security industries, and essential services like Oil & Gas, Banking, Utilities, Manufacturing, and Healthcare. It offers a secure way to manage access points while ensuring sensitive information stays within the secured perimeter. Easy deployment and safeguards Compact design allows for easy deployment and safeguards against likely threats, as it does not store any data Additionally, its compact design allows for easy deployment and safeguards against potential threats, as it does not store any sensitive data that could be exploited for credential cloning. This significantly reduces the risk of breaches, thereby strengthening the overall cybersecurity posture of organisations. “Our partnership with STid underscores our commitment to providing open-standard, high-assurance access control solutions that empower organisations to choose the best-fit technology for their needs,” said Thibaut Louvet, Senior Product Groups Director, Security Centre, Genetec Inc. “With this approach, our European customers and integrators can benefit from a flexible, scalable, and compliant solution that can help meet even the most stringent cybersecurity regulations." STid secure I/O module “We have a longstanding history of collaboration with Genetec, driven by our shared goal of delivering the best and most secure experience to end users,” said Vincent Dupart, CEO of STid. “This innovative I/O module enriches our portfolio and addresses the requirements of transparent architectures. It complies with European regulations and enables our customers to embrace the highest security requirements without compromising customisation and scalability.” The new STid secure I/O module, available in Q4 2024 through accredited members of the Genetec Channel Partner Program in Europe, will make its debut at Security Essen on the Genetec stand 8C12.

CIE rings in 60th anniversary with showcase of cutting-edge security solutions at TSE 2024

The Security Event (TSE) 2024 was a landmark occasion for CIE Group, which marked its 60th year in business with an impressive display of innovative security products and a champagne drinks reception on the first two days of the show. Latest brand offerings Long established for its unique and value-added distribution model in the audiovisual industry, CIE is making a significant impact in the security sector. Consequently, TSE 2024 served as a powerful platform to unveil the company’s latest brand offerings and solidify its position as an emerging distribution frontrunner in the security field. CIE hub CIE presented a comprehensive overview of each brand’s most recent advances in access control systems The CIE stand became a busy hub for security professionals to experience the future of access control firsthand. Partnering with industry pioneers like 2N, Akuvox, Volo, Stid, Freevolt S-Key, and Safr, CIE presented a comprehensive overview of each brand’s most recent advances in access control systems, intercom technology, video surveillance solutions, and mobile credentialing. CIE Group marks 60th anniversary "This was our fourth year exhibiting at TSE and our return to the show felt significant," commented Chris Edwards, Marketing Director, CIE-Group. He adds, "We had an excellent product line-up that proved to be of great interest to many of the show delegates, and we also got to celebrate our 60th anniversary in style – what more could you ask from a show? Following this success we’re now looking forward to being part of the vanguard of new product innovation in the security sector." New partnership  TSE 2024 also witnessed an exciting new partnership between Freevolt S-Key, the next generation of fingerprint-activated access control. Unlike traditional systems, S-Key integrates the biometric scanner directly into individual RFID cards, offering unparalleled user convenience and enhanced security. Facial recognition technology CIE's partnership with Real Network’s SAFR Scan also offered a glimpse into a future without physical keys or cards CIE's partnership with Real Network’s SAFR Scan also offered a glimpse into a future without physical keys or cards. Its high-speed, high-security facial recognition technology eliminates the need for traditional access credentials, providing a truly keyless and streamlined access control solution. While CIE may be a relative newcomer to the security industry, its 60-year heritage in distribution translates into a deep understanding of market dynamics and a commitment to innovation. Next-gen access control products This spirit of progress is echoed in further words from Chris Edwards, "Rather than 60 years old, we prefer to view ourselves as 60 years young in the security industry." He adds, "We're tremendously enthusiastic about introducing next-generation products to the security industry and shaping the future of access control and related areas."

Security industry veteran joins Smart R Distribution

Smart R Distribution has appointed Mark Russen as the Business Development Manager for its extensive range of Access Control and Intruder Detection Solutions.   Extensive work experience  Mark Russen, who has worked within the electronic security industry since 1986, is a highly experienced sales professional who has performed senior sales management roles for some of the biggest names within the sector. These include Europlex Technologies, Siemens Security Products, and Vanderbilt, (recently re-branded as Acre Security), where he provided national and international sales support for the distribution channel and key accounts.   Intruder detection “Our sales of access control systems have consistently grown year on year and with the addition of carefully selected Intruder Detection products to our product line the time is now right for us to employ a dedicated Business Development Manager to ensure we continue to offer the highest levels of pre-sales support,” said Neill Williams, Director of Smart R Distribution. He adds, “We are therefore delighted to welcome Mark to our team and we look forward to putting his experience and extensive product knowledge to very good use.” Roles and responsbilites Mark will be responsible for developing relationships with existing and potential customers Mark will be responsible for developing relationships with existing and potential customers in the process. This will help them grow their businesses by identifying new sales opportunities for the Access Control and Intruder Detection solutions supported by Smart R Distribution, including those from manufacturers such as ACT, ACRE, Authenticard, Comelit-PAC, Dahua, Farpointe Data, Fermax, HID, Intratone, Safetrust and STiD.  Advantages of the innovative technology  “I am excited to be joining a distribution company that has such an enviable reputation for its sales, logistical, and technical support,” said Mark Russen. He adds, “I look forward to the opportunity to contribute to the company’s ongoing success by helping installers and system integrators ‘put the right pieces together’ and take full advantage of the innovative technology built into the very latest generation of products and systems.”

Insights & Opinions from thought leaders at STid

How to prepare your security for a rapidly changing world

You’re no psychic. You probably don’t have the power of clairvoyance. But guess what? When it comes to your security, none of that matters. You can still create future-proof security by properly equipping yourself. Here’s how. Understanding access control Security is changing faster than ever before. With new threats inside the workplace and smaller security teams taking on more tasks, IT and security personnel must automate their processes using new technology. One difficult aspect, however, is choosing the right technology. By analysing technological trends and assessing your current and future needs, you can preemptively find solutions. Ultimately, in the long run, these solutions will save you time and expense. Ultimately, in the long run, these solutions will save you time and expense But how do you distinguish a momentary trend from a long-term solution? Do you really need to pay extra money for that feature, or will you stop using it in a year? To properly invest in future-proof access control, IT and security teams must look at three different aspects of technology: Flexibility, Scalability, and Efficiency. Access control system Flexibility: Hardware It’s not the sexiest thing to talk about, but hardware is crucial to any security system. Readers, locks and controllers are the backbone of any access control system, and choosing the right hardware is essential when it comes to planning for the future. Broadly speaking, hardware falls into two categories: proprietary and non-proprietary. For those teams considering a new installation, choosing between proprietary access control and non-proprietary access control is a decision that will affect your organisation over the long term. Long-term unseen expenses Proprietary Hardware Pros: Upfront costs can be less expensive; One vendor for hardware and software. Cons: Locked into one vendor; Long-term unseen expenses. Imagine buying a microwave that only cooked foods produced by the microwave manufacturer Imagine buying a microwave that only cooked foods produced by the microwave manufacturer. In a booming economy, the manufacturer produces all sorts of tasty treats—popcorn, lasagna, pies. But when the economy takes a dip, the manufacturer scales back its production and announces it will only sell liver and onions. Now maybe you’re a liver and onions fan, but on the off chance you like variety in your diet, this would be a problem. Your microwave has been rendered useless and has essentially become a liver and onions cooking machine. Potential system vulnerabilities Like the microwave example, proprietary hardware leaves companies at the mercy of the manufacturer. If the manufacturer goes out of business, the system will cease to function, and customer support will be non-existent. Consequently, your security team will likely have to install an entirely new hardware system. Costly, right? Let’s consider a less dramatic scenario. What if a manufacturer, instead of closing, decides to scale back its operations? It provides less frequent updates and fewer new feature releases. Without these updates, your security becomes more vulnerable and outdated. In the long run, choosing proprietary hardware can end up costing teams a lot more than they are saving and expose potential system vulnerabilities. Non-proprietary hardware Pros: Free to switch software vendors; Long-term system flexibility. Cons: Upfront costs can be more expensive. Non-proprietary hardware gives teams the power to switch software providers at any point Where proprietary hardware fails, non-proprietary thrives. The most important aspect of a non-proprietary system is the flexibility it grants. Non-proprietary hardware gives teams the power to switch software providers at any point, without replacing the hardware. In the aforementioned microwave scenario, the customer was relegated to a life of liver and onions because of their proprietary microwave. However, had they chosen a non-proprietary microwave, then they could have eaten any meal. They wouldn’t be limited to the food options sold by the manufacturer. Non-proprietary hardware also accounts for much of the current marketplace. If your team currently uses non-proprietary hardware—Mercury Security, HID, Wavelynx, or STid-- but is considering switching to a cloud-based provider, then something called a software takeover could be useful. A software takeover is a process by which a new software provider replaces a former one, though no new hardware is installed. Scalability: on-prem or the cloud? Whether working for an enterprise, hospital or school district there is always potential for expansion. As an organisation grows or shrinks, so must its access control. At your latest ‘all-hands’ meeting, the CEO announces that you will be aggressively expanding At your latest ‘all-hands’ meeting, the CEO announces that you will be aggressively expanding. They want security to be up and running in three new countries by the end of the quarter. Luckily, you have just finished migrating from on-premises access control to the cloud. You handle scaling the operation with relative ease. IT and security teams must choose between cloud access control and legacy on-premises equipment. The greatest determination of scalability lies with the server. Cloud-based access control Pros: Easily scalable; Less regular maintenance; More secure; Integrations; Centralised storage. Cons: On-going subscription costs; Migrating from on-premises access control. When asked about the trends shaping the near future of access control, 38% of respondents said cloud hosting would be an important feature. Though this was a lower percentage compared to the responses at the beginning of Covid-19 (50% mentioned cloud), cloud security is poised to grow by as much as 13.7% each year. Connecting software stacks Here are some facts about cloud-based access control: Security: In the past, what held the cloud back were concerns about cyber security. But advances in security, including 256-bit encryption for data at rest and data in transit, have significantly improved the cloud. Integrations: Talk to any IT director who has already made the migration from on-prem to cloud, and they’ll mention ‘integrations.’ The cloud gives administrators the ability to more quickly connect their software stacks. Some popular integrations include visitor, video, identity, and notification management. Though integrating on-premises access control is possible, it takes significantly longer and is more costly than integrating with the cloud. Remote Access: Since COVID-19, IT and security professionals have been searching for remote ways to work. However, remotely connecting to an on-premises access control system often requires a VPN. The cloud allows teams to work remotely and access any of the buildings in their portfolio while off site. Physical access control Efficiency: Software Features Another important aspect of physical access control is its software features Another important aspect of physical access control is its software features. While the needs vary from industry to industry, some overlap exists. For instance, a global dashboard can give oversight across buildings on college campuses or offices of a national enterprise. A security team in New York can monitor the access events or provision a new employee in Tokyo. Broadly speaking, IT and security teams are looking for software that boosts day-to-day efficiency and is customisable. These features include: Custom Reports- Spreadsheets or PDFs that give you an aggregated view of access events that have occurred over a given period. Custom Roles- Administrators the ability to create an organisational framework by access permissions. Badges- Create branded physical or digital badges according to permission level. Emergency Add-ons- Custom door plans and Muster reporting can help in crisis situations. For example, if there is an active shooter, certain doors can be left open or locked automatically to prevent the shooter from gaining access to certain areas. Cloud access control has made it easier to implement new features. Ultimately, the cloud gives IT and security administrators more power to quickly request and deploy the features they find most worthwhile. Final thoughts on security With the rapid technological transformation brought about by cloud and mobile access control, it’s important that IT and security teams stay ahead of the curve. In order to decide which system is the right choice for you, it’s important to evaluate not only your current but also future needs. Creating a checklist of the most important features and deciding whether to host all the server yourself are two important steps to pinpointing the perfect access control system. For more information, ask access control providers for a free demo.

How to optimise mobile access control authentication with smart devices

Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.

Quick poll
What is the most significant challenge facing smart building security today?