Fingerprint Locks
Centrios, a new brand created within ASSA ABLOY to serve the small business market, announces their first shipment of hardware products to SECLOCK. Centrios is a cloud-based access control solution developed to radically simplify the needs of small and growing businesses. By connecting the Centrios mobile app with Centrios smart readers and locks, owners and managers can quickly and easily manage access for all employees and visitors in one place. Small and growing businesses The first shipme...
SARGENT, an ASSA ABLOY Group brand known for innovative door lock and hardware solutions, is excited to announce the latest evolution of its 10X Line bored locks now featuring visual status indicators. Designed to provide clear, instantaneous confirmation of a door's locked or unlocked status, these highly visible status indicators enhance users’ security and safety across a wide range of applications. New dimension of interaction "Our new SARGENT 10X Line bored locks with visual status...
Morse Watchmans, the industry pioneer in key control and asset management systems, is set to showcase its advanced solutions tailored for higher education institutions at two significant industry events this June. The company will exhibit at the ACUHO-I Conference and Expo from June 22-25, 2024 at the Baird Center in Milwaukee, and at the IACLEA Annual Conference from June 27-30, 2024 in New Orleans. Key management systems "Ensuring the security of college and university campuses is more crit...
Codelocks NetCode® Technology is celebrating its 10th anniversary. This innovative solution to the age-old problem of allowing the right access to the right people at the right time has been at the forefront of access control for over a decade. Functionality and versatility Ever since it launched in 2014, Codelocks NetCode® Technology has grown rapidly in both functionality and versatility. It has a global reputation for adding control and convenience to many access control application...
Organisations equipped with CLIQ intelligent key-based access management have confidence that their premises and employees are safe and secure. With CLIQ employees can flexibly manage access, to secure almost any opening with electronic cylinders or padlocks and programmable smart keys. A new upgrade in the programming device family simultaneously enhances this security and convenience. Credential updates Requiring regular credential updates is the simplest, most effective method for keeping...
Digitalisation is reshaping the way individuals live and work. Buildings should be at the centre of this change, streamlining daily interactions with homes, offices, and other workplaces, moving into and around them seamlessly. Everyone who uses a site also needs confidence in its security and safety, not just its efficiency and usability. Connected digital access In addition, connected digital access is a fundamental block in constructing more intelligent buildings. As analysts Omdia...
News
Matrix successfully demonstrated its cutting-edge security products and solutions at InnoMetro 2024, held from May 21st to 22nd at the Hotel Taj Vivanta. As a pioneering Indian company, Matrix proudly presented its RDSO 6.0-compliant network cameras, specifically designed for Indian Railways, at Booth No. H1.17. During the event, Matrix highlighted its commitment to cybersecurity with network cameras certified by STQC, Delhi lab, adhering to OWASP ASVS 4.0 L2 norms. These cameras ensure the security of video data during transmission and storage, safeguarding critical passenger information against cyber threats. Compliant with EN50155 standards Also, Matrix showcased its acclaimed Project Bullet IP Cameras and Project Dome IP Cameras Matrix captivated attendees with its state-of-the-art IP Video Surveillance, Access Control, and Time-Attendance solutions tailored for Metro Rail Systems. A standout attraction was the newly launched Ruggedised IP Camera, compliant with EN50155 standards, designed to withstand vibrations and shocks, and ideal for transportation monitoring. This camera delivers high-quality video, exceptional low-light sensitivity, and robust performance in dynamic transit environments. Additionally, Matrix showcased its acclaimed Project Bullet IP Cameras and Project Dome IP Cameras, both RDSO 6.0 ready, offering high-resolution imagery for large-scale organisational needs. Visitors also explored the compact 4-Channel NVR, featuring up to 10TB storage capacity, and a fanless, ventless design minimising dust, wear, and system malfunctions. Advanced face recognition technology Device offers swift authentication through AADHAAR numbers and fingerprints In the realm of Access Control and Time-Attendance, Matrix presented the COSEC ARGO FACE, an intelligent door controller with advanced face recognition technology. Its features include Adaptive Face Recognition, Face Liveness Detection, and Mask Compulsion, ensuring rapid and secure identification with a user capacity of 50,000. Matrix also showcased COSEC VEGA, an embedded Linux-based AADHAAR-enabled biometric attendance device registered on the AEBAS Server. This device offers swift authentication through AADHAAR numbers and fingerprints, optimising workforce productivity for government organisations. Advance security measures Kaushal Kadakia, Marketing Head at Matrix, expressed, "InnoMetro provided a perfect platform for us to demonstrate our specialised security solutions for Indian Railways and Metro Rail Systems." "We engaged with key government decision-makers, discussing potential collaborations to advance security measures in the transportation sector."
SecuX, a blockchain security and cryptocurrency hardware wallet company, join them on May 29, 2024, at 3:00 PM at Halcyon, Austin, Texas, for an exclusive side event at the 2024 Consensus conference. "Safeguarding the Future: Innovations in Blockchain Security" brings together industry pioneers and experts to explore the latest trends and innovations in blockchain security. Engage with top experts and speakers, as they share insights on securing digital transactions and infrastructures. The event features keynote sessions, Q&A, and networking opportunities. Don't miss this chance to connect with like-minded professionals and stay ahead in the blockchain security landscape. New product lines In addition to thought-provoking discussions, SecuX will unveil its new product lines designed to enhance digital security: Neo Series: Neo-X: A premium hardware wallet featuring a sleek space grey metal casing, engineered for crypto enthusiasts and investors. It supports over 5000 cryptocurrencies and various NFT blockchains such as Ethereum, Solana, Polygon, and BSC. With WalletConnect for seamless Dapp interactions and the ability to display NFTs directly on the hardware wallet, the Neo-X ensures top-tier security and a user-friendly experience. NeoGold: Tailored specifically for beginners, this metallic gold hardware wallet offers a fast and simple setup with step-by-step illustrated instructions. Despite its beginner-friendly design, the NeoGold provides the same comprehensive security, ease of use, and extensive crypto coverage as the Neo-X, making it ideal for those new to cryptocurrencies. SecuX Forte: SecuX Forte is a groundbreaking encrypted USB memory stick designed to offer unparalleled security for important files and documents. Utilising AES 256 encryption technology and anti-brute force attack features, SecuX Forte ensures data protection from unauthorised access and is available in 64 GB and 128 GB capacities. The device automatically locks upon unplugging and includes a password hint feature to prevent losing access to stored data. Groundbreaking security solutions These innovative products will be available on the crowdfunding platform Indiegogo for a limited time with an early bird offer. Attendees of the event will have the exclusive opportunity to be among the first to experience these groundbreaking security solutions. SecuX is committed to pioneering advancements in blockchain security, ensuring the safety and integrity of digital assets for individuals and businesses alike. Join them at Consensus 2024 and be part of the future of blockchain security.
Corbin Russwin, an ASSA ABLOY Group brand, introduces the newest function for the ML2000 Series mortise lock - Motorised Electric Latch Retraction (MELR). Engineered for demanding commercial, institutional, and industrial applications, these new locks set new benchmarks in security by ensuring compliance, reliability and the enduring style and security that everyone has come to expect from Corbin Russwin door hardware solutions. New ML2000 Series MELR mortise locks “Our new ML2000 Series MELR mortise locks combine the best in electronic access and mechanical lock technologies to deliver a new benchmark in security,” said Lori Brown, Senior Product Manager, ASSA ABLOY Opening Solutions. Lori Brown adds, “Their universal compatibility with any access control software platform makes them ideal for installation in virtually any commercial, institutional or industrial facility.” Designed with versatility in mind These locks are ideal for a wide range of applications fulfilling the needs of robotic door operators Corbin Russwin ML2000 Series MELR mortise locks are at the forefront of lock technology, offering fast latch bolt retraction in just half a second, ensuring immediate access in high-traffic scenarios. Designed with versatility in mind, these locks are ideal for a wide range of applications fulfilling requirements for automatic door operators and ADA compliance requirements for handicap access. Certified to ANSI/BHMA A156.13 Grade 1 and ANSI/BHMA A156.25 compliance standards for superior performance, their ML2000 Series MELR mortise locks are also UL/cUL fire-rated for three-hour doors, and UL294/UCL60839-11-1 Listed and Windstorm Certified (refer to local codes). Key accessibility features Key accessibility features include optional Request to Exit functionality, adaptable designs for both in-swing and out-swing doors, and compatibility with any access control system. Corbin Russwin ML2000 Series MELR mortise locks boast quiet, efficient operation with low power consumption, reflecting their commitment to environmental responsibility.
Codelocks (Australia) Pty Ltd, an access control company that designs and distributes innovative, standalone keyless door locks, is celebrating ten years of providing leading-edge mechanical and electronic access control solutions to the APAC market. In ten years, the Australian arm of the global company, headquartered in the UK with subsidiary offices in North America and Europe, has grown into a multi-million AUS dollar business serving over 1,500 clients across Australia, New Zealand and Asia. Doors of cabinet makers Mark Samuelson was one of the first appointments made at Codelocks Australia Codelocks’ APAC General Manager, Mark Samuelson was one of the first appointments made at Codelocks Australia and has steered the company to its tenth anniversary. Mark Samuelson said, “When we first set up the Codelocks Asia Pacific entity, we had little market share and there was very low recognition of Codelocks as a player in the market, so building brand awareness became our number one priority.” Mark and his colleagues set about bringing the Codelocks brand to the market by knocking on the doors of cabinet makers and joiners and exhibiting at trade shows including the AWISA (Australian Woodworking Industry Suppliers Association) exhibition, no vacancy, and local industry organisations like the Master Locksmiths Association of Australia and the Locksmith Guild of Australia. Holding significant stocks Codelocks’ reputation for reliable, cost-effective, and easy-to-fit and programme access control products combined with its focus on exemplary service and support has seen it become the first choice for hundreds of businesses across hospitality, mining, banking, retail, education, healthcare and government. By holding significant stocks Codelocks Australia can service customer demand, whether this be for a single unit or several thousand units. This is part of the company’s ethos to provide a level of service that is determined by the customer and is unparalleled in the industry. Network of industry and channel partners Colin Campbell, Managing Director of Codelocks puts the success of Codelocks Australia down to the firm foundation that Mark Samuelson and his fellow Director, Adrian Young built through sheer hard work and determination. Colin Campbell said, “The growth of the company has been stellar, and that’s down to Mark and Adrian having a strong strategy from the outset and the commitment to see their strategy through. We have seen their model pay off, with strong sales through a network of industry and channel partners who actively champion Codelocks’ solutions.” Easy-to-use access control products Mark Samuelson said, "Ten years ago electronic locks weren’t a big thing, and we had some work to do to convince joiners and cabinet makers of their suitability. We took care to build out from having a single level of reseller by engaging a level of expert partners who are a channel to the locksmiths, and another that works with specifiers and architects." He adds, "Now whenever you walk through an airport or go to a gym, school, hospital or large retail chain, the chances are you’ll see Codelocks’ products on doors and cabinets." Codelocks moved into larger offices in Chatswood, NSW Last year, Codelocks moved into larger offices in Chatswood, NSW. This was essential to meet the increasing demand for its range of easy-to-use access control products which are sold directly through the company’s website, by specialist trade retailers and via a network of distributors and cabinet makers.
Following the continuous development of artificial intelligence and loT further increasing prospects for manufacturers, Secutech 2024, Asia’s ultimate business and technology platform for security, loT, and AI integration, concluded its 25th edition on 26 April. 300 exhibitors from 13 countries and regions showcased their technological advancements at the Taipei Nangang Exhibition Center, welcoming 15,123 visitors (up 10% compared to the previous edition), including systems integrators, consultants, and distributors from Asia and beyond. Secutech 2024 The concurrent events of Mobility, Fire & Safety, and SMAbuilding, along with 124 seminars, proved to be significant draws for buyers. At Secutech 2024, a wide variety of leading industry stakeholders gathered to witness the further development of smart applications and products. Smart security solutions Ms. Regina Tsai, general manager of Messe Frankfurt (HK) Ltd – Taiwan Branch, spoke at the fair’s conclusion, “Secutech is a crucial link for the development of the security industry, connecting Taiwan, Asia-Pacific and the world, and has evolved into a platform where business and innovation intersect." "Across three engaging days, we have witnessed the widespread application of smart security solutions in various sectors such as smart railway, logistics, disaster prevention, storage, hospitality, security, hotels, and more, with numerous opportunities for cross-sector collaboration.” AI, loT, and other disaster prevention Delivering the opening remarks on the first day of the show, Mr. Cheng Wen-Tsan, Taiwanese Vice Premier of Executive Yuan said, “Security and resilience are ever-evolving industries, with a continuous stream of innovative technologies emerging, such as AI, loT, and other disaster prevention technologies." "I believe Secutech will introduce numerous innovations to the security industry and offer new solutions that can benefit cities and countries worldwide.” International exhibitors and buyers China, Germany, Italy, Japan, Korea, Switzerland, and more showcased their wide range of intelligent solutions Secutech consistently draws a range of international exhibitors and buyers. In this edition, among the top visiting countries were China, Indonesia, Japan, Singapore, Thailand, and the US. Exhibitors hailing from China, Germany, Italy, Japan, Korea, Luxembourg, Switzerland, Taiwan, the UK, the US, and more showcased their wide range of intelligent solutions, with many booths benefitting from the strong visitor flow. Buyers were particularly intrigued by several standout features, such as surveillance automation systems, platform reliability software, smart parking system management, and video fire detection systems. Seamless sourcing Moreover, the presence of 10 dedicated pavilions, led by industry powerhouses, served as focal points for various industries including transportation, smart home & building, smart factory, and fire & safety. This facilitated the seamless sourcing of products and solutions across vertical markets. 2024 Asia Disaster Prevention Forum Complementing the trading platform, 124 seminars helped industry players expand their understanding of market developments, covering six major areas: Security, industrial safety, Fire Safety and Disaster Prevention, Smart Building, Smart Transportation, and Smart Mobility Solutions. In one particular highlight, industry experts from Taiwan, Japan, and the Philippines discussed technology integration aimed at enhancing disaster response at the “2024 Asia Disaster Prevention Forum”. Exhibitors’ comments I-TEK, Taiwan “Our products include smart door access control systems and smart door locks, serving the commercial market in airports, hospitals, schools, and government buildings. We participate to promote our brand and attract customers from Taiwan and around the world. This time, we connected with many buyers from Spain, Japan, the Philippines, and Eastern Europe," said Mr. Mike Shen, General Manager, I-TEK, Taiwan. "The concurrent events also facilitated valuable discussions and potential collaborations with exhibitors from different fields. We will continue to participate in Secutech!" Nohmi Taiwan Ltd. “This is our first time exhibiting at Secutech, attracted by its stellar reputation. Our goal is to increase our company visibility and showcase our new products to a broader customer base. The number of active and goal-oriented visitors exceeded my expectations, with some showing a strong intention to cooperate," said Mr. Tom Ni, Fire Protection Engineer, Nohmi Taiwan Ltd. "The fair’s strength lies in providing a hands-on experience for visitors, allowing them to personally engage with the products. Secutechnot not only attracts participants from the fire protection field but also fosters cross-industry collaboration, making it an ideal platform.” Hi Sharp Electronics Co Ltd, Taiwan “We have participated in every edition of Secutech, and our company has grown alongside this fair. Secutech is a prominent platform for manufacturers to showcase their products and services. In the security industry, the significance of AI technology continues to rise," said Mr. Morris Fan, Manager, Hi Sharp Electronics Co Ltd, Taiwan. "We provide customised solutions for customers and our booth has been very busy throughout, mainly with buyers from abroad, including India, Indonesia, Japan, Singapore, and the UK, primarily comprising project managers and wholesalers, which is precisely our target customer group.” Network Optix, USA “Participating at Secutech helps us reinforce our committed presence in the region, particularly Taiwan, and the fair is a central hub for connecting with partners from Southeast Asia and beyond. It's not only about meeting new contacts; many existing partners also visit us and explore Taiwan," said Mr. James Cox, VP Business Development, Network Optix, USA. "Having attended other trade fairs around the world, Secutech stands out with its broad offerings and innovations. More importantly, it offers a cost-effective return on investment. I'm confident that we'll return for future editions of the show.” Visitors’ comments The Security Solutions Association of Singapore “Digitalisation is a key focus, and the security industry is undergoing a technology-driven transformation. Our members from Singapore are keen to participate and benefit from these trends," said Mr. Jason Kurek, President of the Security Solutions Association of Singapore. "Attending this fair has been beneficial for sourcing and building relationships, as face-to-face meetings are crucial for establishing personal connections and fostering collaboration. We greatly appreciate the warm hospitality extended through the buyer programme, and are confident that our relationship with Secutech will continue to strengthen in the future." Trustlink Company Ltd “We are a system integration company in Myanmar, specialising in government and banking sector projects. This is our first time participating at Secutech – we aim to source innovative solutions for our upcoming project, specifically seeking cameras integrated with AI technology," said Mr. Threin Htun, Managing Director, Trustlink Company Ltd. "These cameras are crucial for smart development and enhancing law enforcement regulations for road and vehicle controls. We were pleased to find a wider range of these products at the fair and had productive discussions with high-quality manufacturers who can provide the solutions and cameras we require.” Indonesian Security System Industry Association (AISKINDO) “It's truly exhilarating to be back at Secutech, reconnecting with industry friends and engaging with security system companies that develop innovative solutions," said Mr. Stefanus Ronald Juanto, Chairman of the Indonesian Security System Industry Association (AISKINDO). "The overall quality of exhibitors has significantly improved, with a notable shift towards more advanced solutions, particularly in AI and software. I see significant growth opportunities in the security market, especially in our home country of Indonesia, where innovation is on the rise.” Speaker’s insight “In recent years, Taiwan has faced frequent disasters. Through this disaster prevention forum, we aim to strengthen cooperation, foster a deeper understanding, and raise awareness among industry players in Taiwan, regarding the mitigation of natural disasters such as earthquakes and tsunamis," said Mr. Makoto Ebuchi, Deputy Director General, of the Department of Disaster Management, Kochi Prefectural Government, Japan. "At the same time, I am also excited about the potential for technology and disaster prevention exchanges with Taiwan and greatly look forward to engaging in such collaboration.”
Compatibility with a range of credential technologies can be a critical factor when selecting access control. As organisations across the world explore a move to mobile keys for access, it is more important than ever. Aperio’s open technology platform has been built on compatibility. Its range of battery-powered access hardware for integration with third-party access control systems can secure almost any opening. Wireless Aperio solutions Customers have a choice of wireless Aperio handles, escutcheons, cylinders, security locks, server rack locks, and new cabinet/cupboard locks. With Aperio, it is straightforward to control all access points digitally. And with the rapid growth of mobile adoption in security, Aperio is extending support for mobile credentials, to keep offering high convenience and security benefits to customers. Extending mobile access options The single most important factor when considering a switch to mobile, according to report data, is convenience Changes in end-user demand are reflected in a survey for the Wireless Access Control Report 2023, which suggests 29% of organisations already use mobile credentials, instead of or alongside RFID cards while another 40% of respondents anticipated deploying them within the next two years. The single most important factor when considering a switch to mobile, according to report data, is convenience. HID Seos® Aperio native mobile access is built on HID Seos®, a next-generation platform with class-leading cryptography, authentication, and privacy protection. Seos Mobile Access supports both NFC and BLE. Unlocking an Aperio device by phone is easy and intuitive: users present their phone to the reader, just like a smart card. They don’t even need to open an app. Aperio has also integrated cutting-edge mobile access credentials from Gallagher and STid in response to the growing demand for mobile solutions. With this, Aperio broadens the range of options available, facilitating seamless integration with mobile devices and enhanced flexibility. High convenience “The open nature of the Aperio development platform removes compatibility worries for OEMs, integrators, and other partners which translates to high convenience for their customers,” says Piet Van Den Bossche, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA. “It is a natural progression for us now to add support for STid and Gallagher mobile credentials, to reflect their growth among our integration partners.” Aperio openness: “No lock-in, only choice” Security managers may gradually roll out mobile access while RFID cards already issued remain valid “Aperio’s approach supports an ecosystem where customers are not constrained by their initial choices,” adds Van Den Bossche. “Aperio users can effortlessly transition to the latest mobile credential technologies without being tied down, ensuring they are always equipped to meet evolving security demands and new challenges.” In addition, to increase flexibility, Aperio locks can handle multiple credential technologies at the same site: Security managers may gradually roll out mobile access while RFID cards already issued remain valid. Credential compatibility Aperio’s credential compatibility has grown in tandem with the platform. Aperio wireless devices now unlock via the widest range of RFID technologies, in both Online and Offline modes. “To continue to make these convenience and security advantages available to the widest possible market, Aperio will continue to be an open platform that supports the growth in mobile credentials,” confirms Van Den Bossche.
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Case studies
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and large groups, presentations, and individual work. Access to these spaces required a flexible and modern locking solution ideally with as few keys as possible. Employees and students must feel welcome and safe. Need for an easily integrated system Dependable security was needed for all kinds of valuable learning materials and sensitive information Dependable security was needed for all kinds of valuable learning materials and sensitive information. “Easy integration with the existing access control system without additional software,” was the goal, according to Alex te Pas, functional manager of facilities management information systems. Keyless access for improved security and management “Within our organisation, we want to phase out the use of keys,” he says. “Because when employees left, we noticed that people often forgot to turn in keys or tokens. In the event of an audit, we then have a problem." Wireless Aperio locks The college chose Aperio locks which are easy to integrate wirelessly with their existing Nedap AEOS access control system. No additional software is needed: wireless Aperio locks communicate via Aperio Hubs which handle secure, real-time communication between locks and the AEOS system. This way, college security staff have full control over access and can quickly revoke anyone’s access rights. Saves time and costs The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks Because Aperio devices run on batteries, rather than mains power, there was no need to make any major adjustments to the doors. This saves both time and cost during installation. The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks, which require an ‘always on’ connection to the power grid to maintain secure status. Aperio E100 Escutcheon The college chose the Aperio E100 Escutcheon to secure doors throughout the building. The E100 offers a convenient combination of free exit from the inside with automatic locking on closure from the outside. It comes in a variety of specifications to fit different door security levels or everyday usage, including a version with PINpad which adds another level of control. 2-factor authentication With the additional PIN code, the risk of unauthorised access via a found or stolen pass is minimised. “We wanted to provide our technical rooms with 2-factor authentication. So here we chose Aperio locks with PIN code capability,” adds te Pas. Extending an AEOS system with Aperio wireless devices Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio devices. End-users can get even more out of an existing Nedap AEOS system by integrating Aperio cylinders, escutcheons, handles, and more, online and/or offline, giving security managers control over traffic to and through more areas at their premises. Multiple device support Nedap integration supports multiple devices from the Aperio range, including the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100), and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden and glass doors, as well as fire doors. Online integration with AEOS can use different interfaces (RS485 / IP), connecting lock and system via hubs that control up to 16 locks. AEOS software A full set of powerful functions and events is made available for any Aperio device within the AEOS interface, including door or battery status and tamper detection. AEOS software manages everything, eliminating unproductive tasks including any need to duplicate data entry saving time, and extending control without hassle for building users or administrators.
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. ALCEA is the brand formerly known as ASSA ABLOY Global Solutions - Critical Infrastructure. The ALCEA Traffic Cabinet Locking Solution has gained traction with transportation infrastructure departments in major cities across the United States. It was developed by Jerry Burhans, managing director for North America, and Michael Woody, manager of the ALCEA Competence Centre in Irving, which shares a border with Grand Prairie. Now this access management solution is beginning to impact medium-sized communities like them. Proactive cybersecurity measures Perez said this skill project will save all city signal cabinets from tampering and unauthorised key Raul Perez, a 13-year transportation industry veteran who has served as Grand Prairie’s ITS Specialist for 2-1/2 years, said this installation project will protect all city signal cabinets from tampering and unauthorised access. Involving 240 smart locks, 210 high-security mechanical locks and padlocks on all city traffic cabinets plus 10 message boards, 191 mechanical locks for all school flashing sign cabinets, and 20 Bluetooth keys is in step with the city’s policy of adopting proactive cybersecurity measures. “Having control over who has access and when to our traffic cabinets was a major driver for this project,” he acknowledged. “We have not had people trying to force their entry into our cabinets, but we did have several occasions where contractors were gaining access to them without permission or notice. ALCEA was the clear choice for our smart lock needs, offering a solution that aligns with our requirements.” Substantial growth and the need to safeguard assets Grand Prairie has a long history associated with technology. Located in the Dallas-Fort Worth metroplex, it is the sixteenth largest city in Texas with a population of more than 207,000 people. During World War I and since, it began an association with the defence and aviation industries and served as an aircraft production site. The city sits 12 miles west of downtown Dallas and is only 10 minutes south of the Dallas-Fort Worth International Airport. With rail lines and major interstates 20 and 30 running through it, Grand Prairie has become a well-established distribution centre. The majority of the Great Southwest Industrial District’s approximately 80 million square-feet of space is in the city. State’s transportation infrastructure Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states Combine major attractions like the Lone Star Park horse racetrack and Epic Waters, one of the largest indoor waterparks in Texas, and the city’s 81 square miles of road experience heavy traffic activity all day long. Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states. After an unprecedented boom, the U.S. Census Bureau declared it is now home to more than 30 million residents following a 43% increase from 2020 to 2022. That development in part led to the Texas Department of Transportation announcing a $142 billion investment in the state’s transportation infrastructure last August as part of a 10-year state roadways plan. About the same time the announcement was made is when the city of Grand Prairie began researching options for a separately funded project to increase cybersecurity preparedness. Flexibility of a Hybrid Locking Solution “I started looking for smart locks and found ALCEA’s mechanical lock with a high security key during an online search. I was intrigued so I contacted them, inquired about their product and arranged a visit to their office for a presentation,” said Perez, who also evaluated the offerings of three other vendors. “It was then I learned about the capability of unlocking both the electronic and mechanical locks – including padlocks – and the versatility of their keys. I was very impressed by the user-friendly design of their Bluetooth smart key,” he said in reference to the ABLOY PROTEC2 CLIQÔ system. Mechanical and electromechanical locks Remote access control system mixes the parts of robotic and electromechanical locks The remote access management system combines the best characteristics of mechanical and electromechanical locks. After the initial meeting with ALCEA, Perez said he was convinced of the value of this hybrid solution but had to secure buy-in from his supervisor and department director. “Working with the ALCEA team, we tailored a price quote aimed at convincing our department director to allocate funds for this investment. The initiative was successfully integrated into our budget by the end of 2023, and the purchase order was placed in mid-January.” Demonstrated by the ALCEA team The city of Grand Prairie chose ALCEA for several key reasons. “Their product offered the advantage of securing all our enclosures with a single key, with efficiency and convenience,” said Perez. “The versatility of giving us the capability to integrate both mechanical and electronic locks, as well as padlocks, contributed to a more cost effective final solution. The user-friendly key system, coupled with the security features, ensures ease of use without compromising safety." “The expertise, customer service, and professionalism demonstrated by the ALCEA team added confidence in our decision-making process,” added Perez. “Being a local company, they are able to provide localised support.” Common problems with #2 keys protecting roadside equipment The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder. The electromechanical locks support electronic access control, key tracking, and audit trails with CLIQ Web Manager software. Perez says it instantly solves a problem that existed with their old system. “The challenges we encountered before are widespread in the transportation industry. Many traffic enclosures are accessible with a #2 key, which is impossible to track and makes unauthorised access a potential risk,” he explained. “Anyone can buy that type of key for a couple of dollars. This lack of accountability is a significant security concern, particularly with the increasing prevalence of cyber threats targeting government agencies.” Open cabinet locks and padlocks Perez says the ALCEA solution gives Grand Prairie continuity for its program. “Given the critical nature of our infrastructure and the investment in our high-tech signal control devices, protecting our assets is a top priority,” he acknowledged. “We now have versatility where the same key will open cabinet locks and padlocks, and it can be updated by using the CLIQ app, which is convenient for everyone on our team. Technicians and supervisors wiil be using most of the keys, and the others are for the contractors who need access to the traffic cabinets on an occasional basis.”
With approximately 29,000 employees worldwide, Amdocs is a pioneering global software company providing services and solutions to communications and media companies. When building a new campus in Ra’anana, Israel, their large site with four office buildings and three underground floors required a door closer solution tailored to every door, considering their different size, type, and usage. Finding a single supplier to meet all their needs was a challenge, but they succeeded. Site requirements This new site required reliable, flexible door-closing solutions tailored for use at several hundred doors of multiple types: fire doors, public entrances, high and low traffic, and many more. For such a complex project, they also sought trustworthy specification support from an established, experienced manufacturer with a proven track record and a team with local knowledge. Door solutions across campus Requirements included full support for choosing, supplying, and installing solutions for doors across the campus “ASSA ABLOY has many access solutions related to openings in the building, including door closers. I am pleased that our project specification team was able to provide the right solutions for our customer’s requirements,” says Avi Kimhazi, Managing Director at ASSA ABLOY Israel. This included full support for choosing, supplying, and installing solutions for doors across the campus. ASSA ABLOY’s expertise and advice were always available. Product portfolio to meet the individual needs The vast range of available ASSA ABLOY Door Closers, Electric Strikes, Locks, Panic Exit Devices, and other products ensured every opening at the Amdocs Park campus was equipped with its ideal solution, without compromises. Certifications including fire compliance across the full range help to remove regulatory worries for specifiers and facilities managers. Cam-Motion technology Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications. With innovative Cam-Motion technology, the push-force required to open a door falls rapidly, providing barrier-free access for all plus secure closing to keep premises safe. DC700, DC840 and DC200 ASSA ABLOY’s Cam-Motion DC700 model creates comfortable, secure access to high-traffic public doors in the building. The DC840 model conceals the same technology within the door leaf itself and is deployed where minimal aesthetic impact is required. For smaller door sizes, choosing the cost-efficient DC200 rack and pinion door closer helped the project hit its budget targets. Hitting project deadlines with specification support Designers could visualise door solutions accurately and the right solution was specified for each opening The project was managed using BIM principles from the outset. ASSA ABLOY’s local specification team became a hub for coordinating and disseminating up-to-date information for every door solution as part of the BIM process. Alongside providing timely specifications, the team made sure supply and installation hit the timelines that construction managers required. Detailed specifications were supplied and updated digitally, so designers could visualise door solutions accurately and the right solution was specified for each opening. Openings Studio® software Openings Studio® software was a key tool for everyone involved in the project. This user-friendly software ensures accurate specification data is logged and, when approved, transmitted to the live Revit® design. With detailed specifications supplied and updated digitally, designers visualise door solutions accurately as soon as possible and ensure the right solution is specified for each opening. And because every stakeholder can have appropriate Openings Studio access, they work transparently and with accurate, up-to-date specifications.
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue and track around 100 mechanical keys per airline. It took time and was a distraction from other important tasks. Airport operator Finavia sought a more convenient way to manage and monitor cabinet access, replacing mechanical locking with a streamlined electronic solution. Lenel access control solution Finavia sought a neat solution that did not require them to fit a bulky locking device Cabinets are often small, hard to wire, and easily damaged. Thus, Finavia sought a neat solution that did not require them to fit a bulky locking device or a separate RFID reader. And because the airport already had a Lenel access control solution in place, seamless integration — without extra software or database installation — was another essential requirement. “Safety, functionality, durability, security of supply and usability were the reasons we chose the ASSA ABLOY solution,” explains Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport. A major upgrade to security for almost any cabinet Now, the automated log shows exactly which airline opened any cabinet, and when Helsinki’s airline check-in desks are now equipped with Aperio® KL100 electronic cabinet locks. The KL100 is small and has a minimal footprint. Wireless, battery-powered and with an inbuilt RFID reader, it is easy to fix to almost any cabinet, locker or drawer without cabling or causing damage. Different sizes and cam-lengths make the lock adaptable to securing sensitive spaces in almost any workplace. “Before KL100 cabinets were managed with mechanical keys, with no specific control over who has the key and who had opened the cabinet,” adds Kari Mäkinen. Now, the automated log shows exactly which airline opened any cabinet, and when. It’s efficient and hassle-free. KL100 Wireless Cabinet Lock The KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system For high convenience, a KL100 has an integrated reader, which may be unlocked with mobile keys (via NFC or BLE), as well as smartcards or fobs using all major RFID technologies. And because the Aperio platform is built from the ground up for compatibility, the KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system. Finavia was able to choose a best-in-class solution without having to compromise. Operations at the airport are more streamlined. No one needs to handle or track thousands of mechanical keys, saving time and costs spent on logistics. Every employee’s individual access may be revoked at any time from the Lenel control panel and it’s simple to audit all cabinet access if an incident occurs. A full suite of ASSA ABLOY access control devices After 18 months of operation, the solution for check-in desks has been a success. Airport managers have ordered additional Aperio KL100 devices for airport departure gates. Multiple connectable ASSA ABLOY solutions are already deployed alongside the digital cabinet locks, including wireless Aperio door handles; Protec2 CLIQ® electromechanical locking devices; and keyless, mobile-operated ABLOY padlocks to secure fencing and cargo. “The availability of all these solutions from a single manufacturer — easily used with their existing access control solution — has helped Finavia to tailor a unified, integrated system at Helsinki Airport,” says Lars Angelin, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.
Pears Jewish Campus is a seven-story education and culture complex that covers over 80,000 square feet, in Westfälische Strasse, Berlin, Germany. The building was designed by renowned architectural firm Tchoban Voss and constructed over a five-year period. It is the largest Jewish campus in Europe, encompassing a kindergarten, primary, and secondary school, a cinema, sports and events halls, art and music studios, co-working office spaces, as well as a kosher restaurant. Paxton’s latest system Paxton10 has been installed to secure the building with sophisticated access control, remote-site management, and flexible access permissions. Requirements Security is of the utmost importance for the safety and protection of young students, teachers and professionals working within the campus, given the anti-Semitic incidents. This prompted the development of a comprehensive security concept with enhanced capabilities, including the need for full-lockdown functionality and checkpoints with weapon detection. Due to the increased level of security needed, Peter Gräf, Managing Director of GRAEF Systemtechnik GmbH, was contracted to oversee the installation and technical aspects of the new security system. Systemtechnik is a group of companies with an arm that specialises in securing high-footfall public sector buildings. Systemtechnik is a level of firms with an arm that specialises in tying high-footfall public sector buildings Peter established that this was a project far beyond the normal requirements. He explains: “Every security measure on the campus had to be designed to recognise and ward off potential threats at an early stage and create a safe yet welcoming environment. The system also needs the ability to convert into manual operation and shut down all electronic keypads from sunset on Fridays to sunset on Saturdays for Shabbat, the Jewish day of rest.” For ease of use, the campus managers need web-based remote site management software and a straightforward way to connect across multiple buildings in various locations. Peter continues: “It is a large site and running cables across it would be a challenge. Having a system that links wirelessly is the simplest and most cost-effective solution. Additionally, there are many people requiring varying levels of access permissions throughout the week. Therefore, it is especially important to be able to implement simple measures to allow access to certain areas at certain times by using electronic tokens that can be issued remotely.” All these requirements coincide with the fact that the system needs long-term scalability, and the design of the hardware used had to meet the expectations of award-winning German architect and artist Sergei Tchoban, who designed the building. Solution To achieve the enhanced security needs of the campus, Peter recommended Paxton10, access control and video management on one simple platform. This was due to multi-site functionality and flexible software configuration, and no requirement for a VPN. It works utilising cloud technology and a Paxton10 server. He explains: “Paxton 10 is easy to specify and install. The modern software is extremely customisable with easily programmable rules and can manage multiple sites remotely with the web software or the Paxton Connect app. Also, the mix of storing data on premises and in the cloud made it ideal for this high-security project.” Peter recommended Paxton10, access control and video management on one simple platform Paxton10 has been installed on 20 main doors across the campus and on turnstiles that form weapon-detecting checkpoints. The system has also been integrated with anti-terror software that locks down the site, meaning no one can enter or leave once initiated. The current setup leaves the building managers with plenty of room to scale the system up, as Paxton10 can manage 1,000 doors, and 50,000 users from a single Paxton10 server. PaxLock wireless door handles have been installed on office doors and employee wellbeing areas. Authorised users can gain access with traditional fobs or more modern smart credentials which are sent through the Paxton10 software to an end-user's smart device, and work within the free Paxton Key app. Peter continues: “Smart credentials are ideal for the vast number of students on campus. They like using their smartphones, and it means they are not losing tokens that are expensive to replace. However, having the choice to still gain access with traditional fobs has been useful as there are a substantial number of people with varying technological preferences.” Results The installation has met the advanced security requirements mapped out in the original concept, and the system can turn into manual operation at the touch of a button for ease of use when Shabbat is being recognised. Overall, the building managers are pleased with the system’s functionality and have been working with Paxton’s Support team configuring Paxton10 to suit the bespoke needs of the campus. Furthermore, the hardware installed has met architectural expectations and compliments the building's heterogenous design, particularly on the main entrances where Paxton's vandal-resistant panels and readers have been installed. Peter concludes: “The system has been configured so the campus managers can make changes at the touch of a button, and the Paxton10 hardware is excellent quality and extremely aesthetically pleasing. I believe Paxton10 is the future of access control.”
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?