Door access control
Integrated access control and security manufacturer - TDSi announces it is delivering FREE Installer Training at fellow Vitaprotech Group company - Harper Chalice’s newly refurbished Security Hub and Training Facility in Coventry. This new Installer Training location complements TDSi’s existing monthly training courses at TDSi HQ in Poole, Dorset. Training programme Jon Hooley, Technical Support Manager at TDSi will oversee the training programme being held at Harper Chalice&rsquo...
ASSA ABLOY’s innovative new mobile access solution has won yet another prestigious industry award. At October’s Detektor International Awards, ABLOY CUMULUS received the 2024 prize for Innovative Achievement in IoT & Security. Secure mobile unlocking Chosen from among hundreds of products reviewed over the year by Detektor experts, ABLOY CUMULUS "streamlines access management with encrypted mobile credentials, eliminating key management hassles. Its robust, customisable...
Nice, a global pioneer in Home and Building Management solutions announced the launch of its new Nice Video Doorbell, offering enhanced security features and a sleek, modern design for homeowners. It is available for pre-order, the Nice Video Doorbell delivers the perfect blend of security and automation to create an elevated all-encompassing smart home experience. Nice Video Doorbell The Nice Video Doorbell combines elegance and simplicity in both design and user experience. Feat...
OliverIQ, the Smart Home as a Service (SHaaS) platform designed to bring smart home solutions to the broad market, announced the availability of the OliverIQ Hub with built-in customer support from the AI-powered Ollie chatbot. This sleek, affordable plug-and-play device allows OliverIQ service providers to deliver comprehensive smart home services and on-demand device support to new and existing customers. True smart home experiences Customers can enable automation called affairs that enrich...
At this year's “ICONIC AWARDS 2024: Innovative Architecture”, no fewer than four dormakaba solutions have been awarded as “winners” in three categories: the new generation of terminals for time recording and the new, digital high-security safe lock series Axessor APEXX IP in the “Product- Building Technologies” category, the automatic door system MotionIQ in the “Energy Solutions” category and the cloud-based access solution Skyra in the “Pro...
The shift to renewable energy is here, and with it comes valuable infrastructure that needs protecting. Rain, dust, and other environmental factors are constant threats to outdoor equipment, and a quality gasket could be the difference between safe energy storage systems and costly damage. Along with their sealing benefits, gaskets also provide vibration resistance and improve a door’s structural integrity. This keeps enclosures quiet and safe, no matter how much the internal machine...
News
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used globally, announced their MP100 portable barrier system has successfully achieved a PU30/P3 designation. Total penetration was measured at a mere 29 ft, making this an industry pioneer. The MP100 was tested to the new ASTM F2656-20 standard which measures the penetration level from the leading edge of the barrier versus the back-side of the barrier of the previous standard. MP100 portable barrier system The MP100 portable barrier system features a foldable design that allows for easy storage and transportation. An optional drop deck trailer along with our custom transporter makes setup a breeze. The modular MP100 can be easily connected in an array of three or more to meet the PU30/P3 level or be used individually at a lower rating to protect any location. The front vinyl cover can be customised to display advertising for an event or to promote a business. Fold-flat design “The revolutionary fold-flat design makes this the most compact and versatile high-security vehicle barrier on the market. The stability and shape make this a perfect fit for crowded pedestrian events," states Keith Bobrosky, President of Delta Scientific. "Couple these features with Delta’s signature military-grade stopping power, and you have a product that will exceed the expectations of commercial security managers." Easy and efficient The MP100 was designed for quick deployment. The three sides of the unit are spring-loaded easily folded up and secured into place by one person. The custom transporter can stack up to three individual units for storage along with moving each barrier into place. Users can also use a commercial pallet jack to move the barriers. The drop deck trailer can transport up to 10 units at a time. Taller emergency vehicles can drive over the MP100 when it is folded in its down position. Securing an event with the MP100 is easy and efficient.
SARGENT, an ASSA ABLOY Group brand, is set to showcase its newly expanded lineup of locks featuring visual status indicators at the Global Security Exchange (GSX) in booth 1434. These innovative locks provide instant visual verification of door status, enhancing security, safety, and privacy while delivering robust, enduring protection across diverse applications. Innovative door control solutions "This advanced offering of locks with visual status indicators is testimony to SARGENT’s continued dedication to providing innovative door control solutions that deliver the best possible user experience," said Lori Brown, Senior Product Manager at ASSA ABLOY Opening Solutions. "These meticulously designed and engineered locks enhance safety and security across various applications, providing users with clear, visual cues for peace of mind." Product highlights at GSX NEW! 10X Line Bored Lock with status indicator trim offers an optimal blend of privacy and security. It features six customisable status indicator windows, available for both sides of the door, providing complete control over visibility. Built with the robust 10X Line lock body, the visual status indicators exceed Grade 1 standards, ensuring superior durability in high-traffic areas. 8200 Series Mortise Lock features a patented curved design and a viewing window that is 25% larger than conventional status displays with reflective indicators to ensure optimal visibility from multiple angles. Easily retrofit for existing applications, the 8200 Series Mortise Lock is available with 35 different functions, including thumbturn, to accommodate the user’s specific needs. PE80 Series Exit Device offers three distinct status indicator options: Active Dogging Indicator, Passive Dogging, and Trim Status Indicator. Each provides clear visual confirmation of the door's lock status, making it ideal for high-security and safety applications including classrooms. Active Dogging Indicator: Delivers instant, clear feedback through a display window on the rail, offering confident visibility of the dogging status at a glance. Passive Dogging: A subtle visual cue on the push rail that discreetly displays the dogging status for quick, efficient verification. Trim Status Indicator: A large, easy-to-read display on the chassis cover indicates whether the outside trim is locked or unlocked, optimised for critical applications like the Classroom Intruder function. 460 Series Deadbolt Indicator features visual status indicators on both sides of the door, making it an essential addition to environments requiring personal privacy, such as single-use restrooms, nursing rooms and fitting rooms. Seamlessly integrating into any aesthetic environment, the 660 Series Deadbolt with visual status indicators offers instant confirmation of room availability and lock status. Visit SARGENT at Booth 1434 at GSX to see how its status indicators are transforming security one door at a time.
Aiphone, the global pioneer in intercom and security communication, announced the debut of AiphoneCloud and its Remote Management at the Global Security Exchange (GSX) 2024. The cloud platform is set to revolutionise IP intercom management for security integration professionals. AiphoneCloud "We're excited to introduce AiphoneCloud, a platform designed to simplify the work of security integration professionals," said Sean Peterson, Director of Product, Marketing, and Support at Aiphone. "We are committed to continuing the integration and expansion of our offerings and services on the platform to provide our customers with the tools they need to excel in their roles." Simplify security projects with AiphoneCloud The platform streamlines subscription management, providing a centralised hub AiphoneCloud introduces a suite of powerful tools designed to simplify security system management and increase operational efficiency. With Remote Management, security professionals can configure, monitor, and troubleshoot Aiphone IP intercom systems from anywhere at any time. Additionally, AiphoneCloud's on-demand system design tool, QuikSpec, enables security integrators to create customised solutions tailored to their client's unique needs. The platform streamlines subscription management, providing a centralised hub for the activation and renewal of services. New telephone entry kit The new telephone entry kit simplifies installation by combining key components into a single box set, including an IXG-DM7-HIDA entrance panel, an IXGW-TGW Cloud Gateway, and a SIM card. This kit allows users to communicate and unlock doors remotely via a telephone keypad or the IXG App. By activating the cellular data plan on AiphoneCloud for the Cloud Gateway, security integrators can begin utilising remote management to service and support their clients’ systems. The AC Series - enterprise-grade access control An intuitive and scalable access management solution for medium-sized businesses In addition to AiphoneCloud, Aiphone is showcasing the AC Nio access control management software at GSX. An intuitive and scalable access management solution for medium-sized businesses seeking enterprise-level features and benefits. Pair with any Aiphone intercom solution for an added layer of protection and control. Visit at GSX 2024 Experience Aiphone solutions, including the IX | IXG Series IP Video Intercom System integration with i-Pro and Genetec, at Booth #1186 during GSX 2024 from September 23rd to 25th. See firsthand how Aiphone can transform security and communication systems.
Hikvision, a major manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value is excited to announce the release of the DS-KIS600 Intercom Kit, designed to deliver advanced home security in a compact package. Two-way communication Featuring the DS-KV6113-WPE1 door station, this kit offers crystal-clear two-way communication with a noise-reducing microphone, perfect for narrow door frames. With the Hik-Connect App, homeowners and tenants can easily control their intercom system from anywhere, ensuring greater convenience and peace of mind. Home security solution “The DS-KIS600 is more than just an intercom. It's a comprehensive home security solution in a compact form," said John Xiao, Vice President of Marketing, at Hikvision USA. "With its crystal-clear audio, mobile app integration, and advanced features, we're confident it will set a new standard for convenience and peace of mind." DS-KIS600 Intercom Kit The system allows access control through an integrated RFID card reader, providing an extra layer of security The DS-KIS600 Intercom Kit goes beyond basic communication, offering a layer of security for modern homes and condos. The included DS-KV6113-WPE1 door station features Power over Ethernet (PoE) and a built-in 2 MP high-definition camera with night vision for capturing clear video footage, day or night. Additionally, the system allows access control through an integrated RFID card reader, providing an extra layer of security for authorised personnel. Enhanced security Built-in 2 MP high-definition camera with night vision for clear video footage. Integrated RFID card reader for access control. Compact design Suitable for narrow door frames. Versatile for various residential applications.
Pre-registration is now open for C-Touch & Display Shenzhen 2024, organised by RX Kuozhan, scheduled to take place from November 6-8 at the Shenzhen World Exhibition and Convention Center (Bao'an) at Hall 10/12/14. Three-day event As Asia's premier B2B technology trade show for advanced display and smart touch solutions, C-Touch & Display Shenzhen leverages global resources to help display and smart touch manufacturers expand their brand influence and seize global business opportunities. The three-day event will welcome over 150,000 industry professionals to explore innovations from more than 3,500 suppliers, driving new industrial development trends in displays, smart touches, and terminal applications on a global scale. Register now for C-Touch & Display Shenzhen 2024 and save the USD 15 entry fee. New features at C-Touch & Display 2024 These innovation zones will not only provide insights into the latest technological advancements C-Touch & Display Shenzhen 2024 will introduce two major innovation zones: Technological Innovation and Application Scenario Innovation. The Technological Innovation Zone will include the Mini/Micro LED Display Technology Zone, Flexible Display Technology Zone, and E-paper Technology Zone. The Application Scenario Innovation Zone will feature the Smart Cockpit and In-Vehicle Display Zone, VR/AR Innovative Application Zone, and Smart Office and Education Innovation Zone. These innovation zones will not only provide insights into the latest technological advancements but also outline a blueprint for the future development of the display and smart touch industry. Innovative exhibition areas and forums Smart Cockpit and In-Vehicle Display: Reshaping the driving experience With the accelerated pace of automotive intelligence, Smart Cockpits and In-Vehicle Display technologies are becoming industry focal points. From large-screen entertainment systems to advanced navigation interfaces, C-Touch & Display Shenzhen 2024 will showcase the latest in-vehicle display technologies and smart cockpit solutions, offering an immersive driving experience. Commercial displays: Illuminating public spaces Commercial display technology plays a vital role in conference rooms, exhibition halls, shopping centres, and other public spaces. This year, the event will bring together commercial display screens of various sizes and forms, showcasing efficient and convenient solutions to enhance visual effects and interactive experiences in public spaces. Automation and industrial control displays: Meeting harsh environments Products meet stringent industrial ideals and lead industry trends with their clever technologies In the rapidly developing fields of industrial automation and intelligent manufacturing, industrial control display technology plays a crucial role. Its high reliability and durability ensure stable operation in various extreme and complex environments. C-Touch & Display Shenzhen 2024 will focus on cutting-edge industrial displays designed for industrial automation, process control, and monitoring systems. These products meet stringent industrial standards and lead industry trends with their innovative technologies and outstanding performance. E-paper technology: Pioneering green reading E-paper, an energy-saving and environmentally friendly display technology, is gradually transforming reading habits. The E-paper Exhibition Area is a key part of the green sustainable development theme of C-Touch & Display Shenzhen 2024, focusing on e-paper display technology and its application products. E-paper, with features such as low power consumption, high resolution, and flexibility, is widely used in e-books, e-tags, smart logistics, and other fields. E-paper Technology Zone Visitors will have the opportunity to learn about the latest advancements in e-paper technology In the E-paper Technology Zone, exhibitors will showcase e-paper displays of various sizes and forms, including black-and-white and colour displays. Visitors will have the opportunity to learn about the latest advancements in e-paper technology, such as reflective display principles and ink screen technology, and explore innovative applications in education, retail, logistics, and other sectors. Flexible displays: Breaking traditional constraints As new models are introduced and prices decrease, OLED technology is expected to achieve rapid growth, particularly in foldable phones. C-Touch & Display Shenzhen 2024 will feature the latest advancements in flexible display technology, exploring innovative applications in smartphones, smartwatches, and other terminal devices. MLED: Pioneer of Next-generation Display Technology The MLED Technology Exhibition Area will highlight the latest research and development achievements and processes in MLED technology. It will showcase the manufacturing technology of Mini LED and Micro LED, high-brightness display technology, and high-reliability packaging technology in high-end televisions, monitors, commercial advertising, smart wearables, and other scenarios, envisioning the infinite possibilities of future display technology. Latest technologies and solutions Additionally, more than 80 themed forums will be held concurrently, bringing together experts and visionaries to provide insights into the latest technologies and solutions in Display and Touchscreen, Smart Cockpit and In-Vehicle Display, Electronic Paper, OLED, AR/VR, Commercial Display, and more. Visitors will have the opportunity to deeply exchange ideas with industry pioneers and peers, jointly promoting the progress and application expansion of new touch and display technology. View the agenda of onsite events: Shenzhen International Display and Touchscreen Elite Summit 2024 Shenzhen International Mini/Micro LED Industrial Chain Innovation and Development Summit Forum 2024 Shenzhen International OLED Industrial Chain Development Seminar 2024 Shenzhen International Commercial Display Elite Summit 2024 Shenzhen Ultra HD Display Summit Forum 2024 Shenzhen International Intelligent Cockpit and Vehicle Display Summit Forum 2024 AI Security and Smart Commercial Display Innovation and Development Summit Forum 2024 Micro OLED & Si-Display Forum 2024 8th Enabling | AR/VR Cross-Border Integration Innovation Forum Global Electronic Paper Technology and Application Summit Forum and Industry Research Conference 2024 The 6 connected shows: a mega feast of innovation C-Touch & Display Shenzhen 2024 will be held concurrently with FILM & TAPE EXPO, Automotive World China, AMTS & AHTE South China, NEPCON Asia, and the Electronics Sourcing Show. Together at China's innovation hub, with over 160,000 sqm and 3,500 exhibitors and brands gathering, the six flagship shows covering automotive, electronics, display, and new materials will connect attendees across key industries in advanced manufacturing, providing industry practitioners with an unparalleled exhibition experience.
Gunnebo Safe Storage has launched Origo as a new electronic safe lock tailored for safes, strong rooms and vault doors, to secure against increasingly sophisticated burglary risks. The global provider of safe storage solutions has introduced Origo to play a significant role in safeguarding valuables, cash, and document storage in high-risk environments, with no compromise to style or compliance. Sophisticated security solutions Origo offers a secure One-Time-Code (OTC) algorithm and encrypted communication, offering unparalleled protection for valuables in banking, Cash in Transit, high-risk environments, and commercial sectors. Says Kate Clark, Vice President of Business Development Innovation and R&D at Gunnebo Safe Storage: “With a significant rise in robberies, shoplifting, burglary, and theft over the past year, the need for sophisticated security solutions has never been more pressing. Businesses and the wider commercial sector are facing unprecedented challenges in protecting their assets and ensuring the safety of their premises." Origo safe locks Origo safe locks can operate as standalone keys or integrated network mode, with up to 15 secure units connected Clark added: “In launching Origo, we demonstrate how Gunnebo Safe Storage is committed to innovation and security excellence, both being at the core of everything we do. Constantly listening to feedback, we are finding ways to enhance our product portfolio to meet evolving requirements to enable more customers to benefit from smart safe locking technology. “ Origo safe locks can operate as standalone solutions or integrated network mode, with up to 15 secure units connected, requiring minimal user intervention for lock access. This can be via fixed codes or with the flexible combination of fixed codes and one-time codes that can be set for certain periods of time. Data security and communication encryption Certified secure units across B, C, and D classes guarantee heightened reliability across diverse application areas. Origo safe locks have attained certifications from industry authorities such as VdS, ECB•S, and CNPP, demonstrating adherence to the rigorous European EN 1300:2023 standard for data security and communication encryption. Kate concludes: "Origo sets the benchmark for reliability and security in electronic safe locks. As we continue to innovate and evolve, our customers remain at the heart of everything we do. Their trust and satisfaction drive us to continuously improve, ensuring that we not only meet but exceed their expectations. With Gunnebo Safe Storage, you can trust that your security needs are in capable hands, backed by a legacy of excellence and a steadfast commitment to innovation." The user management software platform for the Origo range of safe locks is validated with S-CONSIT and ATRUVIA certificates.
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimise your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzeit, President of Idesco, a provider of ID card solutions. Supply chain concerns Supply chain concerns will continue as companies seek to upgrade and purchase new ID printers and badges An impact of the pandemic was a shortage of supplies related to the ID card industry, says Schonzeit. Like other industries, several leading ID card and printer manufacturers had supply chain issues, and some deliveries were delayed at times for more than six months. Supply chain concerns will continue into 2023 as more companies return to the workplace and others seek to upgrade their current systems and purchase new ID printers and badges. Persistent price increase concerns “The shortage created hardships for end users and often resulted in them purchasing any solution that was readily available even if it was not the preferred one,” says Schonzeit. Another issue during the pandemic was persistent price increases, due both to inflationary pressures and a shortage of products. The industry was used to stable prices with infrequent increases, but the pandemic changed this quickly. Some companies also decided to upgrade their entire system as employees returning to the office increased demand. Oversized credentials advantages Among the advantages of oversized credentials is the ability to print more information on the card, says Schonzeit. For example, a larger credential allows event organisers to preprint the corporate agenda on the back of the card to increase efficiency. In addition, companies can enhance their brand presence by distributing a nice thick plastic badge to attendees. Two categories Standard credit card size These are generally CR100 size, which is around 40% larger than the standard credit card Oversized badges fall into two main categories. One category is for cards that are larger than the standard credit card size (CR80), but smaller than event badges. These are generally CR100 size, which is around 40% larger than the standard credit card. They are generally used by law enforcement or healthcare institutions. It is easier to see an oversized badge more clearly from a distance than a regular-sized badge. Oversized ID badges The other category of oversized ID badges is used for events, these badges are typically 3.5” by 5.5” and are usually worn around the neck. These events include categories such as sporting events, corporate events, music festivals, and trade shows. The badges are generally used only for the duration of the event and are often kept as souvenirs. Anticipating the needs “My advice for event planners is to manage your expectations about badges as it is very hard to order extra badges at the last minute,” says Schonzeit. “It is important to plan well in advance and anticipate your needs upfront to help avoid a shortage.” Idesco often gets requests from customers to include some type of technology on the credentials. The most common technologies are proximity cards, NFC, and/or UHF. “It is a much ‘cleaner’ and safer solution if the chip can be embedded within the credential as opposed to putting a sticker on the outside of the credential,” says Schonzeit. Additional technologies in credentials Customers wanting technology in their credentials should allow additional lead time Generally, these additional technologies are used for gaining entry to a location (access control), or they can be used for gathering valuable information regarding an event, including attendance at seminars, crowd flow, vending, and food services information, among others. Supply chain issues have led to less availability of many of the most common chips, which can impact delivery times. Customers wanting technology in their credentials should allow additional lead time, says Schonzeit. Applications In addition to corporate events, sporting events, and trade shows, other markets can also benefit from oversized ID badges. Industries include healthcare, government, and law enforcement. Oversized badges are becoming more popular in hospitals, for example, where color coding can make it easy to identify doctors, nurses, and hospital personnel from a distance, even in congested hospital spaces. ID card necessity Could there be a negative impact on the ID card industry if more companies allow employees to work from home? It’s always a possibility, says Schonzeit. “However, with many hybrid options out there, most employees are required to come to the office either one or two days a week,” he says. “Employees will still need a way to access their workplace for meetings, conferences, etc., and will require an ID card to do so.” Mobile vs. physical credentials The growing popularity of mobile credentials has created some concerns in the ID card marketplace The growing popularity of mobile credentials has created some concerns in the ID card marketplace about the continuing need for a physical credential. So far it has not been an issue. “[Mobile credentials] have not had any type of meaningful effect on the physical ID card market,” says Schonzeit. Relying on smartphones “Sometimes these disruptive technologies can linger in the background for some time and then suddenly have a massive effect on the market. This is something to be concerned about, but I don’t think there is an imminent threat.” A big issue with using only mobile credentials is the need for a backup plan rather than relying only on a smartphone to enter a facility. Also, for mobile credentials to work, specialised readers are required, which requires a large investment. “In my opinion, ID badges are here to stay for the long haul,” says Schonzeit.
Case studies
As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totalling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio wireless locks Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Aperio visitor access system Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. A few clicks are all it takes to cancel a lost key card and issue a replacement. Real-time and future-proofed Security staff at The Camp ensure only authorised users enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because (access) rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto, adding “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Aperio product ecosystem’s performance Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery-powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. Modern digital solution Modern digital solution would provide better oversight of movement around the building They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorisations, even at the last minute. Digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. Maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provide security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station 902C-A Master Station
With a stock of over 13,000 apartments and an ambitious new residential development programme, GWW has been helping to make Wiesbaden affordable for a broad range of population groups over more than 70 years. Digital access is helping them meet the needs of the future with confidence and flexibility. Being the city’s largest provider of housing goes hand in hand with an aspiration to make a measurable contribution to living together in an urban environment. GWW’s corporate culture Social involvement is an integral part of GWW’s corporate culture and for its 200 employees Social, voluntary and civic involvement is an integral part of GWW’s corporate culture and for its 200 employees. To date, multiple projects have been initiated, supported and promoted, focusing on integration, participation and prevention, as well as various dimensions of sustainability. When digitalising access for their multi-residential housing sites, they sought an easy-to-install solution with devices that work wirelessly and without batteries. Broad range of devices To simplify specification and procurement, they searched for a manufacturer able to offer a broad range of devices to protect the entrances, communal and technical doors of all residential buildings. And of course, for maximum user convenience and inclusivity, door devices must be easy to operate for all age groups. Manage a multi-residential property from anywhere The reliable solution is characterised by a robust, compact build with durable and secure components GWW chose ASSA ABLOY and its eCLIQ electronic locking system, which offers modern management and full flexibility. The reliable solution is characterised by a robust, compact build with durable and secure components. For users, it’s familiar — working just like a traditional lock and key. All eCLIQ cylinders are wireless and battery-free. Power is supplied by the battery in the key. Thus, doors with CLIQ® cylinders can always unlock without their own power supply. eCLIQ Connect key Another major factor in GWW’s choice was that authorisations can be set and changed flexibly in the CLIQ Web Manager, accessible from anywhere with an internet connection. Lost keys can be deactivated immediately. Time and room restrictions can also be defined, to grant cleaning staff access at specific times, for example. GWW issues different eCLIQ keys depending on user requirements. For example, the eCLIQ Connect key can receive new access authorisations remotely and at short notice: the keyholder simply updates their own key by making a Bluetooth connection between it and their Connect mobile app. Residential housing management Greater efficiency helps multi-residence providers to improve their service and boost resident satisfaction In many multi-residential and ‘multi-family’ housing developments across Europe, digital management is already streamlining daily operations. Greater efficiency helps multi-residence providers to improve their service and boost resident satisfaction. Digital access becomes a seamless experience for the resident and a reputation enhancer for the housing provider. It delivers both parties a concrete ROI. Digital access system With a digital system, managing service providers is also simpler. Each one can carry access credentials that fit their precise time-period and location requirements. For example, cleaners may be admitted five mornings a week. Their programmable credentials only unlock site doors during this window. Permissions automatically expire after an agreed period, saving building managers time and hassle.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl, adding “The whole world goes in and out. Security is very important.” Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It now attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Access rights management Digital devices and low-impact skills were needed to assure compliance with origin protection Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers – including up to 100 waiters working each shift – within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. Digital access for a famous heritage building Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly – simply by reprogramming cylinders – ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers, such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion – and encrypts data transfer between cylinder, key and system – so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager: “I can program keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. He adds, “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” New master key system With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime – future-proofing Hofbräuhaus access. “The situation before the new master key system was installed was problematic,” says Robert Graßl, adding “Keys were distributed and nobody knew who held them. Now, everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
In any construction project, meticulous recording and management of door hardware is critical —although often prone to human error. What if there was a way to harness digital technology to fulfil this crucial requirement in a dependable, efficient, agile way? Located in several cities around India, Edifice Consultants Pvt Ltd. specialises in designing climate-responsive architectural structures that harmonise with their surroundings. Complex standards and regulations Each project undertaken reflects Edifice’s collaborative ethos and dedication to enhance the immediate environment, while fostering the well-being of building users, local residents, and the landscape. Edifice’s work across commercial, residential, industrial and public service sectors has received multiple prestigious awards. Designing buildings for so many segments and industries requires broad and deep knowledge of complex standards and regulations. The experience and expertise of ASSA ABLOY have proved invaluable. Specification with Openings Studio™ ASSA ABLOY has provided Edifice with solutions for more than 750 fire-rated and non-fire doors To streamline door specification, Edifice requires digital software that can cut manual mistakes and maintain the process’s accuracy, which is essential to efficient building design. Their chosen solution — Openings Studio™ — takes a rigorous approach, speeding up specification iterations to condense the revision cycle, improve time management and help hit Edifice’s ambitious project timelines. To date, ASSA ABLOY has provided Edifice with solutions for more than 750 fire-rated and non-fire doors, via the Openings Studio plugin for Autodesk® Revit®. These include doors and door hardware suited to data centre deployment, among them mechanical mortise locks, exit devices, door closers and master-keying solutions from ASSA ABLOYs portfolio of trusted brands such as Yale and Sargent. Collaborating for transparency and project efficiency An industry-leading specification software tool and BIM plugin, Openings Studio integrates with design software to create and visualise openings for complete door, frame and hardware schedules and specifications. Its flexibility — and availability on multiple types of devices — means all specification changes are incorporated quickly and transparently, helping project delivery dates to remain on target. The Openings Studio environment also simplifies collaboration and data sharing among all project stakeholders. It helps manage openings over the full project lifecycle, from planning and estimation to installation and beyond. Door solution specifications Openings Studio maintains a unified digital thread that connects all project partners to eliminate confusion For these reasons, Openings Studio is deployed all over the world as a specification and ordering tool for building projects. It can deliver detailed door solution specifications directly to popular packages such as Revit® and ARCHICAD®, drawing on a detailed database with colour, size, thickness and certifications for every product; as well as installation and compliance information, Environmental Product Declarations (EPDs) and more. With ongoing use throughout a building’s lifetime, Openings Studio maintains a unified digital thread that connects all project partners to eliminate the confusion that comes with stakeholders having to juggle multiple versions of documents. Management of door hardware “Openings Studio has always been helpful in projects,” explains Gaurav Nirmalkar, Designer at Edifice. “Personally, I have used it in three of the data centres and it never disappoints. The simple and crisp interface is a plus point.” “Recording and management of door hardware is the most important thing in the construction industry. Openings Studio is a good choice for it.”
Products
Round table discussion
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security systems and building design coexist and complement each other? We asked this week’s Expert Panel Roundtable: How does building design impact physical security systems -- and vice versa?
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a credential or otherwise engaging, and with the system recognising who you are and allowing you to pass. In true frictionless access, everything works seamlessly, with unauthorised people obviously barred. But how close are we to realising frictionless access control? We asked this week’s Expert Panel Roundtable: Is frictionless access control a reality or an empty promise?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
White papers
Physical access control
DownloadThe key to unlocking K12 school safety grants
DownloadThe 2024 state of physical access trend report
DownloadThe security challenges of data centers
DownloadAccess control system planning phase 2
DownloadAccess control system planning phase 1
DownloadThe truth behind 9 mobile access myths
DownloadMulti-residential access management and security
DownloadBoost efficiency and streamline security with integrated access control
DownloadAI in security solution
DownloadManaging security in the age of boundaryless working
DownloadThe top 4 reasons to upgrade physical security with the Cloud
DownloadAccess control: The enterprise buyer's guide
DownloadEffectively branding a multifamily property
DownloadIdentity and access management
DownloadVideos
Door access control: Manufacturers & Suppliers
- Aiphone Door access control
- Trimec Door access control
- Alpro Door access control
- Software House Door access control
- Vanderbilt Door access control
- ASSA ABLOY - Aperio® Door access control
- HID Door access control
- Bosch Door access control
- Honeywell Security Door access control
- CyberLock Door access control
- Paxton Access Door access control
- TESA Door access control
- CDVI UK Door access control
- Adams Rite Door access control
- Magnetic Solutions Door access control
- CLIQ - ASSA ABLOY Door access control
- SALTO Door access control
- Codelocks Door access control
- CEM Door access control
- Deedlock Door access control
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download