OSDP
Nedap is proud to introduce uPASS Go: the next-generation reader in long-range vehicle access control. As the latest addition to Nedap’s esteemed uPASS product line, uPASS Go establishes a new standard in managing vehicle entry for basic gates, like car parks, gated communities, and staff parking zones. Designed to blend significant commercial appeal with the latest technological advancements, uPASS Go transforms the landscape of vehicle access control to be smarter, more secure, and exce...
Belden Inc., a pioneering global supplier of network infrastructure and digitisation solutions, announces new products designed for secure, high-quality performance in critical applications. Data orchestration & management Hirschmann IT Dragonfly DAP847 Railway Wi-Fi 6 Radios provide connectivity for train-to-ground communications, enabling reliable roaming and high data throughput for European rail applications. Hirschmann IT MAMMUTHUS Enterprise Managed Switches deliver to...
Videx Security, a provider of access control and door entry solutions, has announced the launch of its XPROX-MO, a cutting-edge panel mount Mifare proximity reader. Designed for use with the Videx WS4 web server access control system and compatible with third-party access control systems supporting the Open Supervised Device Protocol (OSDP), the XPROX-MO offers unparalleled flexibility and security for modern access control needs. Versatile compatibility and installation The XPROX-MO reader s...
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first d...
SARGENT, an ASSA ABLOY Group brand, is showcasing its expansive portfolio of door controls, electronic access control, exit devices and locks at ISC West in booth #8061. Showcased products include SARGENT’s PE80 Series exit device, which incorporates an extensive list of next-generation features including new visual status indicators and robust end cap designs. Also highlighted is SARGENT’s extensive offering of Electronic Access Control (EAC) devices for integrated systems or WIFI...
Acre Security, a global pioneer providing state-of-the-art security systems, unveils acre access control in conjunction with the acre Smart Controller and the acre Reader. The combined ecosystem delivers extensive flexibility and offers the fastest and most user-friendly route to cloud adoption. Together, these solutions provide a simple and robust security solution to meet the evolving needs of any organisation. Functionality, flexibility, freedom Built from the outset with cybers...
News
Iris ID, the global pioneer in iris recognition technology, is showcasing its newest advancements in identity detection and authentication technology at ISC West 2024 in booth #28057. The company is emphasising its portfolio of multi-modal iris and facial recognition solutions that deliver the highest levels of non-invasive personal identification and authentication accuracy. The frictionless solutions are designed for a myriad of mainstream and critical infrastructure applications, as well as use in the most demanding environments found in highly volatile manufacturing, industrial and mining applications. Range of private and public users "Iris ID continues to push the ceiling for biometrics, bringing to market the most accurate and versatile iris and face recognition solutions for personal identity detection and authentication. With solutions designed to fulfil both mainstream and specialised applications, our proven biometrics solutions stand out in the industry for their ability to accurately authenticate individuals even in the most demanding applications, including through hazmat suits, safety goggles, and even with worn-down fingerprints," said Mohammed Murad, Vice President, Iris ID. “This coupled with our unparalleled deployment success has generated demand from a wide range of private and public users, and we’re excited to share these innovations and use cases with ISC West attendees.” Product portfolio and solutions Iris ID is showcasing its full product portfolio and solutions that are currently used across several verticals Iris ID's solutions excel in high-security settings like power plants, data centres, airports and labs, meeting the growing needs of government agencies on both local and global scales. Particularly noteworthy is Iris ID's expanding influence on law enforcement and border applications following its integration into the FBI’s Next Generation Identification (NGI) Iris Service in 2020. At ISC West, Iris ID is showcasing its full product portfolio and solutions that are currently used across several verticals. Additionally, they are proud to debut a new iris and face fusion device for the access control and time and attendance industries. Cutting-edge biometric solutions “Our journey of innovation has culminated in our iris biometric technology becoming the first to attain certification for SIA OSDP version 2,” added Murad. "This significant achievement, combined with longstanding partnerships with industry pioneers such as HID and NXP, underscores our unwavering commitment to advancing heightened security with personal privacy protection using our cutting-edge biometric solutions." Iris ID continues to lead the identity and security sector by further evolving its iris recognition technology to deliver seamless compatibility, broader compliance, web-based functionality, and long-distance operation.
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, is showcasing its portfolio of in-house developed and cyber-hardened access control and video surveillance solutions for enterprise applications during ISC West. At booth 18033, Johnson Controls experts are on hand to discuss the latest solutions enhancing physical and cyber security, while adapting to compliance regulations. Security and compliance “The enterprise security landscape is undergoing a transformative shift propelled by the adoption of new industry standards and stringent regulatory requirements,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “It is critical for the industry to come together and provide insights that not only help drive security and compliance but also improve business operations and empower business success.” Streamlined, flexible operations C•CURE IQ web client empowers operators to stay informed and provide everyone from front-desk reception Innovations in more cyber-secure, browser-based platforms allow users to manage and monitor access control and video surveillance from anywhere in the world. The latest release of the flagship C•CURE IQ web client empowers operators to stay informed and provide everyone from front-desk reception to management teams with the information they need when they need it. C•CURE Portal features The administrative workload of security operators is dramatically reduced through C•CURE Portal features such as Access Management Workflow, where the request and approval process for access clearance is automated and built straight into the platform. With C•CURE IQ, security operations can be optimised through security intelligence features from a single, intuitive platform to cut through data and deliver critical information first. Adopting the newest standards The enterprise segment of the security industry is facing historic changes with standards such as NERC-CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) and OSDP (Open Supervised Device Protocol). Major shifts like these often result in high-tech debt, and for some, the investment can present an obstacle that hinders compliance. To overcome this challenge and minimise the burden on security teams, system updates, and replacements must be easy and cost-effective. OSDP G2-RM-4E Door Control Module OSDP G2-RM-4E Door Control Module offers unique flexibility working in both OSDP mode and legacy “RM” mode Johnson Controls has led the charge as one of the first manufacturers to develop OSDP hardware within the C•CURE platform. The recently launched OSDP G2-RM-4E Door Control Module offers unique flexibility working in both OSDP mode and legacy “RM” mode to enable convenient backward compatibility, which is key to a cost-effective update of a security system. iSTAR Ultra G2 SE controller Continuing the OSDP theme, Johnson Controls is excited to announce a partnership with ASSA ABLOY in launching support for the KS210 integrated OSDP Server Cabinet Lock. Unique in the industry, one iSTAR Ultra G2 SE controller can support up to 32 KS210 units directly, including embedded power management for all the KS210 locks. This allows for granular yet cost-effective, rack-by-rack access control to help keep data centres safe and secure. When it comes to updating panels quickly and effectively, the latest Software House iSTAR G2 family of controllers leverages the latest innovations to enhance security, reduce operational effort, and improve user experience. Rack Mount Network Video Recorder Further strengthening its enterprise product portfolio, Johnson Controls has added a new Rack Mount Network Video Recorder (NVR) to the American Dynamics VideoEdge video surveillance portfolio, providing the highest possible reliability and increased performance with 50% more throughput. With a 5-year warranty and next-business-day on-site service, this new Rack Mount NVR sets the standard for the expansion of this portfolio to provide additional protection and peace of mind. Minimising risks and vulnerabilities C•CURE platform integrates with over 300 technology partners, with additional partner growth Platforms that prioritise interoperability between access control and security products streamline system updates and minimise risks and vulnerabilities that can be exposed when unsupported systems are in use. For example, the Johnson Controls C•CURE platform integrates with over 300 technology partners, with additional partner growth in continuous development. SwiftConnect The demand for flexibility not only extends to security operators but also to building occupants, providing dynamic and personalised methods to engage with buildings. SwiftConnect, a C•CURE integration for mobile credential management, enables users to control credentials through an iPhone or Apple Watch to access buildings, turnstiles, and other areas, such as conference rooms or hot desks for hybrid workers. Machine learning, AI, and automation Advancements in technology have enabled digitally converged security systems to be tailored to the needs of specific applications while remaining flexible enough to adapt and grow with the rapidly changing threat landscape. One of the most significant opportunities that comes with investing in an intelligent system is the potential to go beyond just security and radically improve business operations. Compliance and sustainability Platforms that leverage cloud-based, AI-powered, and data-driven technologies can help strengthen safety Platforms that leverage cloud-based, artificial intelligence (AI)-powered and data-driven technologies can help strengthen safety, reduce the pull on operator resource costs, and minimise human error. Operators can more easily create robust standards to maintain compliance and align with business goals such as sustainability. No-cost Illustra Pro camera licensing model Leveraging the powerful combination of the Victor VideoEdge video surveillance platform with Illustra IQ cameras results in best-in-class edge AI analytics, including powerful features like the detection of objects, such as people and cars, or intelligent person searches. The no-cost Illustra Pro camera licensing model makes this pairing an even more appealing proposition. Situational awareness Take this one step further with Victor Unified with the C•CURE interface, and security teams have an invaluable fused view of sensors (doors and cameras) that can be correlated for enhanced situational awareness and event/action pairing. With expanded support for third-party camera analytics, using metadata, forensic searches are faster and more accurate even within demanding environments. Platforms that simplify analytics empower operators with meaningful insights that can optimise operating efficiencies using data to guide change.
Alcatraz AI, a global pioneer in frictionless access control solutions, is proud to announce the debut of the revolutionary exterior Rock X during ISC West 2024 in Las Vegas, showcased in Booth #31075. Rock X sets a new standard in outdoor access control, featuring frictionless and secure facial authentication technology for a wide range of applications. Rock X introduces a new era of security for exterior locations using the power of AI and technical innovation to address the unique challenges posed by exterior environments. Intro of the exterior Rock X With its robust features and unparalleled performance, Alcatraz AI’s Rock X offers a comprehensive solution to safeguard exterior entrances, ensuring enhanced security and peace of mind for businesses and organisations worldwide. Alcatraz AI’s Rock X offers a comprehensive solution to safeguard exterior entrances “The introduction of the exterior Rock X marks a paradigm shift in outdoor access control," said Tina D'Agostin, CEO at Alcatraz AI. "In the past, facial biometrics have encountered significant obstacles when operating in outdoor settings. Yet, Alcatraz has successfully overcome these challenges with Rock X, making facial authentication universal. Whether facing bright sunlight or navigating through dimly lit environments, Rock X ensures that only authorised individuals gain entry using their face as their credential. With this groundbreaking technology, we're not just setting a new standard; we're reshaping the future of access control." Key features of Rock X: Enhanced Performance and Adaptability: Excels in any lighting condition: Rock X authenticates users in any lighting condition, from complete darkness to intense sunlight, with a range of 0 to 120k lux, providing reliable access control around the clock. Extreme temperature tolerance: With a temperature range of −40°C to 66°C (−40°F to 150°F), Rock X is built to withstand the harshest climates, ensuring consistent performance in all weather conditions. Unmatched Durability and Security: Complete waterproof and dustproof protection (IP66): Rock X remains fully operational even in challenging and harsh weather conditions (rain, snow, or power washer), providing reliability and functionality. Vandal-resistant design (IK08): Rock X's IK08 rating allows it to withstand physical impact, providing robust security and extreme durability. Advanced Functionality and Integration: IP Intercom (SIP) functionality with a microphone and speaker: Rock X seamlessly integrates with digital intercom systems or PBX supporting SIP, facilitating convenient two-way communication alongside access control. ONVIF camera compatibility: Adheres to the industry-standard ONVIF camera protocol, allowing seamless integration and interoperability with various systems. Easy Integration with Access Control Systems: Wiegand and OSDP compatibility: Supports Wiegand and OSDP protocols, enabling simple integration with any Access Control System (ACS) and facilitating connectivity and interoperability with existing security infrastructure. Optional Multi-Component Architecture for Enhanced Security: Secure data storage: The optional expansion module can be combined with Rock X for secure data storage on the secure side of the door, enhancing data protection and network security and ensuring the highest level of data privacy. Experience Rock X in person at ISC West Alcatraz AI Rock X is now available for pre-order. Book a demo and experience Rock X in person at ISC West Booth #31075. The Alcatraz Rock will also be on display at several partner booths, including Alvarado Dormakaba Group (18019), Automatic Systems (6071), Boon Edam (23051), Genetec (13062), Gunnebo (28061), Johnson Controls Innovation Cube (18033), Smarter Security (5089), and Software House Sales Meeting Room (Lido Hall 3003).
ISC West, in collaboration with premier sponsor the Security Industry Association (SIA), announced this year’s dynamic trio of speakers that will headline the Keynote Series at ISC West 2024. Industry professionals will be able to attend keynote presentations at the Main Stage, located in the Venetian ballrooms. The SIA Women in Security Forum (WISF) Keynote will be held on Friday, April 12, following the SIA WISF Networking Breakfast and Power 100 Celebration. These sessions are complimentary to attend and open to all ISC West badge holders. Cutting-edge security innovations “The security industry is rapidly evolving and expanding to meet the technological needs of today and tomorrow,” said ISC Event Vice President Mary Beth Shaughnessy. “Each year at ISC West, we strive to showcase these advancements through our diverse offerings – particularly through our education program and keynote speakers. I hope attendees walk away from this year’s Keynote Series with greater understanding of how cutting-edge security innovations touch countless aspects of our lives from national security to our favourite sports leagues to workplace productivity and much more.” Critical topics in cybersecurity “The 2024 ISC West Keynote Series examines three key growth areas in our industry, diving into critical topics in cybersecurity, sports security and emerging tech like generative AI, one of SIA’s top Security Megatrends for this year,” said SIA CEO Don Erickson. “These keynotes are complemented by a robust SIA Education@ISC conference program, where a wide array of industry pioneers will share their security technology, business management and career growth expertise. With an outstanding keynote lineup, 100+ top-quality education sessions and special trainings like SIA’s Security Project Management seminar, Security Industry Cybersecurity Certification Review Course and Open Supervised Device Protocol Boot Camp, ISC West offers more insights this year than ever before.” Keynote series Day 1 Keynote Cybersecurity, the Big Picture for Industry Pioneers When: Wednesday, April 10, 9:00-9:45 a.m. Speaker: Admiral Mike Rogers, former director, National Security Agency; former commander, US Cyber Command; and former chief, Central Security Service Admiral Rogers gives pioneers and teams a big-picture view of the forces at play around the world Understanding cyber risks, threats and opportunities is now a critical knowledge area and a strategic imperative for every pioneer. Admiral Mike Rogers gives pioneers and teams a big-picture view of the forces at play around the world as bad actors attempt to exploit the technological vulnerabilities of American industry to weaken both the economy and the nation’s security infrastructure–an issue of particular concern for energy, telecommunications, finance, and technology companies. Over the past few decades, Rogers has been instrumental in building the public-private partnerships, national and international policy frameworks and industry coalitions that he believes are key to successful cybersecurity efforts, and he is passionate about showing business pioneers how to harness and support that network to ensure the safety and health of American enterprise. Day 2 Keynote From the Front Lines to the Field–A Security Journey in Major League Soccer When: Thursday, April 11, 9:00-9:45 a.m. Speaker: Jeff Stonebreaker, senior vice president, safety and security, Major League Soccer Join them for an engaging presentation by Jeff Stonebreaker as he shares real-world examples and actionable strategies surrounding security operations that can be applied across various industry segments. Drawing on his extensive background in the military and law enforcement, Stonebreaker will share insights into his career transition and the transferable skills that integrate with his work as a security practitioner in the world of professional sports. Stonebreaker will share insights into his career transition and the transferable skills that integrate with his work This presentation will share a behind-the-scenes look at how Major League Soccer is leveraging data and analytics to enhance operations and inform strategic security decisions. Stonebreaker will present a unique case study on the “Messi Effect” – examining high-profile events that prompted the implementation of new security measures across various venues. Gain valuable insights into the operational complexities surrounding screening processes, sensors and detection technology, as he discusses the league’s proactive approach to ensuring the safety and enjoyment of fans. SIA Women in Security Forum Day 3 Keynote Harness Generative AI Like ChatGPT for Enhanced Performance When: Friday, April 12, 10:10-11:00 a.m. Speaker: Crystal Washington, technology trends expert and one of Forbes’ 50 Pioneering Female Futurists The future of generative artificial intelligence (AI) is here, and they don’t have to look far to see it. Technologies like ChatGPT are quickly becoming the most effective and efficient way for busy business professionals to increase profits and productivity. But if they’re not using it, the competitors certainly will. In this keynote, presented by the SIA Women in Security Forum and following a networking breakfast and celebration of the 2024 WISF Power 100 honourees, Crystal Washington will share her insights on how they can use this cutting-edge technology to drive performance and take business to the next level. Attendees will leave with a better understanding of generative AI’s best applications and practices, limitations, and its ethical considerations for the workplace. Attendees will also learn how to integrate these tools into existing systems and how AI will impact different industries in the long term. ISC West, the pioneering comprehensive and converged security trade event in the U.S., returns to Las Vegas this year at the Venetian Expo April 9-12 (SIA Education@ISC: April 9-11 | Exhibit Hall: April 10-12).
ProdataKey, a major provider of cloud access control solutions, has promoted Dallan Labrum to Executive Vice President of Sales, Brach Bengtzen to Vice President of Marketing, and Evan Orme to Chief Technology Officer and hired Brian Cropper as Chief Financial Officer. Dallan Labrum As Executive Vice President of Sales, Mr. Labrum will continue to head revenue growth through expanded integration and channel partnerships and the pursuit of new vertical markets for PDK solutions. During his seven years with the company, Labrum has nurtured a passionate, partner-centric sales culture, earning the company the highest levels of partner loyalty, customer satisfaction, and multiple industry honours. Brach Bengtzen His deep-rooted understanding of the customer mindset and facility for communicating PDK’s unique value Mr. Bengtzen, Vice President of Marketing, has served ProdataKey in various marketing, sales, and leadership roles since joining the company in 2017. His deep-rooted understanding of the customer mindset and facility for communicating PDK’s unique value proposition as the easiest-to-use, anytime, anywhere access control platform have been instrumental in building the award-winning PDK brand. Evan Orme Mr. Orme, Chief Technology Officer, has held engineering leadership roles within the company since 2019 and has personally guided the development of the many hardware and software innovations that distinguish PDK solutions. The company’s newest generation of products – the RED high-security line of OSDP-compliant hardware and soon-to-be-released PDK.io 2.0 cloud platform – are fruits of his tenure. Brian Cropper Mr. Cropper, ProdataKey’s newly appointed Chief Financial Officer, joins the company Mr. Cropper, Chief Financial Officer, joins the company following decades of experience directing financial operations and business strategies for established companies and start-up ventures. At ProdataKey, he will spearhead the company’s financial, operations, and supply-chain management. Investing in people and technology We are excited to welcome Brian to the ProdataKey team and to announce the promotions" “We are excited to welcome Brian to the ProdataKey team and to announce the promotions of Dallan, Brach, and Evan,” said ProdataKey CEO and President, Evan Tree. He adds, “These appointments reflect our commitment to investing in our people and technology." Vision, insights, and leadership Evan Tree continues, "In joining Brad Baldwin, our Vice President of Product, and me, we are equipped with an incredibly talented executive prepared to keep PDK an industry pioneer, providing the market with relevant and innovative solutions for the foreseeable future." He said, "This team’s collective vision, insights, and proven leadership ensure that ProdataKey and those who rely on us for their security, safety, and livelihood are in the best of hands.”
Gallagher Security is proud to announce the latest release of its award-winning security site management software, Command Centre v9. Command Centre is designed to integrate seamlessly with a wide variety of systems and hardware, creating a single operating platform that manages total site security. Your security, your way Meredith Palmer, Chief Product Officer at Gallagher Security explains, “Gallagher’s customer-centric mindset and commitment to research and development means we best understand our customers’ needs before implementing the tools, rather than being reactionary." "The release of v9 highlights Gallagher’s commitment to providing a solution that enables your security, your way.” New features and enhancements The latest release includes enhanced integrations with wireless access control solutions With new features and enhancements, Command Centre v9 will enable users to manage their business with greater efficiency and flexibility. The latest release includes enhanced integrations with wireless access control solutions; Aperio, SALTO, and IDEMIA Biometric access control devices and KONE elevator systems, plus improvements to the Bulk Configuration Tool. Aperio BLE enhancement The Aperio BLE enhancement enables Mobile Connect to be used at both wired Gallagher readers and compatible wireless Aperio readers, providing added convenience to customers as only one credential is required across their site. “This Command Centre release illustrates Gallagher’s continued commitment to integration opportunities that can save our customers time, ensure data integrity, and enhance the user experience,” adds Meredith. Open Supervised Device Protocol (OSDP) Command Centre v9 enables Open Supervised Device Protocol (OSDP) for all supported IDEMIA biometric readers, enhancing user experience with rich feedback on the text displays. Best practice cybersecurity is enforced with all supported IDEMIA readers having OSDP secure channel enabled by default. Command Centre is Gallagher’s world-class site management software and was the first system to offer alarm, access, and perimeter security in one product. It is one of the most feature-rich site management platforms available.
Expert commentary
Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally, that experience fits well with your business. Any enterprise experience is a plus, but local, state, and federal regulations create precise yet very different rules for securing a utility instead of a hospital. That's also true for university campuses, manufacturing facilities, and many other operations. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing Look for certifications indicative of an integrator's commitment to staying on top of industry changes. Organisations such as ASIS International and the Security Industry Association offer certifications showing an integrator's team members have mastered security principles and skills. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing. Also, ensure an integrator sells and services equipment that integrates with your current security systems. Using multiple systems for the same function is less efficient. Project update meetings Go beyond an integrator's slick brochures and websites to ask tough questions about previous experience. How would the integrator handle a hypothetical situation in one of your facilities? Ask the integrator if there will be one project manager for all jobs. And ensure that person handles all interactions with security subcontractors. Ask if the integrator provides regularly scheduled project update meetings. It's frustrating to wonder how your project is progressing. Ask if the integrator's team can work during the hours and days that result in the least interference to your daily operations. Ask for onsite system training to save time and eliminate travel costs. Gathering sensitive data Look for an integrator with proven experience working with an enterprise IT department A malfunctioning component may be more than an inconvenience – it may be a severe security threat. You need to know how quickly your integrator can respond when things go wrong. Ask about available service plans. And consider the embedded staff approach in which the integrator places employees on your site full time to handle day-to-day and emergency activities. Much of the security equipment – video, access control, intercoms, visitor management, and more – is wireless and dependent upon networks operated by your IT department. Network-based devices provide more opportunities for hackers to gather sensitive data or cause critical equipment to malfunction. Don't trust your security operations with an Integrator unfamiliar with at least basic cybersecurity principles. Look for an integrator with proven experience working with an enterprise IT department. At a minimum, ensure the integrator can set and change security device IP addresses and port locations. Certifications from providers such as Cisco, Microsoft, and IBM indicate an understanding of various IT technologies. Potential security partners Knowledgeable integrators work with the well-encrypted Open Supervised Data Protocol (OSDP), now an internationally recognised standard. Run from any integrator who suggests operating an access control system with used Wiegand technology offering no encryption between cards and readers. It's easy for hackers to capture data and clone a working credential. Technology moves at a rapid pace. Your modern system of a few years ago may be long-of-tooth. You need an integrator capable of bringing new and innovative ideas to the table. You want an integrator who conducts in-house testing of new products, not relying solely on a manufacturer's claims. You want an integrator capable of thinking outside the box to solve a complex security problem. These ideas are just a start in assessing an integrator's value to your enterprise operation. However, they will help you sort through potential security partners to find one that best meets your needs.
Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organisations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing. Most organisations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue with legacy systems of any type is that risks, just like technology, evolve. What was secure, convenient, and efficient a few years ago is often found wanting as the threat landscape changes. The standards governing the development and testing of physical access control systems (PACS) have also evolved to improve security and product interoperability. An example is the Open Supervised Device Protocol (OSDP), introduced 10 years ago as an alternative to the antiquated and vulnerable Clock-and-Data and Wiegand protocols. However, when it comes to planning infrastructure upgrades or implementing new tools, businesses must carry out due diligence to ensure the solutions are future-proof and deliver the expected level of security. Vulnerabilities and challenges In the early 1980s, Clock-and-Data and Wiegand protocols were widely adopted as the de-facto standard for interoperability between access control readers and physical access controllers. Those de-facto standards were later formalised and adopted into industry standards by the Security Industry Association in the 1990s. Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities There were weaknesses, though, Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities from the reader to the controller. Not only that, but Wiegand delivers limited range options and is operationally inefficient. It is also easy to target via its learnable language and a host of hacking devices available via online sources. Furthermore, the retrofitting installation alongside a legacy system is complicated for integrators and expensive for organisations, as most readers require dedicated home-run wiring. Extensive wiring on a large-scale project, such as a school or corporate campus, results in considerable — often prohibitive — costs for the installation of a PACS. Legacy access control protocol Despite the well-publicised vulnerabilities and weaknesses, Wiegand is still one of the most common protocols in legacy access control, with estimates indicating it is used in more than 90 percent of installed systems. This not only presents issues about physical security but also raises concerns relating to the protection of personal data. Access control systems not only contain information about who can and cannot use certain doors. OSDP is a communication standard Modern systems include a wide range of personal data, ranging from qualifications and certifications of individuals, home contact details, and even medical conditions or HR and employment information. With the potential fines associated with GDPR breaches, companies need to take this concern seriously. These weaknesses pushed the security industry to adopt a new protocol: Open Supervised Device Protocol (OSDP). This access control communications standard was developed by Mercury Security (now part of HID Global) and HID Global in 2008, and donated, free of intellectual property, to the Security Industry Association (SIA) to improve interoperability among access control and security products. Since then, it has been adopted as a standard by SIA, becoming the first secure, bidirectional reader/controller protocol to be governed by a major standards body in the security industry. In 2020 OSDP reached an additional milestone in becoming an International Electrotechnical Commission (IEC) standard. Why implement OSDP as a standard? OSDP is the only protocol that is secure and open for communication between readers and controllers The growth of networked devices, such as video and access control products, has led to an increased demand for converged solutions. Businesses and organisations recognise the value of implementing an integrated solution to enhance security and add value to technology investment. OSDP is the only protocol that is secure and open for communication between readers and controllers and is also being widely adopted by industry-leading reader and controller manufacturers. It is an evolving, ‘living standard,’ making it a safer, more robust, future-proof option for governing physical access control systems. OSDP offers important benefits: 1) Increased security Implementing OSDP standards can increase security, as OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. Additionally, OSDP constantly monitors wiring to protect against tampering, removing the guesswork since the encryption and authentication are predefined. 2) Bidirectional communication Early on, communication protocols such as Wiegand were unidirectional, with external card readers sending information one way to a centralized access control platform. OSDP has transformed the ability for information to be collected, shared, and acted upon with the addition of bidirectional communication for configuration, status monitoring, tampering, and malfunction detection, and other valuable functions. In fact, OSDP is the only open, non-proprietary, bidirectional, secure protocol for communication between card reader and physical access controller. 3) Open and interoperable OSDP adds new technology that enhances its ability to protect incoming and outgoing data collection OSDP supports IP communications and point-to-point serial interfaces, enabling customers to flexibly enhance system functionality as needs change and new threats emerge. They also can proactively add new technology that enhances their ability to protect incoming and outgoing data collection through a physical access control system. 4) Reduced installation costs OSDP’s use of two wires (as compared to a potential of 11 wires with Wiegand) allows for multi-drop installation, supervised connections to indicate reader malfunctions, and scalability to connect more field devices. Daisy-chaining accommodates many readers connected to a single controller, eliminating the need to run home-run wiring for each reader, and the use of a four-conductor cable achieves up to 10x longer distances between reader and controller than Wiegand while also powering the reader and sending/receiving data. 5) User friendly OSDP gives credential holders greater ease of use, with audio and visual feedback such as coloured lights, audible beeps, and the ability to display alerts on the reader. For security administrators, managing and servicing OSDP-enabled readers also becomes increasingly convenient, as OSDP-enabled readers can be remotely configured from network-connected locations. Users can poll and query readers from a central location, eliminating the cost and time to physically visit and diagnose malfunctioning devices. Unlimited application enhancements OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers OSDP supports advanced smartcard technology applications, including PKI/FICAM and biometrics, and other enhanced authentication protocols used in applications that require Federal Information Processing Standards (FIPS) compliance and interactive terminal capabilities. Audio-visual user feedback mechanisms provide a rich, user-centric access control environment. OSDP offers advantages for users, administrators, and integrators, alike. It adds security and real-world efficiencies, and its interoperability ensures that organisations can use systems from numerous manufacturers as they invest in infrastructure that maximises the protection of critical data. For our part, HID Global’s range of HID Signo readers is OSDP verified, ensuring they offer the intended interoperability and security for secure bidirectional communication and provide an easy migration from Wiegand devices. In a campus environment, OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers if a new access control solution is implemented. There are also service and maintenance benefits as OSDP encourages continuous monitoring of system uptime and allows for remote configuration of -- or upgrades to -- a reader. Cost savings upon system upgrade Integrators can also capitalise on the introduction of OSDP by encouraging open standards, which can, in turn, help them build new customer relationships and win more projects. Although upgrading to access control systems that adhere to OSDP standards is a significant initiative, the range of benefits outweighs the cost of upgrading. Increased security coupled with business efficiencies adds value for those administering the system and a high level of interoperability ensures users can deploy systems from numerous third-party manufacturers. Integrators who understand the benefits of OSDP can also help their customers support both current and future technology requirements. When a site’s needs change, OSDP offers significant cost savings as the open functionality makes adding new devices easier and reduces the expense of requiring all readers to be replaced if a new solution is installed. Businesses and organisations transitioning to OSDP will also enhance value in terms of operational costs such as servicing and maintenance.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
Security beat
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
John Wiegand died in 1986, but the communications protocol that bears his name is still alive and well, connecting access control readers to controllers using two wires – one to transmit “zeros” and the other to transmit “ones.” The Wiegand protocol persists despite its limitations, including one-way communication, lack of encryption, and inability to manage the readers in a system centrally. In a Wiegand system, a controller provides no acknowledgement that data has been received. Systems that still use the Wiegand protocol are performing below accepted industry standards and are vulnerable to over-the-counter exploits. A session at ISC West’s Virtual Event highlighted a replacement technology that solves those problems and expands the security, flexibility and functionality of systems. The technology is called OSDP (Open Supervised Device Protocol), which is now a standard managed by the Security Industry Association (SIA) and designated as an international standard by the International Electrotechnical Commission (IEC 60839-11-5). Aligning three components OSDP requires alignment of three critical components – the access control system, readers and controllers. The access control system, readers and controllers OSDP is an RS-485 protocol used to pass card format data from the reader to the controller. Like the Wiegand protocol, it uses two wires, but in this case one wire transmits data and the other receives data. Installation is simplified because no system needs more than four wires – two for OSDP communication and two more for power. In contrast, using Wiegand, additional wires are needed to add other capabilities – up to 8 or more wires in all. OSDP cable runs can extend up to 4,000 ft (compared to 500 feet for Wiegand). Resolving problems Therefore, unlike Wiegand, OSDP sends information in both directions and provides “supervision” of the readers. If there is a problem with a reader, such as a reader communication error or disconnect, that notification is sent back to the access control management system. OSDP also supports encryption for greater security, in effect enabling end-to-end encryption for a host system, controller, I/O modules, readers and credentials. That notification is sent back to the access control management system OSDP also provides additional capabilities, such as control of a reader’s LED and buzzer as well as sending text notifications and messages to compatible displays. Integrators and/or end users can also push configuration and firmware updates to readers all at once. Because OSDP is “open,” there are more third-party integrations and standardizations. OSDP is particularly valuable for U.S. government applications because it meets federal access control requirements such as PKI for FICAM. Wiring requirements Best practice dictates rewiring a project using RS-485 cabling. Specific wiring requirements are needed for OSDP, including 24 gauge (AWG) stranded cables that are a shielded twisted pair with 120 Ohm impedance and overall lower capacitance. However, especially for shorter cable runs, existing wire from Wiegand installations can sometimes suffice, say if it is a cable run of less than 100 ft. Installers should prove their competency before being deployed to an outside installation “Installation of OSDP is not hard, just different than field technicians are used to deploying,” said Tony Diodato of Cypress Integration Solutions, one of the ISC West presenters. Therefore, training of technicians is paramount, and installers should prove their competency before being deployed to an outside installation in order to avoid problems. Integrators or installing teams should have a “lab” setup to thoroughly familiarise themselves with installation to ensure successful deployments. Various in-line devices are available to help transition existing Wiegand applications to OSDP, even if one component or other does not support OSDP. For example, data converters enable installation of an OSDP reader with a legacy Wiegand control panel. Replacing existing devices in legacy Wiegand systems with OSDP devices and using data converters can provide some benefits of OSDP without requiring a full “rip-and-replace” installation.
Case studies
ASSA ABLOY, the pioneer in access solutions, has received approval to utilise its integrated locking solutions on U.S. federal government access control Federal Identify, Credential, and Access Management (FICAM) applications. This significant milestone was reached after a lengthy and detailed government and third-party security vulnerability and interoperability testing process. Products The following products are on the General Services Administration’s (GSA) FIPS 201 Evaluation Program Approved Product List (APL): Corbin Russwin SN Series Integrated Lock Corbin Russwin SN Series Integrated Lock With Keypad SARGENT SN Series Integrated Lock SARGENT SN Series Integrated Lock With Keypad HES KS210 Series Integrated Server Cabinet Lock Integrated access control locks Locks feature OSDP technology that allows for secure channel and serial communication between reader and PACS These integrated access control locks feature Open Supervised Device Protocol (OSDP) technology that allows for secure channel and serial communication between the reader and the Physical Access Control System (PACS). These products were tested and approved by the U.S federal government in conjunction with the LenelS2 OnGuard® access control system, including the LNL-X4420 intelligent controller with the embedded HID® pivCLASS® Authentication Module. FICAM-approved solutions “We’re excited to expand our suite of FICAM-approved solutions for OnGuard access control system customers,” says Derek Greenland, Director, Federal Government Solutions, LenelS2. “The ASSA ABLOY integrated locks for doors and server cabinets provide high-quality choices for government facilities implementing FICAM controls to protect critical assets.” Physical access control system “We are excited to be able to offer government facilities more options to expand their PACS [physical access control system],” says Jeff Huggins, Vice President of Government Programs, ASSA ABLOY Opening Solutions. “Having these specific integrated OSDP access control locks approved for applications mandated by the Homeland Security Presidential Directive 12 (HSPD-12), along with our varying wireless, WiFi, and PoE locking options, make it easier and more affordable to support the use and implementation of card reader technology deeper into each facility, even server cabinet doors."
Australian company High Frequency designed a “self-service” linen portal for a commercial laundry servicing the thriving short-stay accommodation market. Called the “Mobile Linen Hub”, this modified shipping container provides access to linen for users 24/7. After taking the linen they need, the cost is then added to their account as they exit the hub. Access control with Wiegand 125 kHz reader High Frequency’s initial prototype used a standard Wiegand 125 kHz reader to control access. Each customer’s card, upon scanning, granted entry to the Mobile Linen Hub while activating UHF readers inside. However, the prototype encountered several problems with its 125 kHz Wiegand readers. The readers’ lack of security allowed cards to be copied, and their lack of data storage prevented them from displaying why a card had been declined, for example. Reasons for denied entry Ultimately, the inflexibility of a 125 kHz reader led to confusion and a lot of support calls Customers only heard a ‘denial’ buzz and saw a red light. Meanwhile, there were multiple reasons a customer could be denied entry. Their card could be invalid, their account could be suspended from non-payment, or simply, someone else could be using the Mobile Linen Hub. Ultimately, the inflexibility of a 125 kHz reader led to confusion and a lot of support calls. MIFARE DESFire reader High Frequency solved the problem by switching to Idesco’s 8 CD 2.0 D Pin RFID display readers. “A highly secure MIFARE DESFire reader, 8 CD 2.0 D Pin instantly solved our card cloning issue, with zero impact on our solution since Idesco handles both our card encoding and reader programming," notes Isaac Hayes, High Frequency. “Our new system deployed a single Idesco reader on both sides of our Mobile Linen Hub, connected to an RS485/Ethernet converter, with our bespoke software communicating with them across OSDP," Isaac continues. Display reader solution High Frequency discovered that the OSDP standard made displaying private messages in an RFID reader possible This new display reader solution has greatly decreased support call frequency while increasing the product’s usability. Confusion surrounding denied access was also solved, with the reader displaying messages on its screen for users, such as “Access Granted”, “Access Denied, Account on Hold” and “Portal Busy, please wait before entering”. While looking for a new solution for their system, High Frequency discovered that the OSDP standard made displaying private messages in an RFID reader possible. “During my research, it became apparent that Idesco was the only reputable company with a colour display, OSDP-compatible reader”, Isaac Hayes recalls. Mobile access solutions enhancing security “Idesco 8 CD 2.0 D Pin reader is now an integral part of Mobile Linen Hub’s design, and will be included in all manufactured models for the foreseeable future," he reports. Idesco Oy is a pioneer of RFID technology, with more than 30 years of experience. Idesco RFID readers and transponders, mobile access solutions, controllers, and touch screen devices. Its products collect data and enhance security in several access control, vehicle identification, and logistics settings around the world. High Frequency specialises in helping commercial laundries around the world implement RFID in a way that provides value to their business.
Compania Naţională de Căi Ferate ‘CFR’ - SA, the state railway carrier of Romania, has invested in an integrated security and safety solution from Johnson Controls, to protect passengers travelling on a new railway link, connecting the Otopeni Henri Coandă International Airport to Bucharest Nord main railway station, in Bucharest, Romania. Securing Bucharest’s new rail link The 2.95 km rail link, which was planned to facilitate the large number of fans travelling from the international airport to attend the Bucharest-hosted EURO 2020 football matches and was completed in just 14 months, from the design stage, at a cost of approximately 120 million Euros, is now being increasingly used by business travellers and tourists, who wish to visit the city of Bucharest. The contract to design and execute the entire project was won, as part of a competitiveness tender process, by the Arcada – ISPCF – DB Engineering consortium. Alfred Net, a systems integrator that specialises in designing and implementing turnkey security, telecommunications and network solutions, was subsequently tasked to provide the new railway terminal’s safety and security systems, as well as the passenger communications and information systems. Need for a sophisticated security solution We were very pleased to have the opportunity to use our experience of providing sophisticated solutions" “We were very pleased to have the opportunity to use our experience of providing sophisticated solutions for complex and mission critical applications, in order to contribute to the success of this important project,” said Alex Vladutoiu, the Managing Director & Solutions Architect at Alfred Net. Alex Vladutoiu said, “With the new link terminating within the airport, we immediately realised that any security and safety solution that we recommended to the consortium would need to meet the demanding requirements of airport security, as well as railway- related EU regulations and directives.” Deep integration of security components He adds, “This meant that as well as being robust, ultra-reliable and cyber secure, the various component parts of the solution would need to be deeply integrated with each other, so as to provide control room operators with a high level of situational awareness, which would enable them to react quickly and effectively to any incidents.” Alex Vladutoiu further said, “With this in mind, our previous experience led us to recommend that all the security and safety products should be single sourced from the Johnson Controls’ access control, fire, intrusion and video surveillance brands, which come under its Tyco umbrella. Simply put, we knew these various brands could collectively provide us with everything needed to put together an effective solution for this project.” He adds, “Importantly, we were confident that the various products, which to a large extent are ‘plug & play’, could be easily integrated without the time-consuming process of developing new drivers and interfaces.” Tyco victor security management platform The Alfred Net design team specified the Tyco victor security management platform The Alfred Net design team specified the Tyco victor security management platform, to be at the heart of the safety and security solution. In addition to helping control room operators manage and monitor the images, captured by Tyco Illustra high-definition IP network cameras, victor’s graphical user interface (GUI) alerts operators in real time, as to any fire or intrusion events, as well as any access control activity. The design of the security and safety solution was based on a rigorous Risk Assessment Report, which took into account the worst case scenarios, in terms of the threat to the safety of passengers, disruption and the protection of assets. Unified security solution “By providing a unified solution, which can manage the combined data captured by the intrusion detection, access control, fire detection and video surveillance systems, victor offers authorised users with all the information they need, to monitor and strictly control the movement of passengers.” The products include: Video Surveillance & AI Analytics: In addition to the Tyco Illustra cameras and VideoEdge video recorders, which have been deployed to monitor the railway terminal proximity, mission critical machinery, platforms and areas open to the public, control room operators are also able to take advantage of video analytics, in order to help them quickly detect any suspicious activity or danger. Tripwire detection, for example, can generate an alert, if a passenger oversteps a platform’s safety line, while people counting analytics can alert security personnel to overcrowding. It can also be used by operations personnel to help them make best use of human resources, by having a greater understanding of which parts of the station are busy, at different times of the day. Access Control: A CEM Systems AC2000 access control software platform, together with eDCM350 OSDP protocol IP door controllers, are supporting smart card readers and encrypted cards, to limit access to sensitive areas throughout the railway station, such as communications, signalling, staff and locker rooms. As a highly scalable solution, AC2000 enabled Alfred Net to implement access control throughout expansive areas of the railway. By utilising RS485 serial communications with strong AES 128 encryption between the eDCM 350 intelligent door controllers, the OSDP readers and the smart cards, the railways is protected against the threat of controller signal cloning, as well as the threat of personnel card cloning. Fire Detection: Zettler Profile Flexible addressable panels, flame detectors and smoke sensors have been installed throughout the station terminal, to ensure mandatory compliance with EU fire regulations. Integration with the station’s PAVA system means that pre-recorded announcements are automatically broadcast, when a fire-related event occurs. Intrusion Detection: A DSC PowerSeries Neo intrusion system is providing protection for areas, which may be left unattended, such as cash handling areas, with integrated panic buttons to ensure there is a rapid reaction to any intrusion alarm. Johnson Controls and Alfred Net partnership Alfred Net worked closely with the Johnson Controls’ pre-sales team, in order to ensure the best products were specified for each location and application, and the comprehensive security and safety solution was installed, alongside the station’s iPIS communications and information software. Alex Vladutoiu said, “This was without doubt the most complex project that the client has been involved with and reflects its determination to invest in the latest technology, to ensure maximum operational efficiency and to protect its passengers and assets.” Video analytics and flame detection This has resulted in diverse solutions, such as video analytics and flame detection" He adds, “This has resulted in diverse solutions, such as video analytics and flame detection, based on video technology interacting with laser detection, RGB LED displays, digital signage, Text-to-Speech and many other state-of-the-art technologies, to deliver a highly effective total solution.” Since December 2020, when the new rail link became operational, the highly complex and integrated security and safety solution from Johnson Controls has been playing a key role, in ensuring the smooth operation of the train station and the running of 72 trains per day, (36 pairs), which arrive and depart every 20 minutes, both from and to the airport. Tyco suite of security products Alex Vladutoiu, Managing Director and Solutions Architect at Alfred Net, concludes “As a solution architect, Tyco is indeed my preferred security provider for integrated projects. As a unified solution, the Tyco suite of products are almost ‘plug and play’ and give you everything you need to build-up an integrated system, without spending additional time or money on developing other interfaces. He concludes, “We were delighted to have designed and implemented the new Otopeni Airport Railway Terminal project in less than one year and we look forward to our continued partnership with Tyco.”
The National Bank of Kuwait (NBK) is known as ‘The Bank You Know and Trust’. Kuwait’s largest financial institution, it has 68 branches in its homeland and more than 143 worldwide. When NBK moved its operations to newly built headquarters, it chose AEOS access control by Nedap to protect them. NBK also wanted to centralise its access control. Having already used AEOS in some locations for over a decade, it knew that this flexible, scalable system could help to achieve that. AEOS is implemented not only at NBK’s iconic headquarters, a building it owns and manages, but at its bank branches and data centres across Kuwait too. Adaptable, centralised control NBK was looking to update its security policies and take a centralised approach to monitor and controlling access. With facilities spread across Kuwait, it wanted to unify access control for employees across all its locations. NBK wanted its new security system to have the integration capabilities to fit into its IT ecosystem, it needed to be based on an open platform. Flexibility was also very important for NBK. It wanted to be able to address the changing needs of its security policies based on risk assessments, compliance regulations, and other potential future changes. Unified, central access AEOS made it possible for NBK to monitor and control access centrally and to manage daily operations After in-depth discussions, NBK was confident that Nedap could help it achieve its security goals. AEOS would provide all the features it needs such as map alarm handler, zoning, customised reporting, and lift integration. NBK’s future-proof AEOS system has been implemented and is helping the bank to manage daily operations. With just one server and database for all its locations spread across the country, NBK can monitor and control access centrally. OSDP integration One of the most important features NBK was looking for was OSDP integration with HID card readers. This project has set a benchmark in Kuwait because of its ability to connect with HID readers via the OSDP communication protocol due to AEOS blue controllers. Easier management AEOS’s visitor management module has also made it easy for NBK to capture visitor data by integrating with passport and national ID readers. And its security level functionality ensures visitor access is restricted to designated zones. A presence list feature helps to track and trace the location of employees or visitors inside the building. And it also generates alarms for the IT and security teams if someone tries are to access a zone they’re not authorised for. Extending use with integrations NBK’s AEOS system not only offers many valuable features and complies with all banking IT standards; it enables straightforward integration with technologies provided by other suppliers too. Destination control for passenger lifts has, for example, been integrated with AEOS. And a time attendance system has been integrated to record employees’ working hours and produce customised reports. Key benefits Flexibility and scalability to meet future needs Centralised monitoring and control saves time and increases security High levels of functionality add value and allow tailoring to specific requirements AEOS’s open platform enables integrations to extend the system’s capabilities “As we were making an investment that would be used across many sites, we wanted to be sure we selected absolutely the right system. Nedap proved that AEOS would provide not only the unification and specific features that we need, but the flexibility to make future adaptations and integrations too. Also, AEOS is cleverly designed around the people using it, so it brings value in terms of time saved and increased convenience, as well as improved security,” says Mr. Ezzat Hallal, General Manager - Engineering Services Expert technical support To ensure the system’s smooth running, Nedap has ensured the NBK security team has all the technical support they need. Not just during the implementation and post-implementation phases but for ongoing maintenance too.
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organisations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilise the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimise air quality, efficiency of our HVAC units, and behaviours in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
OPTEX Teams up with Mobile Pro Systems to create a Rapid Security Deployment Solution for a high-end condominium builder in Extreme Weather Conditions. The solution was required for a large construction site for Cove Properties, one of Alberta, Canada’s premier luxury condo builders. Weather conditions With many developers and construction companies building throughout the year, they're forced to battle a myriad of different weather conditions including rain, sleet, snow and extreme cold. On top of this, they still face the inevitable problem of theft and vandalism. Theft of tools, machinery, new materials and scrap material cost contractors millions of dollars per year and leaves the construction companies and their sub-contractors with the effect of having to deal with their losses. The general contractors and developers feel the chain reaction as well, as they have to deal with higher insurance premiums and weeks and months of project delays. To avoid the major effects of construction site theft, Cove Properties turned to 2020 Digital Security Solutions of Alberta, Canada for help. Cove’s requirements included a mobile solution capable of wireless communication that could be moved from site to site with surveillance, motion detection, lighting and remote monitoring capabilities. In addition, it had to survive the harsh outdoor elements of Northern Canada. Powering network and surveillance solution 2020 Digital Security Solutions took all of Cove’s requirements into consideration and found the perfect solution in the PowerSentry by Mobile Pro Systems. The PowerSentry is a self-sufficient, temporary, semi-permanent or permanent surveillance solution. Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole Built as a “power platform”, it can power anything from surveillance, security, communications and/or network technologies. And with its universal mounting options, the PowerSentry can be mounted to a pole, a wall or tripod or can be easily hooked over a fence or roof parapet for superior mobility. It accepts 90-277VAC to minimise re-wiring and is equipped with a high quality Lithium-Ion battery pack as a backup power source due to loss of power or power outages. In addition, the PowerSentry has a unique remote system status and control software called Power Broker, which monitors the PowerSentry’s battery voltage, current power usage, displays active map GPS monitoring, intrusion detection reporting, warning and flood lighting control and horn/speaker control. Motion-activated floodlights To help solve the limited daylight obstacle, 2020 DSS had two 8,000 lumen LED flood lights mounted to the chassis of the PowerSentry. The LED floodlights are motion activated and have a pre-determined setting of how long they will stay on. The lights can also be turned on and off manually through the Power Broker software. “Due to the short amount of daylight during the winter months, the flood lights will help light the site in the evening hours and after hours if there is a breach in the perimeter,” said Gene Telfer president of 2020 DSS. The perimeter and the interior of the construction site is protected by an Optex RedScan laser perimeter detection device which was connected to the PowerSentry and mounted 8’ below providing a 200’ horizontal area of detection. “We decided to mount the RedScan below the PowerSentry instead of on it because we will get a wider detection range and a firmer detection trigger,” Telfer said. Optex Redscan laser detectors With abnormal cold temperatures hitting the Northern United States and almost all of Canada, the first test was in late December into early January when normal temperatures fell to -40°F and -60°F with the wind chill. “The systems are working great and we haven’t had a system go down at all,” Telfer said. According to Telfer, Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole that made installation very quick and easy. They are using Milestone video management software that integrates with the cameras and Redscan laser detectors for visual verification and event response in one platform.