Viscount Systems Inc. - Experts & Thought Leaders

Latest Viscount Systems Inc. news & announcements

ASSA ABLOY integrates IP-enabled access control locks with Viscount Systems’ Freedom Access Control

ASSA ABLOY, the global provider of door opening solutions, announced the integration of its IP-enabled PoE (Power over Ethernet) and WiFi access control locks with Viscount Systems’ open platform, web-based security management solution: Freedom Access Control. The IP integration offers end-users more options for expanding their physical security system easily and affordably using IP-enabled locks from ASSA ABLOY Group brands CORBIN RUSSWIN and SARGENT. The IP-enabled range include locks that connect to a host system through an existing 802.11b/g/n WiFi network. The range also includes IEEE 802.3af compliant Power over Ethernet (PoE) locks that connect to the Local Area Network (LAN) utilising a single Ethernet cable for both power and data. Robust cyber secure products ASSA ABLOY and Viscount Systems make for excellent partners thanks to the shared philosophy and approach to leveraging IT infrastructure and avoiding expensive and proprietary panels. The partnership also means integrators now have a unique opportunity to offer an IT approach to access control to clients. "When it comes to access control, Viscount Systems commits to making products that are both cyber secure and future-proof with the goal of protecting the end user and their investment" said Scott Sieracki, CEO of Viscount Systems. "ASSA ABLOY has the same commitment to crafting products with robust security, upgradability and interoperability. It's not only a very exciting partnership to combine our work into a total solution, but also a very natural partnership in terms of shared values and missions."

ASSA ABLOY announces partnerships and software integrations at ISC West 2018

ASSA ABLOY, global door opening solutions provider, has announced several new and exciting partnerships that provide integrators with security solutions to create new opportunities for collaboration with both existing and potential clients. Software integrations The new partnerships include: Averics, BluB0X, Dot Origin, Identiv and Viscount. In addition, ASSA ABLOY is also collaborating with select access control partners to ensure easy integration of its PIV-enabled WiFi and PoE locks with access control systems. AccessNsite, Lenel, Open Options and RS2 are the first four partners to complete an integration with the PIV-enabled solutions. Averics is integrating its AvericsUnity software with ASSA ABLOY’s Aperio wireless lock technology “When we seek out partnerships we look to work with companies that share our values,” said Martin Huddart, President, Access and Egress Hardware Group, ASSA ABLOY Americas. “That means partnering with those who make it a core mission to protect the people and places that matter most. With this list of partners, it is clear we are achieving that goal, and in turn offering integrators some incredible solutions to bring to their clients.” Aperio wireless lock-AvericsUnity integration Averics is integrating its AvericsUnity software – the browser-based, cost effective, easy-to-use access control system – with ASSA ABLOY’s Aperio wireless lock technology and its IP-enabled PoE (Power over Ethernet) and WiFi access control locks. BluB0X is integrating its BluSKY IoT Security Platform for Access Control with ASSA ABLOY’s Aperio wireless lock technology and its IP-enabled PoE (Power over Ethernet) and WiFi access control locks. Dot Origin is integrating EdgeConnector with ASSA ABLOY’s Aperio wireless lock technology EdgeConnector-Aperio access control Dot Origin is integrating EdgeConnector, the physical access control software that radically strengthens and simplifies access management, with ASSA ABLOY’s Aperio wireless lock technology. Identiv is integrating its Hirsch Velocity 3.6 integrated solution with ASSA ABLOY’s Aperio wireless lock technology. Viscount Systems is integrating its open platform, web-based security management solution, Freedom Access Control, with ASSA ABLOY’s IP-enabled PoE (Power over Ethernet) and WiFi access control locks.

WaveLynx Technologies announces release of SIA-Standard OSDP Access Reader

WaveLynx Technologies, a developer of customisable physical security readers and credentialing, announced the release of their newest wall mount access reader to their Ethos product portfolio. The Ethos product line are the first access readers manufactured to leverage the full extent of the Security Industry Association’s (SIA) Open Supervised Device Protocol (OSDP) V2.1.7 specification with the use of Secure Channel-encrypted communication and remote upgrade and maintenance capabilities. SIA’s OSDP V2.1.7 is more secure than the most common access control protocol, improving interoperability among access control and security products. OSDP Secure Channel also supports high-end AES-128 encryption, which is required in most government applications. WaveLynx Technologies’ readers are the first to be validated with industry-leading access control systems to communicate over secure channel and effectively update an access reader from a remote location.Our Ethos readers’ capability to save end-users time and money distinguishes itself from any other product" Collaborations between industry leaders The WaveLynx engineering team worked closely with the engineering teams of other industry-leading companies including Mercury Security, Viscount Systems and STANLEY Security to validate the functionality across multiple platforms, as well as with their test systems for both Secure Channel and Firmware Boot loading capability. “The announcement of the WaveLynx Technologies Ethos reader is something the industry can really be proud of,” states Joe Gittens, Director, SIA Standards. “SIA OSDP has long been a security-minded solution, and now WaveLynx’s pioneering new product unlocks the potential of OSDP 2.1.7 with features designed for ease of management. We are excited to continue working with SIA members like WaveLynx in the SIA OSDP Working Group to deliver added value to the security industry.” New era of secure communications For large corporations and enterprise environments, this new reader will save valuable time, money and resources. Rather than spending thousands of dollars to remove hundreds of door readers from walls, manually configure the readers and then re-install each, a technician can now upgrade several readers at once with the tap of a keyboard. This cuts the time needed to upgrade each reader to approximately four minutes down from 20 minutes, while increasing security and intelligence. As more access control manufacturers convert from the standard Wiegand Protocol to the more secure OSDP, Ethos readers will automatically detect and convert the reader to the updated protocol, avoiding the need to replace outdated readers and allowing the end-user’s investment to progress into the new era of secure communication without additional cost or disruption. “Our Ethos readers’ capability to save end-users time and money distinguishes itself from any other product,” says Hugo Wendling, President of WaveLynx Technologies Corporation. “Being able to change the behaviour of a reader and update its firmware remotely marks the beginning of new era in security. Our readers are now integral and fully managed components of any access control system, making our reader technology a sure bet for our customers’ present and future requirements.”

Insights & Opinions from thought leaders at Viscount Systems Inc.

Should marketers seek to leverage violent incidents?

When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate into business for security companies of various types. But should security companies seek to capitalise on these opportunities? We asked this week’s Expert Panel Roundtable: Is it fair game for manufacturers or marketers to leverage recent violent incidents or terrorist attacks to promote sales of security systems or products? 

Joint Commission accreditation impacts healthcare security upgrades

 Part 11 of our Security in Healthcare series The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders Compliance with Joint Commission accreditation can impact hospital and healthcare safety and security decisions, and can even drive security system improvements at healthcare facilities. An independent, not-for-profit organisation, The Joint Commission accredits and certifies nearly 21,000 health care organisations and programmes in the United States. Joint Commission accreditation and certification is recognised nationwide as a symbol of quality that reflects an organisation’s commitment to meeting certain performance standards. The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders, by evaluating health care organisations and inspiring them to excel in providing safe and effective care of the highest quality and value. Security systems evaluation But how are security and safety systems a factor in accreditation and certification by The Joint Commission? The Joint Commission does not require an organisation to have a specific type of security system, says John D. Maurer, Engineer, Department of Engineering, Certified Yellow Belt, The Joint Commission. Rather, an organisation is permitted to determine the types of security systems it uses based on the risks it identifies specific to its operations. Once an organisation identifies security risks that may impact operations, the processes put in place to address those risks are evaluated during a Joint Commission survey, including evaluation of the use and functionality of the types of security systems in place. An organisation is permitted to determine the types of security systems it uses based on therisks it identifies specific to itsoperations Based on the processes that are put in place, this evaluation will take into account the actions taken during a security incident in addition to the proper use and maintenance of the equipment specific to the setting and circumstances in which the security measures are implemented, says Maurer. “Organisations should properly evaluate any equipment to determine how well it will serve its needs,” he says. It is recommended that the selection be conducted through a multidisciplinary team, including input from key stakeholders. Included with the selection process, organisations should review the operational needs of the security systems and related equipment so staff can use it properly and effectively. Additionally, the maintenance requirements should be reviewed in order to keep it functioning as it is intended. Of course, both the aforementioned points would involve training, and this could also be reviewed during a survey event to help determine the overall effectiveness of the system in place, according to Maurer. Advantages of ‘Security by Committee’ After participating in a wide range of healthcare security deployments, security equipment manufacturers find that many of the most successful are led by healthcare executives that make use of a broad “security by committee” planning process. “Advisory committees that include representatives of all staff levels, and sometimes interested community volunteers, bring a unique blend of opinions to guide the planning and decision processes,” says Robert Laughlin, President, Galaxy Control Systems. “Over the years of working in this field, we have often heard legitimate staff complaints about systems that were installed without knowing how they would affect the staff,” he adds. “Because staff adoption is key to a successful installation, hearing a range of suggestions helps make these deployments successful." The most critical areas are those in which the wealth of expensive medical equipment and pharmaceutical materials are stored Laughlin says a key challenge of healthcare security is to provide the right balance between, on the one hand, an open, friendly and welcoming facility that supports families and individuals during some of the most difficult situations of their lives; and, on the other hand, protecting the privacy and security of vulnerable people, expensive equipment, and valuable drugs and materials. Round-the-clock operation, a large and complex workforce, and a constant flow of unfamiliar visitors only compound the security challenge. Higher level of access control in areas of critical risk Healthcare campuses are vulnerable to a variety of security risks, but the most critical areas are those in which the wealth of expensive medical equipment and pharmaceutical materials are stored, says Scott Sieracki, CEO, Viscount Systems. These areas need to be heavily protected from theft and contamination 24 hours per day, 7 days per week, which can be exhaustive, expensive and hard to manage if any of these items are in transit. "We are also experiencing higher demand for more and moreintegrations between securitysystems and facilities management systems" Moreover, only employees with the highest security clearance and proper credentials are allowed access to these materials, and clearances can be changed at a moment’s notice within the facility’s main database. However, without real-time communication among card readers, access cards and Active Directory, these minute-to-minute decisions can open up opportunities for potential identity fraud and physical and/or logical security breaches, thus putting vulnerable patients, sensitive data and priceless equipment at risk. Some specific areas of a hospital are especially vulnerable. “We are seeing higher levels of access control deployed in areas such as maternity and psychiatric wards, ICUs, operating rooms and onsite pharmacies that dispense controlled substances,” says Jim Stankevich, Global Manager – Healthcare Security, Tyco Security Products. “We are also experiencing higher demand for more and more integrations between security systems and facilities management systems.” The combinations of the abilities of these devices mean, for example, that bracelets can be used to track physical locations of patients who may be mentally incapacitated or perhaps have Alzheimer’s disease, to make sure they are not in harm’s way. “We even have technology that can alert a nurse when a patient falls out of his or her bed, using the same principles used in infant abduction/infant tracking devices,” says Stankevich. “This technology is even used to track expensive medical equipment in real time in order to reduce theft, and also to track equipment that is in use or is possibly misplaced.” Catch up on our Security in Healthcare series here Save

How does the “perception of safety” impact system choices?

Does seeing video cameras at a location make you feel safer or less safe? Do you feel better to know that video surveillance is capturing everything that happens, thus discouraging crime? Or do you think: What kind of neighbourhood (or store) is this that needs a CCTV camera watching everything? Do you feel more secure when the security guard at the hotel elevator asks to see your room key? Do airport screenings ease your mind about getting on an airplane with 100 strangers? The “perception of safety” is a tricky thing, and presence (or absence) of security systems can play a role. We asked this week’s Expert Panel Roundtable: What is the impact of promoting a "perception of safety" when choosing and/or installing physical security systems? How might perception influence the choice of systems (e.g., more overt)?

Quick poll
What is the most significant challenge facing smart building security today?