Security News » News http://www.securitynewsdesk.com Security News, Publishing, Products and more... Wed, 27 Aug 2014 16:10:27 +0000 en-US hourly 1 Higher Education Campus Security Management http://www.securitynewsdesk.com/2014/08/27/higher-education-campus-security-management/ http://www.securitynewsdesk.com/2014/08/27/higher-education-campus-security-management/#comments Wed, 27 Aug 2014 09:51:01 +0000 http://www.securitynewsdesk.com/?p=45781 As schools and universities gear up for a new academic year John Convy, Principal, Convy Associates, looks at campus security management.

The post Higher Education Campus Security Management appeared first on Security News.

]]>

Campus Security SND

As schools and universities gear up for a new academic year John Convy, Principal, Convy Associates, looks at campus security management.

Since the tragic incidents that occurred in the Unites States in Columbine, University of Arizona, Virginia Tech, and Sandy Hook in Connecticut, sociologists have analysed campus violence, hoping to prevent it. And a number of technology firms are marketing integrated identity management and security solutions specifically to colleges and universities. Some of these unique applications developed for higher education may lead to broader, industry-appropriate solutions that will eventually filter into other market segments. This strikes me as an interesting domain for other security professionals to watch and learn from, especially those involved with capitol campuses and other government complexes.

“The first step in reducing risks from intruders on higher education campuses is to implement an integrated identity and rights management system,” suggests Mat Birnbaum, Vice President of Technology at IDENTIGY. “This should be a comprehensive system of record for the institution and the government entity responsible for overall campus security. It should verify people’s identities in real time, and define the roles, permissions, rights, and activities they are authorised for within the perimeter, at any given time.”

Knowing every person on campus, enrolling them in a system that tracks relevant information—including activities and whereabouts—gives security people a clearer picture of what is happening in real time.

Identity data captured from a credential card or smart phone can be sent and displayed in either a math-based interface, metrics dashboard, or drilled down to focus on a specific person of interest being vetted by security personnel. This enables tighter control of perimeters and knowledge of exactly who is on campus in the event of an emergency notification. It also provides a way to account for people, muster them when needed, and control entry and exit to buildings and internal perimeters.

“Step two is to control entry/exit points with electronic security in the form of access control and video surveillance,” Birnbaum explained. “Apply technology solutions to what’s typically a very porous and uncontrollable situation by associating people and vehicles to a trackable identity at all the entry points, with video cameras, access control cards and biometrics. Then create a perimeter with systems that can be alarmed, triggered, and displayed to command centres and mobile responders, using video and other information.”

When the system recognizes a pre-defined condition, a response can be executed automatically. For example, if a blacklisted vehicle is detected driving onto campus, the automation could put the campus in lockdown through access control, send notifications to administrators and first responders, or implement whatever degrees of severity the institution wanted to undertake in response to a specific scenario.

When every student and faculty member carries a smart phone with an app—if they see a threat, they  can push a button and send a photo of the scene. You don’t have to wait for a police officer or security person to arrive on scene to sound an alert.

“Step three is enabling collaboration and sharing of a common set of information in response to an event,” Birnbaum added. “Making data available to those who need it, whether it’s an event condition, alarm condition, or a real time photo from the scene. Some responders might arrive in squad cars and they need to view information on mobile data terminals, tablet PCs or smart phones. Foot patrol guards will likely be carrying smart phones. Dispatch centers typically have video walls, and a resident advisor at a desk in a residence hall may be using a desktop or notebook computer. The idea is to get information out to all of the interested parties at the same time, so that everybody can collaborate and execute tasks such as firing up communication channels, so that everybody can speak to each other in real time, no matter what device they are using – a radio, landline phone, IP phone, cell phone, or whatever.”

Full campus security implementations can be extended to include health and personal safety. A person might be down somewhere – someone is sick, they have food poisoning, or they’re experiencing seizures. An event could be anything that requires the attention of safety officials, medical personnel, or administrators.

Tools and apps can be provided to students who are uncomfortable, for example, walking back to their car late at night from the library, or walking through a rough part of town near campus. They can press a button that says, “Follow me,” and they’ll appear on a map in the dispatch center with their current position and destination marked. If they deviate from their route or suddenly start traveling at 40 miles an hour, having possibly been abducted and in a moving car, or they stop for too long a period of time, alerts are sounded and appropriate actions can be initiated.

Key Components of Integrated Campus Security

  • Ensure all deployed systems interact seamlessly and are shared among authorities.
  • Establish control of all points of access and egress of campus buildings and property borders.
  • Implement identity management system for positive student Identification.
  • Implement a Mass Notification system to immediately react to all threats.
  • Enable personal cellular emergency monitoring applications to protect students and staff
  • Deploy Mobile Clients for Police and First Responders to enable strategic responses to any situation.

Source: Brian Dolan, Vice President, 1 Volt Associates.

 

Solutions offered by various identity management vendors and sold into higher education enable access control, integrated security, campus ID card privilege control, housing services, food service, catering, nutrition services, online ordering, and other campus-wide activities.

Secure credentials can also be used for common conveniences, such as using student aid funds to purchase goods and services – cafeteria meals, vending machine items, taxicab service and printing are common examples. If a student misplaces or forgets to carry an ID/credentialing card, a text message can be sent from the student’s cell phone to receive instant building or room access using a feature known as “Open My Door,” reducing the need for middle-of-the-night visits by security or residential staff.

OLYMPUS DIGITAL CAMERAAbout Author

John Convy has over 20 years of experience in the technology industry.  John is the principal consultant at Convy Associates, which provides strategic alliance and lead generation programs that monetize relationships and accelerate demand for security manufacturers.

Prior to Convy Associates, John was Senior Vice President of Strategic Alliances, at BRS Labs.  Before that, he created the Technology Partner Ecosystem Program for Cisco’s Physical Security group with over 60 global partners.  Prior to that, John directed Strategic Communications for BroadWare Technologies, which was acquired by Cisco in July 2007. 

John is the founder and managing director of both the “IP Vide Surveillance Academy” and the “Open Standards Security Alliance”, which promote the open architecture, standards-based security model, and produce educational seminars that have drawn thousands of attendees.  He is also a frequent speaker at global security industry events.

Prior to his involvement in the security industry, John founded a political technology company – Grassroots Systems Inc. in 1989, and served as President until its sale in 2000.

John Convy and Convy Associates provide strategic alliance, A&E consultant, technology ecosystem, and lead generation programs to monetise relationships and accelerate demand for leading security industry manufacturers. John is the Founder and Managing Director of the Open Standards Security Alliance and the IP Video Surveillance Academy, and is a speaker at many global industry events. 

 

The post Higher Education Campus Security Management appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/27/higher-education-campus-security-management/feed/ 0
Teleste signs frame agreement with Altice Group http://www.securitynewsdesk.com/2014/08/26/teleste-signs-significant-frame-agreement-altice-group/ http://www.securitynewsdesk.com/2014/08/26/teleste-signs-significant-frame-agreement-altice-group/#comments Tue, 26 Aug 2014 15:42:05 +0000 http://www.securitynewsdesk.com/?p=45768 Teleste Corporation has signed a frame agreement with Altice Group on access network deliveries for the next five years.

The post Teleste signs frame agreement with Altice Group appeared first on Security News.

]]>

telesteTeleste Corporation, leading provider of video and broadband technologies and associated services, has signed a frame agreement with Altice Group on access network deliveries for the next five years. The Altice Group is a multinational cable and telecommunications company with a presence in e.g. France, Israel, Belgium & Luxembourg, Portugal and the Caribbean Islands. Altice provides cable based services like high quality pay television, fast broadband Internet and fixed line telephony and, in certain countries, mobile telephony services to both residential and corporate customers.

Under the frame agreement Teleste provides to Altice access network equipment which enable delivery of new broadband services according to DOCSIS 3.1 standard. DOCSIS 3.1 enables multigigabit broadband speeds to be offered to subscribers. This will be the first mass-scale deployment of DOCSIS 3.1 capable access network in Europe.

The value of the agreement is estimated to exceed EUR 20 million over the next five years. The agreement is an extension to previous frame agreement with Altice Group.

For more information about Teleste visit www.teleste.com or discover Finland’s best kept secret here.

The post Teleste signs frame agreement with Altice Group appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/26/teleste-signs-significant-frame-agreement-altice-group/feed/ 0
FAAST Global Showcase Continues at Security Essen http://www.securitynewsdesk.com/2014/08/26/faast-global-showcase-continues-germany-security-essen/ http://www.securitynewsdesk.com/2014/08/26/faast-global-showcase-continues-germany-security-essen/#comments Tue, 26 Aug 2014 14:40:07 +0000 http://www.securitynewsdesk.com/?p=45763 Security Essen, the world’s largest fire and security show, is the latest trade show to feature new aspiration detection technologies from Honeywell.

The post FAAST Global Showcase Continues at Security Essen appeared first on Security News.

]]>

faast security essenSecurity Essen, the world’s largest fire and security show, being held in Germany from 23rd to 26th September, is the latest trade show to feature new aspiration detection technologies from Honeywell.

The FAAST portfolio, including a preview of the new high sensitivity four-inlet XT device, will be showcased at the Honeywell Booth 211 in Hall 3. Amongst the activities will be live demonstrations of FAAST achieving false alarm immunity in industrial conditions and hands-on FAAST LT and Pipe IQ design sessions.

Frank Dam, Honeywell Sales Manager, has been announced as one of the keynote speakers in the Security Forum on 25 September in Hall 7 from 14:00. He will outline the importance of next generation detection in challenging environments.

Frank Dam said, “FAAST offers class-leading leading levels of false alarm immunity, extensive coverage and integrated communications and is being specified in an increasingly wide range of applications. Security Essen provides a great opportunity to communicate new product developments and to outline how the latest technologies can overcome some of the most challenging environmental conditions and provide increased levels of protection.”

Gintare Budriunaite, Honeywell’s Marketing Manager for speciality fire detection products, added, “The market for aspiration detection is changing. Once the remit of clean rooms and data centres, it is now becoming the technology of choice for industrial locations, airports, warehouses, shopping developments and even power generation and nuclear facilities. This is thanks to sophisticated filtration and optics technologies which deliver high sensitivity detection with the highest levels of false alarm immunity, opening the door to many other applications where smoke detection was difficult or impossible. We are looking forward to showcasing the extended FAAST portfolio at the largest trade show in the fire and security calendar.”

FAAST is part of the Honeywell booth which will be featuring the latest innovations in fire alarm, management and notification systems as well as access control, intruder detection, video surveillance and integrated security solutions on more than 1,200 m².

For more details and to register for the show go to the Security Essen website http://www.security-essen.de/impetus_provider/

The post FAAST Global Showcase Continues at Security Essen appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/26/faast-global-showcase-continues-germany-security-essen/feed/ 0
Nice Systems: Debunking Voice Recognition Myths http://www.securitynewsdesk.com/2014/08/26/nice-systems-debunking-voice-recognition-myths/ http://www.securitynewsdesk.com/2014/08/26/nice-systems-debunking-voice-recognition-myths/#comments Tue, 26 Aug 2014 13:58:55 +0000 http://www.securitynewsdesk.com/?p=45759 The recent tragic news regarding James Foley has brought voice recognition into the media spotlight. So it’s time to set the record straight.

The post Nice Systems: Debunking Voice Recognition Myths appeared first on Security News.

]]>

Voice Recognition SND

Written by Jade Kahn, NICE Systems.

“The biggest clue may lie in his voice…” (CNN 24 August 2014)

The recent tragic news regarding James Foley has brought voice recognition into the media spotlight as authorities endeavour to identify the perpetrator of this heinous crime. Some media outlets have questioned the efficacy of voice biometrics, so it’s time to set the record straight.

Every person does have a unique voice – in the same way that each of us has a unique finger print, so each of us has a unique voice print. In fact, a voice print is even more sophisticated than a fingerprint, being comprised of over 100 unique characteristics in comparison 20 unique characteristics associated with a fingerprint.

You can be identified using your voice – the unique characteristics in your voice – both physical and behavioral – can be used to create a voice print. This voice print can then be compared against any audio stream to determine the whether there is a match with the original speaker.

Voice recognition is the only biometric that can be used remotely – voice biometrics can be used to identify a speaker with the person not present by simply levering the audio of their voice – whether from a phone call or a video recording.

Voice biometrics works even with background noise – While better quality audio naturally produces better results, the technology can identify a speaker on a busy street or with background noise to a high degree of accuracy.

These unique attributes of the human voice have been leveraged many years in forensics to identify criminals and are now being used around the world by enterprises to identify fraudsters over the phone. While I don’t know how authorities used voice biometrics in this horrible and tragic instance, I can tell you that the technology is indeed real.

The post Nice Systems: Debunking Voice Recognition Myths appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/26/nice-systems-debunking-voice-recognition-myths/feed/ 0
The Dark Web – Ignore this Security Space at your Peril http://www.securitynewsdesk.com/2014/08/26/dark-web-ignore-security-space-peril/ http://www.securitynewsdesk.com/2014/08/26/dark-web-ignore-security-space-peril/#comments Tue, 26 Aug 2014 13:39:28 +0000 http://www.securitynewsdesk.com/?p=45751 The World Wide Web is an integral part of most peoples’ day to day lives. However, there are bits of the Internet we know about and bits we don’t.

The post The Dark Web – Ignore this Security Space at your Peril appeared first on Security News.

]]>

Dark Web SND

The World Wide Web is an integral part of most peoples’ day to day lives, enabling business, social activity, entertainment, education, awareness and much more. However, there are bits of the Internet we know about and bits we don’t.

With the proliferation of IP enabled technologies breaking into mainstream security, the Internet and its workings are becoming more important. It is critical that any area that allows hidden Internet traffic is understood so that potential threats can be assessed and appropriate mitigation actions taken.

The top level of the Internet is often referred to as the Surface Web. This is anything that can be indexed by a typical search engine such as Google, Bing or Yahoo. Search Engines rely on pages that contain links in order to find and identify content on the web that people want.

IP reliant security devices such as CCTV, therefore, do not work as part of the Surface Web.  So what comes next?

If the surface web is anything a search engine can find, then the next level is the Deep Web – anything that a search engine cannot find.  There are a number of reasons why search engines can’t find data on the web, the main one being that content is ‘hidden’ behind a website’s search box and does not contain links to the Surface Web. This is common in many government websites and other data repositories such as libraries.  Search engines do not search inside a website.  The majority of content that makes up the Deep Web is in these sorts of sites and is generally not anything illicit or scary.

This is an area where we start to see IP security device output, accessible through a company’s own website but not available to Surface Web searches.  However, this is not the end.

Digging a little deeper – and darker – we find the Dark Web. This is a small portion of the Internet that has been intentionally hidden and is inaccessible through standard web browsers. There are many anonymous networks that can only be accessed via specialised browsers and it is in this area of the web that illicit activities take place. But what how does the Dark Web threaten you, and how would you know?

Security professionals often stumble across data left behind by a bad actor, whether after an attempted hack, a suspicious visit to a website, or the fraudulent purchase of an online product. Unfortunately, because those engaged in illicit activity are not operating on the surface web, mainstream search engines and data aggregators offer little to no additional information to flesh out the profile of a bad actor.

Trying to find out where these illicit actors have come from and what risk they pose to your business requires expertise. This expertise is not just in finding particular sites, but also in getting into them and maintaining ‘membership’ whilst remaining legal.  A further challenge is staying safe so the owners of the illicit site don’t discover who is looking at them and why!

Luckily, there are firms who specialise in identifying threats hiding in the Dark Web and can provide general and targeted threat analysis. This means that threats to businesses and individuals can be properly quantified and cost effective mitigation steps taken.

One such company is GeoRiskAnalysis, which has a cyber security division specialises in mapping the Dark Web to provide the information needed to mitigate the risks emanating from this area.

Vasco Amador from GeoRiskAnalysis discussed the risks from individual and companies operating in the Dark Web with SecurityNewsDesk.

“Key indicators suggest that we are not making enough progress with cyber security and, in fact are possibly going backwards,” he said. “Companies, governments, schools, and critical infrastructures,are experiencing increased data breaches, criminal activity, essential e-services disruption, and property destruction.”

Amador went on to explain more, saying, “The first risk is a breach. The number of breached records rose by 350 per cent in 2013, with approximately half of the US population’s personal information exposed in a 12-month period. The average time it takes an organisation to detect a breach is 32 days, an increase of 55 percent from last year.

“The second risk is crime and financial, informational,and industrial espionage. By one estimate, cybercrime and economic espionage costs an estimated 445 billion US Dollars globally (an increase from last year).

“The third risk is disruption of e-services. A DDoS campaign has been underway for the last year against the US top financial institutions. The DDoS attacks are reaching levels that are disrupting citizen’s ability  to conduct banking, and communications providers can no longer guarantee quality of service or business continuity. The most recent example is the shutting down of the Sony PlayStation and Xbox networks this week.

“The final risk is destruction. In August 2012, Saudi Aramco suffered a targeted attack that used malicious software to destroy data and damaged nearly 75 per cent of the company’s IT infrastructure. Corporate officials declared it a targeted attack intended to affect oil production. A few months later, in March 2013,multiple financial institutions in South Korea suffered damages from malware similar to that used in the incident against Saudi Aramco. Their e-services were disrupted and data was destroyed.”

Amandor concluded that “Cyber breaches, crime, disruption, and destruction have significant implications for global trade and global business continuity. Cyber security constitutes a risk area for all organisations whether they acknowledge it or not.”

You can find out more from GeoRiskAnalysis at www.georiskanalysis.com.

The post The Dark Web – Ignore this Security Space at your Peril appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/26/dark-web-ignore-security-space-peril/feed/ 0
Robbie Calder helping drive up security training and standards http://www.securitynewsdesk.com/2014/08/26/robbie-calder-helping-drive-up-security-training-and-standards/ http://www.securitynewsdesk.com/2014/08/26/robbie-calder-helping-drive-up-security-training-and-standards/#comments Tue, 26 Aug 2014 08:54:52 +0000 http://www.securitynewsdesk.com/?p=45747 Robbie Calder received an award at the recent BSIA Annual Luncheon. We spoke to him and discovered just how well deserved this recognition was.

The post Robbie Calder helping drive up security training and standards appeared first on Security News.

]]>

R Calder Photo 1At the recent BSIA Annual Luncheon, Robbie Calder, a Director of Broadland Guarding Services, received an award recognising his contributions to the development of standards within the industry. We spoke to the BSIA’s Police and Public Services Section Chairman and discovered just how well deserved this recognition was.

A former military man, Calder has 18 years experience in the security industry and was incredibly modest about his recent award, saying that it was a “surprise”. However, when you consider that he has played an instrumental role in the development and establishment of a range of vital industry standards, including the requirements for SIA licensing relating to CCTV operators, BS7958 for CCTV Control Rooms,  Warden Schemes, and currently he is assisting work on a new search standard, his award is far from a surprise.

Calder first got involved with the BSIA through his first job in the security industry after leaving the military, acting as the company’s BSIA representative. From there his involvement in the organisation has gone from strength to strength, and he now chairs the Police and Public Services Section. Speaking about the importance of the BSIA and the standards it produces, Calder insists that on-going monitoring of how the industry is changing is vital.

“The BSIA represents the vast majority of security companies and it raises and drives standards up across the board,” he said. “Everything changes, nothing stands still, so it’s vital that standards evolve to remain effective.”

One of the best examples of this is Calder’s work with BS7958, the British Standard for CCTV Control Rooms. This began life as a BSIA code of practice that was built around data protection requirements before becoming a British Standard in 1996, Calder has been involved in the three reviews since then introducing amendments  that have included an annex for contractors and an annex for traffic enforcements, as well as the current  review of the existing standard, which  Calder is involved in by representing the BSIA on the BSI committee.

Another demonstration of Calder’s commitment to driving up standards in the security industry is his work with the Warden Scheme standard.

“The Warden Scheme was actually something I had initiated with a Local Authority in the North West in 2000 to help tackle crime in a difficult area,” said Calder. “So it was bespoke for the needs of the area, but it worked exceptionally well. So well in fact that David Blunkett, then Home Secretary, used it as a good example of cooperation with the police in clause 5.24 of his Policing a New Century A Blueprint for Reform document in 2001.”

As a result of this recognition, the BSIA approached Calder to develop the scheme into a BSIA code of practice. Last year this was developed into a British  Standard.

And there is no sign of Calder resting on his laurels! He is currently helping work within the BSIA on developing a much needed code of practice for searches and supporting the regular parliamentary round tables hosted by the BSIA to encourage on-going cooperation between the security industry and the police. All of this is in addition to his fulltime role as a Director of Broadland Guarding’s UK and Germany arms, a growing company that is a well known name in the manned guarding sector.

So next time you have to look up a standard to make sure your company is operating efficiently, think of Robbie Calder and the rest of the hardworking team at the BSIA, who tirelessly pursue ways to strengthen and lift up the security industry. And join us in sharing our congratulations with Calder on his well-deserved award.

Visit bsia.co.uk for more information on codes of practice for all sectors of the security industry and information on current British Standards.

The post Robbie Calder helping drive up security training and standards appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/26/robbie-calder-helping-drive-up-security-training-and-standards/feed/ 0
Kantech Releases Intevo with exacqVision VMS Software http://www.securitynewsdesk.com/2014/08/25/kantech-releases-intevo-exacqvision-vms-software/ http://www.securitynewsdesk.com/2014/08/25/kantech-releases-intevo-exacqvision-vms-software/#comments Mon, 25 Aug 2014 09:30:29 +0000 http://www.securitynewsdesk.com/?p=45740 Designed to unify access control, Intevo seamlessly integrates the Kantech EntraPass software with exacqVision VMS software into a single solution.

The post Kantech Releases Intevo with exacqVision VMS Software appeared first on Security News.

]]>

exacqVision VMS SoftwareThe Intevo integrated security platform provides seamless integration of access control, video and intrusion

HEATHROW, UK – 22nd August, 2014 –– Kantech, part of the Security Products business unit of Tyco (NYSE: TYC), the world’s largest pure-play fire protection and security company, announces the release of the Intevo integrated security platform which now includes the latest version of the exacqVision video management system (VMS) software.

Designed to unify access control, IP video and intrusion for small to medium size businesses, Intevo seamlessly integrates the Kantech EntraPass software with exacqVision VMS software into a single solution. Intevo also includes support for DSC PowerSeries and other alarm panel integrations, giving users plug-and-play capability.

“With the move to the Exacq software, Intevo brings the powerful and intuitive features of the exacqVision VMS, such as faster and more intuitive video searching capabilities, to customers as part of an easy to deploy, integrated security platform,” said Rafael Schrijvers, Product Marketing Manager, EMEA, Tyco Security Products.

The exacqVision software features SpeedSearch, where video frames automatically populate on the screen upon conducting a search and advance as the timeline cursor is moved. Users can also begin an investigation whilst video is still downloading, providing faster access to the necessary evidence, particularly for low bandwidth connections.

Intevo is optimised for the use of American Dynamics Illustra Series HD cameras — supporting up to 32 IP cameras per system. Using the exacqVision software, Intevo supports over 2,000 models of the industry’s leading IP camera including fisheye/panoramic models with client-side dewarping.

The Intevo platform is preloaded with the latest version of Kantech’s EntraPass Corporate Edition security management software, which supports the EntraPass Web remote user platform and the EntraPass Go mobile application right out of the box. EntraPass allows customers to view, manage and play back video linked to access control events as well as perform everyday access control functions such as locking and unlocking doors.

The Intevo platform is available through Kantech’s distribution channels. For more information on the Kantech product line, please visit www.kantech.com.

The post Kantech Releases Intevo with exacqVision VMS Software appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/25/kantech-releases-intevo-exacqvision-vms-software/feed/ 0
Savvy Specifiers Switch to SMARTair http://www.securitynewsdesk.com/2014/08/24/savvy-specifiers-switch-to-smartair/ http://www.securitynewsdesk.com/2014/08/24/savvy-specifiers-switch-to-smartair/#comments Sun, 24 Aug 2014 09:30:27 +0000 http://www.securitynewsdesk.com/?p=45735 ASSA’s SMARTair wireless access control system is proving to be a popular choice for specfiers, providing cost effective door management.

The post Savvy Specifiers Switch to SMARTair appeared first on Security News.

]]>

ASSA ABLOY SMARTairASSA’s SMARTair™ wireless access control system is proving to be a popular choice for specfiers, providing cost effective door management without the associated complexity.

ASSA, part of ASSA ABLOY Security Solutions, is helping to centralise security systems through SMARTair™, allowing administrators to easily grant access or block user proximity credentials for lost or stolen cards etc.

SMARTair™ is fully scalable meeting access control requirements for any size of building, making it an ideal solution for the healthcare sector, heritage properties, education, multi-residential complexes and public buildings where a degree of access management is required.

ASSA has recently announced updates to the range with the introduction of the SMARTair™ Knob Cylinder Double reader version. The double reader version of the euro profile cylinder will allow the use of a RFID card or tag to both enter and exit a door. Available in all SMARTair™ reading technologies, the new version is easily integrated into existing SMARTair™ access control systems.

With no need for wiring, thanks to the various communication technologies available between the reader and administration software, the bolt-on SMARTair™ unit is supplied in a handy kit form and can easily be installed onto virtually any mechanical door.

Users can carry RFID cards, tags, or bracelets enabling one user credential to open as many or few SMARTair™ locks as required, providing easy access for employees as well as facilities managers.

Using standard batteries, rather than a mains power connection, SMARTair™ locks are quick to install and maintenance costs are kept to a minimum.

Nojmol Islam, New Technology Cateogory Manager for ASSA ABLOY Security Solutions, said: “SMARTair™ has always been a very popular product, it allows organisations of any size to extend, upgrade or replace their mechanical masterkey system, upgrading their security and management of access requirements, whilst keeping costs down.

“The system makes it easy to integrate every lock into one single, secure access system, even incorporating lifts, vending machines and lockers across multiple sites, a number of administrators have told us how much easier managing security has been for them, since installing SMARTair™. The double reader version adds an extra dimension of flexibility and security for uesrs and building owners.”

For further information about the SMARTair™ access control system, you can download our whitepaper ‘How can access control systems improve security and reduce costs?’.

For further information please visit or www.assaabloy.co.uk/securitysolutions” target=”_blank”>www.assaabloy.co.uk/securitysolutions
or tweet @ASSAABLOYUKLtd or like our Facebook page https://www.facebook.com/ASSAABLOYUK

The post Savvy Specifiers Switch to SMARTair appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/24/savvy-specifiers-switch-to-smartair/feed/ 0
Security Essen Goes Wireless with Cutting-Edge Innovations http://www.securitynewsdesk.com/2014/08/23/security-essen-goes-wireless-cutting-edge-innovations/ http://www.securitynewsdesk.com/2014/08/23/security-essen-goes-wireless-cutting-edge-innovations/#comments Sat, 23 Aug 2014 09:30:48 +0000 http://www.securitynewsdesk.com/?p=45731 Innovation in wireless access control is on display at Security Essen 2014. ASSA ABLOY showcases Aperio®, SMARTair™ and eCLIQ™ in Hall 11, Stand 304.

The post Security Essen Goes Wireless with Cutting-Edge Innovations appeared first on Security News.

]]>

assa abloy securiy essenInnovation in wireless access control is on display at Security Essen 2014, thanks to ASSA ABLOY. The global leader in door opening solutions showcases Aperio®, SMARTair™ and eCLIQ™ in Hall 11, Stand 304.

According to a recent survey by ASSA ABLOY and ifsecglobal.com, almost 80% of security managers say reducing energy consumption is important for their business. Here ASSA ABLOY´s Aperio® wireless access control delivers big savings, because Aperio® locks are powered by standard batteries, rather than an always-on mains connection.

“At a time when electricity prices are rising and sustainability is high on the global agenda, energy efficiency should be a key consideration when upgrading to any electronic access control solution. Aperio® both minimizes installation and maintenance costs and shrinks life-cycle costs and energy consumption,” says Chris Bone, Vice President Access Control Solutions at ASSA ABLOY EMEA.

The Aperio® range now features battery-powered locks, cylinders, and escutcheons for online or offline integration. It includes the new Aperio® L100 lock with PINpad, which offers optimum protection for security doors, transmits door status information to the access control system, and provides multi-level authentication via a card reader and PINpad.

Security Essen also sees the launch of the next generation of Aperio® electronics. The new release delivers multiple innovative features—including faster communication speeds from hubs and locks to the access control system in real-time—without cutting the 2-year lifetime of lock batteries.

Also according to the recent ASSA ABLOY survey, ease of integration with existing access control systems is among the most common motives for businesses switching to wireless. Security Essen 2014 attendees can see live Aperio® integrations running on the floor at multiple ASSA ABLOY partner OEM stands, including Siemens, Nedap, Axis, Datasec, and Keyflex among others.

ASSA ABLOY are also showcasing the latest innovations by SMARTair™ from KESO, an affordable, out-the-box wireless access control system designed for small premises. SMARTair™ enabled organizations can secure and manage up to 30 doors in a wireless access control system via update-on-card.

Locksmiths looking to switch from traditional mechanical key systems to wireless access control can join the SMARTair™ Genesis program. On joining, each locksmith receives a SMARTair™ access control system complete with a training package to help them sell, install, and maintain the latest in wireless access control from KESO.

The new IKON eCLIQ™ system with battery-powered keys and electronic wireless cylinders is also on display. IKON eCLIQ™ cylinders can be fitted to doors without making any extra alterations, and are maintenance-free for up to 200,000 operating cycles.

Thanks to a newly developed, pioneering chip generation with 128bit AES encryption, eCLIQ™ offers a very high security standard, accelerated communication speeds, and improved energy management, which reduces overheads considerably. Power is supplied from an easy-to-replace standard battery in the key, which is waterproof as per IP67.

To see all the latest technologies from ASSA ABLOY—including Aperio®, SMARTair™ and eCLIQ™—visit Security Essen 2014, Hall 11, Stand 304.

The post Security Essen Goes Wireless with Cutting-Edge Innovations appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/23/security-essen-goes-wireless-cutting-edge-innovations/feed/ 0
COP Security Announces New Nexus IP Surveillance Range http://www.securitynewsdesk.com/2014/08/22/cop-security-announces-new-nexus-ip-surveillance-range/ http://www.securitynewsdesk.com/2014/08/22/cop-security-announces-new-nexus-ip-surveillance-range/#comments Fri, 22 Aug 2014 12:57:57 +0000 http://www.securitynewsdesk.com/?p=45726 Professional trade only CCTV security products distributor COP Security, has announced the release of ‘Nexus’, a brand new range of IP cameras and NVRs.

The post COP Security Announces New Nexus IP Surveillance Range appeared first on Security News.

]]>

nexus ip camerasComplimenting their popular range of analogue and HD-SDI CCTV products, professional trade only CCTV security products distributor COP Security, has announced the release of ‘Nexus’, a brand new range of IP cameras and NVRs.

Reinforcing COP’s position as one of the UK and Europe’s leading CCTV distributors, the Nexus IP camera and NVR range offers products suitable for easy installation by those familiar with IP and those new to the technology.

Offering Power over Ethernet (PoE), up to 3 Megapixel digital imaging and large storage capability, the high-performance Nexus IP camera range delivers installation flexibility with true ‘Plug and Play’ connectivity. Ensuring compatibility and interoperability between products (regardless of manufacturer), all COP Nexus IP products have been designed to be compliant to ONVIF, the open global standard for the interface of IP-based physical security products.

Whether the requirement is for an IR mini dome, vandal resistant dome, IR vandal resistant dome, internal dome or IR bullet camera, each model in the Nexus IP range offers exceptional image quality, in addition to dual streaming and Wide Dynamic Range (WDR). All Nexus IP cameras offer a 1.3 or 3 Megapixel options and a large range of lens sizes, including motorised versions controlled via an NVR. The entire range is also equipped with day/night imaging with IR cut, digital WDR and IP66 weatherproof housing. Higher specification Nexus IP cameras include features such as alarms, microphone input and micro SD card support to afford direct backup in the event that a network becomes unstable.

Alongside the range of static IP cameras, COP will also be introducing two new high specification Nexus IP IR PTZ domes. Both PTZ domes feature 2 Megapixel capabilities and offer a 20x optical zoom lens (+16x digital). They also come as standard with powerful IR LED illuminators capable of reaching up to 150m at full power, whilst the top of the range dome also offers an auto tracking feature and wiper.

Supporting the range of IP cameras, COP are releasing a range of seven Nexus NVRs. Utilising WD Purple hard drives for the ultimate in surveillance recording, the choice of 4 to 256-channel Nexus NVRs feature a stack of high-performance features. These include, PoE with ‘Plug and Play’ setup, Smart Search, PC/Mac compatibility, range of smartphone/tablet apps, and for ease of installation, all NVRs are supplied with Central Management (CMS) software included as standard.

Gareth Rhodes, COP’s Sales & Marketing Team Leader says: “COP has achieved significant growth over the past 12 months so this is the perfect time to build on that success with the launch of the Nexus IP range. We are offering everything required for an IP installation and as usual it will be backed by our extensive warranty and support package.”

Details of the new Nexus IP camera and NVR range can be found in COP’s new ‘Autumn 2014 Pricelist’, alongside their entire line-up of analogue and HD-SDI CCTV products.

The post COP Security Announces New Nexus IP Surveillance Range appeared first on Security News.

]]>
http://www.securitynewsdesk.com/2014/08/22/cop-security-announces-new-nexus-ip-surveillance-range/feed/ 1