OSDP
The Security Industry Association (SIA) has named John Nemerofsky as the 2024 recipient of the George R. Lippert Memorial Award, an honour presented annually to a distinguished individual for long-term, selfless service to the security industry and to SIA. Nemerofsky will be presented with the award on Nov. 20 during the 2024 SIA Honors Night celebration. John Nemerofsky is a beacon of leadership in the security industry. With a remarkable career spanning over 25 years,...
HID, a worldwide pioneer in trusted identity solutions, announces the expansion of its signature line of Signo™ Readers to include models that meet varying customer needs – from harsh conditions and stylistic preferences to streamlined, economical requirements. The latest Signo models Signo Readers available in white – provide a very clean, minimalist, and modern look, offering architects, designers, and anyone looking to blend their access control readers into new environm...
At GSX 2024, the Physical Security Interoperability Alliance (PSIA) will show an expanded roster of devices supporting its Public Key Open Credential (PKOC) specification. PSIA will be showcasing the latest information and demonstrations for PKOC at the JCI Security Products demo room S230 A&B. They will be able to see interoperability following open specifications between mobile and physical credentials from multiple manufacturers with multiple manufacturer readers leveraging Bl...
Verkada, a pioneer in cloud-managed enterprise building security and management, announced a new way for organisations to transition to the cloud with its Command Connector, which enables third-party cameras to connect to Verkada’s Command platform. It also announced a range of new additions to its platform, including a next-generation door reader. "As we continue to expand our footprint we want to provide customers with a seamless transition to our cloud platform,” said Brando...
HID, a worldwide pioneer in trusted identity solutions, announces that its Signo™ Readers seamlessly integrate with the UK government’s GovPass standard, built on open standards for enhanced security and flexibility. GovPass GovPass, the most secure government pass to date according to the UK government’s website, leverages open standards to ensure interoperability across different suppliers. Leveraging the UK government’s standard for card encryption and HID’s p...
HID, a worldwide pioneer in trusted identity solutions, announces the availability of the new HID® Signo™ Mechanical Keypad Reader 40T, engineered to offer high performance in harsh and challenging environments where the weather is wet or cold and visibility is low. The new reader has a robust IP-65 rated construction meaning the electrical components are dustproof and watertight along with a traditional mechanical push button keypad to make it easy to use when wearing gloves or...
News
HID, a worldwide pioneer in trusted identity solutions, announces the availability of the new HID® Signo™ Mechanical Keypad Reader 40T, engineered to offer high performance in harsh and challenging environments where the weather is wet or cold and visibility is low. The new reader has a robust IP-65 rated construction – meaning the electrical components are dustproof and watertight – along with a traditional mechanical push button keypad to make it easy to use when wearing gloves or where some users of a building are visually impaired due to low light conditions. Range of Signo readers “As a high-performance reader with reliable features for harsh environments, it’s a great offering for customers who have a preference or specification for a traditional mechanical device,” says Spencer Marshall, HID’s Head of Europe. “It also comes with all the security and mobile-ready features you’d expect from our signature range of Signo readers, providing customers with the utmost flexibility. Whether using the keypad, smartphones, fobs, or cards, users can gain fast and easy entry into buildings.” Key features of Signo 40T Reader The new Signo 40T Reader comes with the following key features: Digital wallet ready — Support for a wide range of credential technologies, including HID Mobile Access® via native Bluetooth® and near field communication (NFC) capability, the new reader supports credentials in Apple Wallet and Google Wallet. This means users get touchless entry without having the added step of opening additional apps. Enhanced security — Highly secure storage of cryptographic keys on certified secure element hardware, plus a new surface detection feature that enables the reader to automatically recalibrate and optimise read range performance, the new Signo 40T Reader is ideal for door applications requiring a wall switch mount. Easy connectivity — Out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bidirectional communication, the new Signo 40T Reader is designed to easily integrate and fit without requiring considerable time or unnecessary extra cost from installation engineers. The reader is designed to enable remote management, too. The new HID Signo Mechanical Keypad Reader 40T is available in Nordic countries including Denmark, Finland, Iceland, Norway and Sweden.
Nedap is proud to introduce uPASS Go: the next-generation reader in long-range vehicle access control. As the latest addition to Nedap’s esteemed uPASS product line, uPASS Go establishes a new standard in managing vehicle entry for basic gates, like car parks, gated communities, and staff parking zones. Designed to blend significant commercial appeal with the latest technological advancements, uPASS Go transforms the landscape of vehicle access control to be smarter, more secure, and exceptionally efficient. Cost-effective solution for vehicle access points Nedap's uPASS Go is the successor of the uPASS Reach, widely recognised as the most cost-effective solution for vehicle access points. uPASS Go leverages cutting-edge UHF RFID technology to provide reliable vehicle identification from up to 10 metres (33 feet). uPASS Go leverages cutting-edge UHF RFID technology to provide reliable vehicle identification This product is perfectly suited for managing access in environments such as car parks, gated communities, and staff parking zones. It seamlessly integrates with existing access control systems, supporting key industry-standard interfaces like Wiegand, OSDP, and TCP-IP protocols. Features like a new mounting bracket and service hatch simplify the installation process, enhancing operational convenience. Demands of modern security "With uPASS Go, we're setting a new benchmark in the field of vehicle access control. Its user-centric design simplifies the installation process, makes it easy to implement and convenient to use." "It meets the stringent demands of modern security professionals and offers a forward-thinking solution to access challenges," Edwin Grobbink, Product Manager at Nedap. Smooth traffic flow at vehicle access points The uPASS Go benefits from the longstanding expertise in passive UHF solutions As part of Nedap's extensive uPASS product range, the uPASS Go benefits from the longstanding expertise in passive UHF solutions. uPASS Go ensures quick and secure identification of vehicles, which helps maintain smooth traffic flow and creates a welcoming entry experience. The reader is designed to be adaptable, providing robust security across vehicle access points like car parks, gated communities, and staff parking zones. Proven expertise and value Drawing on more than 30 years of experience in automatic vehicle identification, Nedap has designed the uPASS Go to be both cost-effective and technologically advanced. This combination makes it an ideal choice for access control points where affordability and high functionality are required. Nedap's commitment to sustainability and user-friendliness makes the uPASS Go a continuation of the legacy of innovation in access control technology. Explore the full potential of uPASS Go Discover how uPASS Go can streamline vehicle access control by visiting the product page.
Belden Inc., a pioneering global supplier of network infrastructure and digitisation solutions, announces new products designed for secure, high-quality performance in critical applications. Data orchestration & management Hirschmann IT Dragonfly DAP847 Railway Wi-Fi 6 Radios provide connectivity for train-to-ground communications, enabling reliable roaming and high data throughput for European rail applications. Hirschmann IT MAMMUTHUS Enterprise Managed Switches deliver top-notch IT performance and functionality at a competitive price point, allowing users to facilitate seamless IT/OT convergence using Hirschmann equipment. ProSoft Technology Modbus Routers enable EtherNet/IP™, Modbus TCP/IP and Modbus RTU connectivity for field devices. Users can send device data to a processor or SCADA system to monitor industrial processes. Data acquisition & transmission New Belden OSDP Cables meet enhanced European safety standards to guard against reaction to fire. The cables offer enhanced functionality and security features and are a cost-effective solution for environments with low electromagnetic noise. Belden 5320UV and 5220UV Cables are the newest additions to the company’s portfolio of addressable fire alarm cables. The high-quality signalling line circuit (SLC) loop cables are a low-cost yet reliable option for critical applications. Lumberg Automation M12 Rail Crimp Connectors allow installers to cut custom cable lengths onsite to align with specific requirements for train builds or retrofits. Designed to withstand harsh rolling stock environments, they perform despite vibration, salt spray, welding sparks, chemical exposure or external force.
Videx Security, a provider of access control and door entry solutions, has announced the launch of its XPROX-MO, a cutting-edge panel mount Mifare proximity reader. Designed for use with the Videx WS4 web server access control system and compatible with third-party access control systems supporting the Open Supervised Device Protocol (OSDP), the XPROX-MO offers unparalleled flexibility and security for modern access control needs. Versatile compatibility and installation The XPROX-MO reader supports a wide range of Mifare cards and tags, including Classic, Plus, Desfire, and Ultralight. It is also compatible with high-security applications utilising Desfire cards where data encryption is achieved using 128-bit AES on both the reader and cards/tags. The reader’s design aligns with the UK industry standard, fitting a 40mm x 40mm cutout, making it ideal for both new installations and retrofits. Robust security features Featuring IP65 ingress protection, the XPROX-MO is built to withstand harsh environments, ensuring reliable operation in various conditions. The reader includes three status indication LEDs (green for access granted, red for access denied, and amber for standby) and an internal buzzer for clear audible feedback, enhancing user experience and security. Advanced configuration and connectivity XPROX-MO is equipped with a built-in micro-USB connection for easy configuration and firmware updates The XPROX-MO is equipped with a built-in micro-USB connection for easy configuration and firmware updates. Its RS485 connectivity ensures seamless integration with both Videx WS4 and third-party access control systems. The reader also supports multiple proximity card formats, including HID iClass CSN and NTAG, providing extensive compatibility for diverse applications. Flexible and secure access control solution Rob Sands, Videx’s Technical Director, said, “Our goal with the XPROX-MO is to provide a flexible and secure access control solution that meets the evolving needs of our customers." "The combination of advanced features, robust security, and ease of integration makes this reader an excellent choice for a wide range of entry applications.” Key features Ingress protection: IP65 rated for dust and water resistance. Multi-purpose support: Compatible with various Mifare card formats and high-security Desfire applications. Easy integration: Fits a standard 40mm x 40mm cutout, suitable for new and retrofit installations. Status indications: LED lights and buzzer for clear access status. Advanced configuration: Micro-USB input for easy setup and updates. Robust performance: Operates effectively in temperatures ranging from -15°C to +50°C.
SARGENT, an ASSA ABLOY Group brand, is showcasing its expansive portfolio of door controls, electronic access control, exit devices and locks at ISC West in booth #8061. Showcased products include SARGENT’s PE80 Series exit device, which incorporates an extensive list of next-generation features including new visual status indicators and robust end cap designs. Also highlighted is SARGENT’s extensive offering of Electronic Access Control (EAC) devices for integrated systems or WIFI operation in wired and wireless configurations. Product portfolio “SARGENT door opening solutions provide the features and capabilities required for robust environments to help ensure unparalleled safety, security, versatility and compliance,” said Adam Dowden, Director of Business Development for SARGENT. “The wide breadth of the SARGENT product portfolio provides users and installers with the specific hardware solutions they need for the myriad range of applications across their facility – all engineered with the strength, durability and future-proofed features to stand the test of time.” Features of SARGENT PE80 Series The flush push bar and rail carrier reduce the risk of clothing, bags, or objects being snagged Showcased at ISC West, SARGENT PE80 Series exit devices incorporate next-generation features including visual indicators for trim status, passive dogging, and active dogging. The visual indicators add a new dimension and user experience to the exit device product category by providing instant visual verification of lock status from a distance. Additionally, the PE80 Series features a “minimised catch point” flush push bar and rail carrier to reduce the risk of clothing, bags, emergency equipment or objects being snagged. The sleek design also facilitates easy cleaning and maintenance, helping to ensure reliable performance and long-term durability. SARGENT Electronic Access Control solutions Also featured, SARGENT Electronic Access Control solutions include an extensive selection of wired and wireless door control solutions for use in integrated systems or stand-alone operation. Intelligent WIFI models are available in a variety of heavy-duty and ADA-compliant lock configurations paired with various wireless readers, making it easy and convenient to expand existing access control systems. ISC West 2024 Additional featured products from SARGENT at ISC West include 10X Line Bored Locks engineered to secure and protect high traffic, high abuse spaces that exceed ANSI/BHMA ratings by as much as 20X; SN Series Locks and Pushpad/Keypad solutions with Open Supervised Device Protocol (OSDP) to continuously monitor end-to-end wiring, and PoE compatibility for cost-efficient installation. The Visual Status Indicators for the 8200 Series Mortise Lock feature the largest viewing window in the industry, a 180° visibility profile, reflective indicator materials and an extensive offering of color and text/graphic combinations.
Acre Security, a global pioneer providing state-of-the-art security systems, unveils acre access control in conjunction with the acre Smart Controller and the acre Reader. The combined ecosystem delivers extensive flexibility and offers the fastest and most user-friendly route to cloud adoption. Together, these solutions provide a simple and robust security solution to meet the evolving needs of any organisation. Functionality, flexibility, freedom Built from the outset with cybersecurity in mind, acre access control offers intelligent functionality, flexibility, and the freedom to choose the best deployment option based on the business’ specific requirements. Organisations are no longer constrained to select between on-premises or cloud-based systems as acre access control can be deployed in either a native cloud or local on-premise environment, based upon the same code base and user interface, making the move from on-prem to cloud seamless. User-friendly interface "As the market landscape evolves, our goal is to enable customers to choose the platform that best aligns with their needs, a degree of flexibility they have long desired but have struggled to find," said Don Joos, CE of Acree Security. "Acre access control brings a user-friendly interface, connects with a wide array of networked systems, and supports a myriad of deployment strategies. With acre access control, we pave the way for a smooth transition to stronger, faster, more capable security operations.” Functional Integration Toolkit Scripts (FITS) Contractors are provided immediate access through one-time codes delivered directly to their mobiles Acre access control offers simplicity and efficiency with Functional Integration Toolkit Scripts (FITS), transforming the landscape of workflow efficiency. Visitors and new employees can easily navigate self-enrollment, sending text messages to start the process, while new hires can quickly submit selfies to obtain their mobile credentials. Contractors are provided immediate access through one-time codes delivered directly to their mobile devices. Employees can also reserve workspaces and arrange after-hours access, handling all approvals via TEAMS or text messages. 4-door smart controller Designed to meet dynamic market demands, the 4-door acre smart controller keeps people and property safe with intelligent, affordable, and unparalleled agility. It manages two doors with Wiegand or up to 4 doors with OSDP, supporting up to eight readers for comprehensive entry and exit management. Multi-technology access control readers Acre's solutions offer versatility and modern aesthetics, ensuring customers have the freedom Furthermore, acre introduces a lineup of multi-technology access control readers that enable mobile wallets to be fully compliant with OSDP standards, and support a wide range of technologies, including NFC, Bluetooth, Smart (13.56 MHz), and Proximity (125 kHz.). Acre's solutions offer versatility and modern aesthetics, ensuring customers have the freedom and flexibility to set their migration path to secure credentials and ecosystems. IoT and IT advancements “As the security industry moves away from its reliance on hardware, it aligns more closely with rapid advancements in IoT and IT,” said Darren Learmonth, CT of Acre Security. “This shift signifies a broader trend towards systems that integrate better, work more efficiently, and adapt to the evolving security and enterprise risk landscape.” ISC West 2024 The acre security team invites visitors to experience the future of access control at ISC West 2024. Discover how the organisation revolutionises the industry with innovative, simplified, comprehensive solutions. For an in-person experience, visit us at the Acre Security booth #20059 at ISC West 2024 or schedule a meeting.
Expert commentary
Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally, that experience fits well with your business. Any enterprise experience is a plus, but local, state, and federal regulations create precise yet very different rules for securing a utility instead of a hospital. That's also true for university campuses, manufacturing facilities, and many other operations. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing Look for certifications indicative of an integrator's commitment to staying on top of industry changes. Organisations such as ASIS International and the Security Industry Association offer certifications showing an integrator's team members have mastered security principles and skills. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing. Also, ensure an integrator sells and services equipment that integrates with your current security systems. Using multiple systems for the same function is less efficient. Project update meetings Go beyond an integrator's slick brochures and websites to ask tough questions about previous experience. How would the integrator handle a hypothetical situation in one of your facilities? Ask the integrator if there will be one project manager for all jobs. And ensure that person handles all interactions with security subcontractors. Ask if the integrator provides regularly scheduled project update meetings. It's frustrating to wonder how your project is progressing. Ask if the integrator's team can work during the hours and days that result in the least interference to your daily operations. Ask for onsite system training to save time and eliminate travel costs. Gathering sensitive data Look for an integrator with proven experience working with an enterprise IT department A malfunctioning component may be more than an inconvenience – it may be a severe security threat. You need to know how quickly your integrator can respond when things go wrong. Ask about available service plans. And consider the embedded staff approach in which the integrator places employees on your site full time to handle day-to-day and emergency activities. Much of the security equipment – video, access control, intercoms, visitor management, and more – is wireless and dependent upon networks operated by your IT department. Network-based devices provide more opportunities for hackers to gather sensitive data or cause critical equipment to malfunction. Don't trust your security operations with an Integrator unfamiliar with at least basic cybersecurity principles. Look for an integrator with proven experience working with an enterprise IT department. At a minimum, ensure the integrator can set and change security device IP addresses and port locations. Certifications from providers such as Cisco, Microsoft, and IBM indicate an understanding of various IT technologies. Potential security partners Knowledgeable integrators work with the well-encrypted Open Supervised Data Protocol (OSDP), now an internationally recognised standard. Run from any integrator who suggests operating an access control system with used Wiegand technology offering no encryption between cards and readers. It's easy for hackers to capture data and clone a working credential. Technology moves at a rapid pace. Your modern system of a few years ago may be long-of-tooth. You need an integrator capable of bringing new and innovative ideas to the table. You want an integrator who conducts in-house testing of new products, not relying solely on a manufacturer's claims. You want an integrator capable of thinking outside the box to solve a complex security problem. These ideas are just a start in assessing an integrator's value to your enterprise operation. However, they will help you sort through potential security partners to find one that best meets your needs.
Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organisations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing. Most organisations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue with legacy systems of any type is that risks, just like technology, evolve. What was secure, convenient, and efficient a few years ago is often found wanting as the threat landscape changes. The standards governing the development and testing of physical access control systems (PACS) have also evolved to improve security and product interoperability. An example is the Open Supervised Device Protocol (OSDP), introduced 10 years ago as an alternative to the antiquated and vulnerable Clock-and-Data and Wiegand protocols. However, when it comes to planning infrastructure upgrades or implementing new tools, businesses must carry out due diligence to ensure the solutions are future-proof and deliver the expected level of security. Vulnerabilities and challenges In the early 1980s, Clock-and-Data and Wiegand protocols were widely adopted as the de-facto standard for interoperability between access control readers and physical access controllers. Those de-facto standards were later formalised and adopted into industry standards by the Security Industry Association in the 1990s. Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities There were weaknesses, though, Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities from the reader to the controller. Not only that, but Wiegand delivers limited range options and is operationally inefficient. It is also easy to target via its learnable language and a host of hacking devices available via online sources. Furthermore, the retrofitting installation alongside a legacy system is complicated for integrators and expensive for organisations, as most readers require dedicated home-run wiring. Extensive wiring on a large-scale project, such as a school or corporate campus, results in considerable — often prohibitive — costs for the installation of a PACS. Legacy access control protocol Despite the well-publicised vulnerabilities and weaknesses, Wiegand is still one of the most common protocols in legacy access control, with estimates indicating it is used in more than 90 percent of installed systems. This not only presents issues about physical security but also raises concerns relating to the protection of personal data. Access control systems not only contain information about who can and cannot use certain doors. OSDP is a communication standard Modern systems include a wide range of personal data, ranging from qualifications and certifications of individuals, home contact details, and even medical conditions or HR and employment information. With the potential fines associated with GDPR breaches, companies need to take this concern seriously. These weaknesses pushed the security industry to adopt a new protocol: Open Supervised Device Protocol (OSDP). This access control communications standard was developed by Mercury Security (now part of HID Global) and HID Global in 2008, and donated, free of intellectual property, to the Security Industry Association (SIA) to improve interoperability among access control and security products. Since then, it has been adopted as a standard by SIA, becoming the first secure, bidirectional reader/controller protocol to be governed by a major standards body in the security industry. In 2020 OSDP reached an additional milestone in becoming an International Electrotechnical Commission (IEC) standard. Why implement OSDP as a standard? OSDP is the only protocol that is secure and open for communication between readers and controllers The growth of networked devices, such as video and access control products, has led to an increased demand for converged solutions. Businesses and organisations recognise the value of implementing an integrated solution to enhance security and add value to technology investment. OSDP is the only protocol that is secure and open for communication between readers and controllers and is also being widely adopted by industry-leading reader and controller manufacturers. It is an evolving, ‘living standard,’ making it a safer, more robust, future-proof option for governing physical access control systems. OSDP offers important benefits: 1) Increased security Implementing OSDP standards can increase security, as OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. Additionally, OSDP constantly monitors wiring to protect against tampering, removing the guesswork since the encryption and authentication are predefined. 2) Bidirectional communication Early on, communication protocols such as Wiegand were unidirectional, with external card readers sending information one way to a centralized access control platform. OSDP has transformed the ability for information to be collected, shared, and acted upon with the addition of bidirectional communication for configuration, status monitoring, tampering, and malfunction detection, and other valuable functions. In fact, OSDP is the only open, non-proprietary, bidirectional, secure protocol for communication between card reader and physical access controller. 3) Open and interoperable OSDP adds new technology that enhances its ability to protect incoming and outgoing data collection OSDP supports IP communications and point-to-point serial interfaces, enabling customers to flexibly enhance system functionality as needs change and new threats emerge. They also can proactively add new technology that enhances their ability to protect incoming and outgoing data collection through a physical access control system. 4) Reduced installation costs OSDP’s use of two wires (as compared to a potential of 11 wires with Wiegand) allows for multi-drop installation, supervised connections to indicate reader malfunctions, and scalability to connect more field devices. Daisy-chaining accommodates many readers connected to a single controller, eliminating the need to run home-run wiring for each reader, and the use of a four-conductor cable achieves up to 10x longer distances between reader and controller than Wiegand while also powering the reader and sending/receiving data. 5) User friendly OSDP gives credential holders greater ease of use, with audio and visual feedback such as coloured lights, audible beeps, and the ability to display alerts on the reader. For security administrators, managing and servicing OSDP-enabled readers also becomes increasingly convenient, as OSDP-enabled readers can be remotely configured from network-connected locations. Users can poll and query readers from a central location, eliminating the cost and time to physically visit and diagnose malfunctioning devices. Unlimited application enhancements OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers OSDP supports advanced smartcard technology applications, including PKI/FICAM and biometrics, and other enhanced authentication protocols used in applications that require Federal Information Processing Standards (FIPS) compliance and interactive terminal capabilities. Audio-visual user feedback mechanisms provide a rich, user-centric access control environment. OSDP offers advantages for users, administrators, and integrators, alike. It adds security and real-world efficiencies, and its interoperability ensures that organisations can use systems from numerous manufacturers as they invest in infrastructure that maximises the protection of critical data. For our part, HID Global’s range of HID Signo readers is OSDP verified, ensuring they offer the intended interoperability and security for secure bidirectional communication and provide an easy migration from Wiegand devices. In a campus environment, OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers if a new access control solution is implemented. There are also service and maintenance benefits as OSDP encourages continuous monitoring of system uptime and allows for remote configuration of -- or upgrades to -- a reader. Cost savings upon system upgrade Integrators can also capitalise on the introduction of OSDP by encouraging open standards, which can, in turn, help them build new customer relationships and win more projects. Although upgrading to access control systems that adhere to OSDP standards is a significant initiative, the range of benefits outweighs the cost of upgrading. Increased security coupled with business efficiencies adds value for those administering the system and a high level of interoperability ensures users can deploy systems from numerous third-party manufacturers. Integrators who understand the benefits of OSDP can also help their customers support both current and future technology requirements. When a site’s needs change, OSDP offers significant cost savings as the open functionality makes adding new devices easier and reduces the expense of requiring all readers to be replaced if a new solution is installed. Businesses and organisations transitioning to OSDP will also enhance value in terms of operational costs such as servicing and maintenance.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
John Wiegand died in 1986, but the communications protocol that bears his name is still alive and well, connecting access control readers to controllers using two wires – one to transmit “zeros” and the other to transmit “ones.” The Wiegand protocol persists despite its limitations, including one-way communication, lack of encryption, and inability to manage the readers in a system centrally. In a Wiegand system, a controller provides no acknowledgement that data has been received. Systems that still use the Wiegand protocol are performing below accepted industry standards and are vulnerable to over-the-counter exploits. A session at ISC West’s Virtual Event highlighted a replacement technology that solves those problems and expands the security, flexibility and functionality of systems. The technology is called OSDP (Open Supervised Device Protocol), which is now a standard managed by the Security Industry Association (SIA) and designated as an international standard by the International Electrotechnical Commission (IEC 60839-11-5). Aligning three components OSDP requires alignment of three critical components – the access control system, readers and controllers. The access control system, readers and controllers OSDP is an RS-485 protocol used to pass card format data from the reader to the controller. Like the Wiegand protocol, it uses two wires, but in this case one wire transmits data and the other receives data. Installation is simplified because no system needs more than four wires – two for OSDP communication and two more for power. In contrast, using Wiegand, additional wires are needed to add other capabilities – up to 8 or more wires in all. OSDP cable runs can extend up to 4,000 ft (compared to 500 feet for Wiegand). Resolving problems Therefore, unlike Wiegand, OSDP sends information in both directions and provides “supervision” of the readers. If there is a problem with a reader, such as a reader communication error or disconnect, that notification is sent back to the access control management system. OSDP also supports encryption for greater security, in effect enabling end-to-end encryption for a host system, controller, I/O modules, readers and credentials. That notification is sent back to the access control management system OSDP also provides additional capabilities, such as control of a reader’s LED and buzzer as well as sending text notifications and messages to compatible displays. Integrators and/or end users can also push configuration and firmware updates to readers all at once. Because OSDP is “open,” there are more third-party integrations and standardizations. OSDP is particularly valuable for U.S. government applications because it meets federal access control requirements such as PKI for FICAM. Wiring requirements Best practice dictates rewiring a project using RS-485 cabling. Specific wiring requirements are needed for OSDP, including 24 gauge (AWG) stranded cables that are a shielded twisted pair with 120 Ohm impedance and overall lower capacitance. However, especially for shorter cable runs, existing wire from Wiegand installations can sometimes suffice, say if it is a cable run of less than 100 ft. Installers should prove their competency before being deployed to an outside installation “Installation of OSDP is not hard, just different than field technicians are used to deploying,” said Tony Diodato of Cypress Integration Solutions, one of the ISC West presenters. Therefore, training of technicians is paramount, and installers should prove their competency before being deployed to an outside installation in order to avoid problems. Integrators or installing teams should have a “lab” setup to thoroughly familiarise themselves with installation to ensure successful deployments. Various in-line devices are available to help transition existing Wiegand applications to OSDP, even if one component or other does not support OSDP. For example, data converters enable installation of an OSDP reader with a legacy Wiegand control panel. Replacing existing devices in legacy Wiegand systems with OSDP devices and using data converters can provide some benefits of OSDP without requiring a full “rip-and-replace” installation.
Case studies
HID, the worldwide pioneer in trusted identity solutions, announces that the University of Dundee is updating its city campus estate implementing HID® Mobile Access® and signature HID Signo™ readers throughout its buildings to guarantee it has a modern, secure, and reliable access control system to allow staff and students to enter using both RFID cards and smartphones. Mobile-ready HID Signo readers The project will involve buying and installing new mobile-ready HID Signo readers at around 40 buildings – a staged rollout being completed over two years by a specialist security installer, Scottish Communications Group. In addition, the University has purchased 10,000 HID Mobile Access licences to offer its academic community the option to use their Apple and Android smartphones for touchless entry into its facilities. Safe and secure modern system “We wanted a modern system which is safe, secure, and easy for everyone to use,” says Colin Stebbing, the University’s Head of Precinct Services. “Complying with forthcoming legislation was also another important project requirement." "With bills like Martyn’s Law soon to be enacted, ensuring the University is ready for this was important given that we must protect to ensure everyone is safe. The HID solution enables us to not only lock down buildings immediately, but it has built-in functionality which we can leverage over time, meaning we’ve invested in ‘future proof’ equipment which will last us long term.” University of Dundee A thriving institution with ambitious development plans, it is currently building a new £40 million facility The University of Dundee is a public research university in Scotland renowned for its academic excellence in dentistry, medicine, science and engineering, and life sciences. Based in the heart of the city, it is home to over 16,000 students, and 3,300 staff and is ranked 33rd in the Sunday Times Good University Guide 2024. A thriving institution with ambitious development plans, it is currently building a new £40 million facility called the Innovation Hub. This will offer commercial organisations flexible laboratory, meeting, and office space and, over the next 10 years, it is anticipated the Hub will help create up to 280 new high-quality jobs. Touchless smartphone entry The new HID Signo readers integrate with the University’s existing AEOS access control software from Nedap. Supporting both native Bluetooth® and Near Field Communication (NFC) connectivity, they allow touchless smartphone entry and are fast to install as the wiring uses common protocols like OSDP [Open Supervised Device Protocol] and Wiegand. Furthermore, existing access cards already in circulation can be used with the new HID Signo readers thereby speeding up the rollout. University's challenges Historically, the University used to print and issue plastic RFID cards so staff and students could access buildings. This process was laborious and time-consuming, especially during peak times like Freshers Week when some 2,500 – 3,000 undergraduate and postgraduate students enrolled. Issuing cards was logistically complex due to the high demand and the need for thorough identity checks, which could take up to 10 minutes per card. HID Mobile Access Shifting to HID Mobile Access completely changes this and delivers wireless credentialling Shifting to HID Mobile Access – which utilises cloud-based HID Origo management software integrating with the AEOS system – completely changes this and delivers wireless credentialling. This significantly simplifies all the licencing, allocation of credentials, setting of building access rights, and validating or revoking of IDs – all of which are done virtually and remotely. Mobile credential “Once registered by Student Services in AEOS, a student simply gets an email to their phone, they tap on a link, the app automatically uploads and a mobile credential is granted,” says Paul Brady, HID’s End User Business Manager for Physical Access Control Solutions. “Not only does this improve the overall student experience because it’s substantially quicker and more efficient, but it’s far more sustainable as you’re not issuing PVC cards anymore.” Dual system approach While the strategy and aspiration are for the university population to shift wholesale to mobile access, its approach is to operate a dual system. “We recognise that some visitors and staff still want to use a physical pass and not all employees have a university-issued mobile credential,” explains Stebbing. “HID Signo readers allow us to run both credential types in tandem, with HID Mobile Access giving us the option to scale up to include digital wallets from Apple and Google, as well as integrate with digital campus cards should we decide to go down this route in the future.” FARGO DTC4500e printers FARGO range integrates easily with the AEOS software so that Student Services staff can issue physical IDs Given RFID cards are still required, the University of Dundee utilises its reliable FARGO DTC4500e printers to back up this transition to digital transformation. The FARGO range of ID card printers integrates easily with the AEOS software so that Student Services staff can easily issue physical IDs themselves. “HID Signo readers are going in now across the main buildings including the Innovation Hub site,” says Stuart Leslie, Scottish Communications Group’s director. Encryption, communications, and authentication standards “HID’s reputation is built on reliability and security with its solutions supporting the latest encryption, communications, and authentication standards." "Their devices have an open architecture so they’re easy to install and integrate which reduces the cost for the university and makes time to value that much quicker.” Motorola MOTORTRBO Ion smart radios In addition, the Scottish Communication Group is supplying Motorola MOTORTRBO Ion smart radios to the University’s security staff. The radios will be configured to run HID Mobile Access so they can open doors fitted with the new HID Signo readers. Because these smart radios also link to the University’s CCTV, alarm systems, and CriticalArc Safezone® App, security staff need to carry only a single device to fulfill their duties.
ASSA ABLOY, the pioneer in access solutions, has received approval to utilise its integrated locking solutions on U.S. federal government access control Federal Identify, Credential, and Access Management (FICAM) applications. This significant milestone was reached after a lengthy and detailed government and third-party security vulnerability and interoperability testing process. Products The following products are on the General Services Administration’s (GSA) FIPS 201 Evaluation Program Approved Product List (APL): Corbin Russwin SN Series Integrated Lock Corbin Russwin SN Series Integrated Lock With Keypad SARGENT SN Series Integrated Lock SARGENT SN Series Integrated Lock With Keypad HES KS210 Series Integrated Server Cabinet Lock Integrated access control locks Locks feature OSDP technology that allows for secure channel and serial communication between reader and PACS These integrated access control locks feature Open Supervised Device Protocol (OSDP) technology that allows for secure channel and serial communication between the reader and the Physical Access Control System (PACS). These products were tested and approved by the U.S federal government in conjunction with the LenelS2 OnGuard® access control system, including the LNL-X4420 intelligent controller with the embedded HID® pivCLASS® Authentication Module. FICAM-approved solutions “We’re excited to expand our suite of FICAM-approved solutions for OnGuard access control system customers,” says Derek Greenland, Director, Federal Government Solutions, LenelS2. “The ASSA ABLOY integrated locks for doors and server cabinets provide high-quality choices for government facilities implementing FICAM controls to protect critical assets.” Physical access control system “We are excited to be able to offer government facilities more options to expand their PACS [physical access control system],” says Jeff Huggins, Vice President of Government Programs, ASSA ABLOY Opening Solutions. “Having these specific integrated OSDP access control locks approved for applications mandated by the Homeland Security Presidential Directive 12 (HSPD-12), along with our varying wireless, WiFi, and PoE locking options, make it easier and more affordable to support the use and implementation of card reader technology deeper into each facility, even server cabinet doors."
Australian company High Frequency designed a “self-service” linen portal for a commercial laundry servicing the thriving short-stay accommodation market. Called the “Mobile Linen Hub”, this modified shipping container provides access to linen for users 24/7. After taking the linen they need, the cost is then added to their account as they exit the hub. Access control with Wiegand 125 kHz reader High Frequency’s initial prototype used a standard Wiegand 125 kHz reader to control access. Each customer’s card, upon scanning, granted entry to the Mobile Linen Hub while activating UHF readers inside. However, the prototype encountered several problems with its 125 kHz Wiegand readers. The readers’ lack of security allowed cards to be copied, and their lack of data storage prevented them from displaying why a card had been declined, for example. Reasons for denied entry Ultimately, the inflexibility of a 125 kHz reader led to confusion and a lot of support calls Customers only heard a ‘denial’ buzz and saw a red light. Meanwhile, there were multiple reasons a customer could be denied entry. Their card could be invalid, their account could be suspended from non-payment, or simply, someone else could be using the Mobile Linen Hub. Ultimately, the inflexibility of a 125 kHz reader led to confusion and a lot of support calls. MIFARE DESFire reader High Frequency solved the problem by switching to Idesco’s 8 CD 2.0 D Pin RFID display readers. “A highly secure MIFARE DESFire reader, 8 CD 2.0 D Pin instantly solved our card cloning issue, with zero impact on our solution since Idesco handles both our card encoding and reader programming," notes Isaac Hayes, High Frequency. “Our new system deployed a single Idesco reader on both sides of our Mobile Linen Hub, connected to an RS485/Ethernet converter, with our bespoke software communicating with them across OSDP," Isaac continues. Display reader solution High Frequency discovered that the OSDP standard made displaying private messages in an RFID reader possible This new display reader solution has greatly decreased support call frequency while increasing the product’s usability. Confusion surrounding denied access was also solved, with the reader displaying messages on its screen for users, such as “Access Granted”, “Access Denied, Account on Hold” and “Portal Busy, please wait before entering”. While looking for a new solution for their system, High Frequency discovered that the OSDP standard made displaying private messages in an RFID reader possible. “During my research, it became apparent that Idesco was the only reputable company with a colour display, OSDP-compatible reader”, Isaac Hayes recalls. Mobile access solutions enhancing security “Idesco 8 CD 2.0 D Pin reader is now an integral part of Mobile Linen Hub’s design, and will be included in all manufactured models for the foreseeable future," he reports. Idesco Oy is a pioneer of RFID technology, with more than 30 years of experience. Idesco RFID readers and transponders, mobile access solutions, controllers, and touch screen devices. Its products collect data and enhance security in several access control, vehicle identification, and logistics settings around the world. High Frequency specialises in helping commercial laundries around the world implement RFID in a way that provides value to their business.
Compania Naţională de Căi Ferate ‘CFR’ - SA, the state railway carrier of Romania, has invested in an integrated security and safety solution from Johnson Controls, to protect passengers travelling on a new railway link, connecting the Otopeni Henri Coandă International Airport to Bucharest Nord main railway station, in Bucharest, Romania. Securing Bucharest’s new rail link The 2.95 km rail link, which was planned to facilitate the large number of fans travelling from the international airport to attend the Bucharest-hosted EURO 2020 football matches and was completed in just 14 months, from the design stage, at a cost of approximately 120 million Euros, is now being increasingly used by business travellers and tourists, who wish to visit the city of Bucharest. The contract to design and execute the entire project was won, as part of a competitiveness tender process, by the Arcada – ISPCF – DB Engineering consortium. Alfred Net, a systems integrator that specialises in designing and implementing turnkey security, telecommunications and network solutions, was subsequently tasked to provide the new railway terminal’s safety and security systems, as well as the passenger communications and information systems. Need for a sophisticated security solution We were very pleased to have the opportunity to use our experience of providing sophisticated solutions" “We were very pleased to have the opportunity to use our experience of providing sophisticated solutions for complex and mission critical applications, in order to contribute to the success of this important project,” said Alex Vladutoiu, the Managing Director & Solutions Architect at Alfred Net. Alex Vladutoiu said, “With the new link terminating within the airport, we immediately realised that any security and safety solution that we recommended to the consortium would need to meet the demanding requirements of airport security, as well as railway- related EU regulations and directives.” Deep integration of security components He adds, “This meant that as well as being robust, ultra-reliable and cyber secure, the various component parts of the solution would need to be deeply integrated with each other, so as to provide control room operators with a high level of situational awareness, which would enable them to react quickly and effectively to any incidents.” Alex Vladutoiu further said, “With this in mind, our previous experience led us to recommend that all the security and safety products should be single sourced from the Johnson Controls’ access control, fire, intrusion and video surveillance brands, which come under its Tyco umbrella. Simply put, we knew these various brands could collectively provide us with everything needed to put together an effective solution for this project.” He adds, “Importantly, we were confident that the various products, which to a large extent are ‘plug & play’, could be easily integrated without the time-consuming process of developing new drivers and interfaces.” Tyco victor security management platform The Alfred Net design team specified the Tyco victor security management platform The Alfred Net design team specified the Tyco victor security management platform, to be at the heart of the safety and security solution. In addition to helping control room operators manage and monitor the images, captured by Tyco Illustra high-definition IP network cameras, victor’s graphical user interface (GUI) alerts operators in real time, as to any fire or intrusion events, as well as any access control activity. The design of the security and safety solution was based on a rigorous Risk Assessment Report, which took into account the worst case scenarios, in terms of the threat to the safety of passengers, disruption and the protection of assets. Unified security solution “By providing a unified solution, which can manage the combined data captured by the intrusion detection, access control, fire detection and video surveillance systems, victor offers authorised users with all the information they need, to monitor and strictly control the movement of passengers.” The products include: Video Surveillance & AI Analytics: In addition to the Tyco Illustra cameras and VideoEdge video recorders, which have been deployed to monitor the railway terminal proximity, mission critical machinery, platforms and areas open to the public, control room operators are also able to take advantage of video analytics, in order to help them quickly detect any suspicious activity or danger. Tripwire detection, for example, can generate an alert, if a passenger oversteps a platform’s safety line, while people counting analytics can alert security personnel to overcrowding. It can also be used by operations personnel to help them make best use of human resources, by having a greater understanding of which parts of the station are busy, at different times of the day. Access Control: A CEM Systems AC2000 access control software platform, together with eDCM350 OSDP protocol IP door controllers, are supporting smart card readers and encrypted cards, to limit access to sensitive areas throughout the railway station, such as communications, signalling, staff and locker rooms. As a highly scalable solution, AC2000 enabled Alfred Net to implement access control throughout expansive areas of the railway. By utilising RS485 serial communications with strong AES 128 encryption between the eDCM 350 intelligent door controllers, the OSDP readers and the smart cards, the railways is protected against the threat of controller signal cloning, as well as the threat of personnel card cloning. Fire Detection: Zettler Profile Flexible addressable panels, flame detectors and smoke sensors have been installed throughout the station terminal, to ensure mandatory compliance with EU fire regulations. Integration with the station’s PAVA system means that pre-recorded announcements are automatically broadcast, when a fire-related event occurs. Intrusion Detection: A DSC PowerSeries Neo intrusion system is providing protection for areas, which may be left unattended, such as cash handling areas, with integrated panic buttons to ensure there is a rapid reaction to any intrusion alarm. Johnson Controls and Alfred Net partnership Alfred Net worked closely with the Johnson Controls’ pre-sales team, in order to ensure the best products were specified for each location and application, and the comprehensive security and safety solution was installed, alongside the station’s iPIS communications and information software. Alex Vladutoiu said, “This was without doubt the most complex project that the client has been involved with and reflects its determination to invest in the latest technology, to ensure maximum operational efficiency and to protect its passengers and assets.” Video analytics and flame detection This has resulted in diverse solutions, such as video analytics and flame detection" He adds, “This has resulted in diverse solutions, such as video analytics and flame detection, based on video technology interacting with laser detection, RGB LED displays, digital signage, Text-to-Speech and many other state-of-the-art technologies, to deliver a highly effective total solution.” Since December 2020, when the new rail link became operational, the highly complex and integrated security and safety solution from Johnson Controls has been playing a key role, in ensuring the smooth operation of the train station and the running of 72 trains per day, (36 pairs), which arrive and depart every 20 minutes, both from and to the airport. Tyco suite of security products Alex Vladutoiu, Managing Director and Solutions Architect at Alfred Net, concludes “As a solution architect, Tyco is indeed my preferred security provider for integrated projects. As a unified solution, the Tyco suite of products are almost ‘plug and play’ and give you everything you need to build-up an integrated system, without spending additional time or money on developing other interfaces. He concludes, “We were delighted to have designed and implemented the new Otopeni Airport Railway Terminal project in less than one year and we look forward to our continued partnership with Tyco.”
The National Bank of Kuwait (NBK) is known as ‘The Bank You Know and Trust’. Kuwait’s largest financial institution, it has 68 branches in its homeland and more than 143 worldwide. When NBK moved its operations to newly built headquarters, it chose AEOS access control by Nedap to protect them. NBK also wanted to centralise its access control. Having already used AEOS in some locations for over a decade, it knew that this flexible, scalable system could help to achieve that. AEOS is implemented not only at NBK’s iconic headquarters, a building it owns and manages, but at its bank branches and data centres across Kuwait too. Adaptable, centralised control NBK was looking to update its security policies and take a centralised approach to monitor and controlling access. With facilities spread across Kuwait, it wanted to unify access control for employees across all its locations. NBK wanted its new security system to have the integration capabilities to fit into its IT ecosystem, it needed to be based on an open platform. Flexibility was also very important for NBK. It wanted to be able to address the changing needs of its security policies based on risk assessments, compliance regulations, and other potential future changes. Unified, central access AEOS made it possible for NBK to monitor and control access centrally and to manage daily operations After in-depth discussions, NBK was confident that Nedap could help it achieve its security goals. AEOS would provide all the features it needs such as map alarm handler, zoning, customised reporting, and lift integration. NBK’s future-proof AEOS system has been implemented and is helping the bank to manage daily operations. With just one server and database for all its locations spread across the country, NBK can monitor and control access centrally. OSDP integration One of the most important features NBK was looking for was OSDP integration with HID card readers. This project has set a benchmark in Kuwait because of its ability to connect with HID readers via the OSDP communication protocol due to AEOS blue controllers. Easier management AEOS’s visitor management module has also made it easy for NBK to capture visitor data by integrating with passport and national ID readers. And its security level functionality ensures visitor access is restricted to designated zones. A presence list feature helps to track and trace the location of employees or visitors inside the building. And it also generates alarms for the IT and security teams if someone tries are to access a zone they’re not authorised for. Extending use with integrations NBK’s AEOS system not only offers many valuable features and complies with all banking IT standards; it enables straightforward integration with technologies provided by other suppliers too. Destination control for passenger lifts has, for example, been integrated with AEOS. And a time attendance system has been integrated to record employees’ working hours and produce customised reports. Key benefits Flexibility and scalability to meet future needs Centralised monitoring and control saves time and increases security High levels of functionality add value and allow tailoring to specific requirements AEOS’s open platform enables integrations to extend the system’s capabilities “As we were making an investment that would be used across many sites, we wanted to be sure we selected absolutely the right system. Nedap proved that AEOS would provide not only the unification and specific features that we need, but the flexibility to make future adaptations and integrations too. Also, AEOS is cleverly designed around the people using it, so it brings value in terms of time saved and increased convenience, as well as improved security,” says Mr. Ezzat Hallal, General Manager - Engineering Services Expert technical support To ensure the system’s smooth running, Nedap has ensured the NBK security team has all the technical support they need. Not just during the implementation and post-implementation phases but for ongoing maintenance too.
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organisations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilise the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimise air quality, efficiency of our HVAC units, and behaviours in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
Products
Videos
OSDP: Manufacturers & Suppliers
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
Download5 surprising findings from OT vulnerability assessments
DownloadPalm vein recognition
DownloadPhysical access control
Download