Home Articles posted by a&s Adria (Page 218)

Embracing and Leading Change In the Access Control Infrastructure

Organisations often avoid or delay change due to concerns about budget and the impact on productivity and workflow. This can be especially dangerous, however,in the access control infrastructure, where a combination of technology obsolescence and escalating security threats can quickly cripple an organization’s ability to protect its people, facilities and data assets.It is far more effective to be proactive, rather than reactive, about change. This requires building an infrastructure that presumes and prepares for ongoing change to support evolving access control needs, and enables the organisation to preserve investments in its current infrastructure as it moves to new technologies and capabilities.

By: John Fenske, Vice President of Product Marketing Identity and Access Management with HID Global

There are many reasons to embark on this path, including upgrading inadequate security, and enhancing investment value and user convenience with a platform that supports multiple applications on smartcards or, in the future, smartphones.The ability to embrace the positive aspects of change requires an access control platform that can meet today’s requirements with the highest levels of security, convenience and interoperability, while enabling organisations to adopt future capabilities without disrupting the ongoing business operations.

Legacy security solutions can’t deliver this future, because they often use proprietary technology that is static. This makes them easy targets for attack, and precludes their evolution beyond current abilities and security levels. Organisations should pursue solutions that are dynamic and adaptable to the changing needs of their organisation and the best practices in the industry.

Benefits of High-Frequency

Contactless Smart Cards

In contrast with legacy solutions, the latest high-frequency contactless smart card solutions are built for interoperability, as part of a larger identity ecosystem that is significantly more dynamic. These solutions also ensure that security is independent of hardware and media, making it much easier for organisationsto evolve their infrastructure to support tomorrow’s needs. Today’s solutions also enable smart cards to be portable to smartphones so that organisationswill have the option to use smart cards, mobile devices, or both within their PACS.

For instance, HID Global’siCLASS SE platform, powered by Seos, use a new Secure Identity Object (SIO) data model that represents many forms of identity information on any device that has been enabled to work within the secure boundary and central identitymanagement ecosystem of the company’s Trusted Identity Platform (TIP). Any piece of data can be supported, including data for access control, cashless payments, biometrics, PC logon and many other applications. The combination of TIP and SIOs not only improves security, but delivers the flexibility to adapt to future requirements, such as adding new applications to an ID card. Additionally, iCLASSSeos credentials can be carried inside smartphones in a managed access environment, delivering a more hassle-free experience for users, who can carry the credentials for many access control applications on a device they rarely lose or forget.

The latest solutions minimize disruption during migration through the use of multi-technology smart cards and readers that leveragethese extensible and adaptable platforms.Another advance is the availability of encoders that enable organisations to encode and instantly issue cards using a single device. Multi-technology encoders make it easier for organisations to migrate from current technologies to the security, adaptability and portability of new high-frequency contactless smart card platforms.

In the case of HID Global’siCLASS SE platform, an encoder is available that provides an entirely open solution for encoding multiple credential technologies, including both Genuine HID® and third-party credentials, so that users can upgrade their existing card populations for use with iCLASS SE platform readers. For maximum interoperability, the encoder solution supports Seos, iCLASS SE, standard iCLASS®, MIFARE® Classic and MIFARE DESFire® EV1, as well as 125 MHz HID Prox® for encoding Prox credentials, and for migrating from HID Prox® to high frequency technologies. Users can seamlessly and easily migrate from one technology to another by simply extracting access control data from an existing card and writing it to the new credential, without having to manually input data or being encumbered by encoding details. For even higher security, users can “wrap” their access control data within an SIO and then write it back to the same card. Based on open architecture, the encoder enables SIOs to be added to the full range of supported cards, including MIFARE and DESFire credentials.

With this type of forward-looking solution in place, organisations can achieve the highest possible security now, along with the flexibility to adapt to future requirements.

Future-Proofing Secure Issuance

In addition to an organisation’s foundational access control card-and-reader platform, it is also important to consider current secure issuance requirements with an eye for tomorrow. Today’s printers, card materials and software incorporate critical visual and logical technologies so that organisations can implement multi-layered validation. There are a number of available hardware choices, including monochrome direct-to-card (DTC) solutions and high definition printing (HDP) retransfer technology for contactless or contact smart cards. There are also high-throughput solutions that optimise performance and productivity. Today’s desktop card printer/encoder products also give organisations a single solution that can deliver the high-volume reliability and advanced credentialing features of large centralised printers, as well as the lower cost and smaller footprint required for the distributed printing model.

Secure validation is another important consideration. Most ID card issuance systems simply compare the person presenting credentials with identifying data that is displayed on the card. This two-dimensional identifying data may be a simple photo ID or sophisticated elements such as higher-resolution images, or it might be a laser-engraved permanent personalization attribute that makes forgery and alteration virtually impossible. Smart card chips, magnetic stripes and other digital components add an important third dimension of security. With expanded data storage, cards also can include biometric and other attributes to further enhance validation.

Another element to consider is speed and convenience. Printers with built-in programmers/encoders combine what previously were multiple processes into a single in-line card personalization step, significantly boosting issuance speed, convenience and efficiency. Users simply submit a card into a desktop printer equipped with an internal smart card encoder to personalize the card. This not only speeds issuance but also eliminates the risk of waste as a result of human error during manual entry. Opting for field-upgradable units enables organisations that already own a card printer to add an encoder in the field so they can leverage smart card benefits well into the future.

Transition to a New Platform

When is a good time to start the transition? There are many possible entry points from which to begin the migration process, including:

  • Merger or acquisition: Mergers and acquisitions often involve rebranding and/or the merging of disparate administrative and other systems, technologies and processes. Usually at some point in the process, the organization will need to issue new credentials. With the cost of new technology being competitive with legacy systems, this would be a perfect time to migrate to a more secure, sophisticated and capable system.
  • Standardise on a single card: Due to rapid growth, decentralised administration systems and/or multiple physical locations, an organisation may end up with several different access control systems. Since new technology offers the ability to issue or change credentials remotely, it’s now possible to integrate access control into one system that is centrally managed. Standardising all locations and employees on one system can increase security and improve resource management. Going a step further to mobile access control delivers the benefits of over-the-air remote provisioning and management of secure identity credentials.
  • Facility consolidation: If a company is moving or adding a building, new credentials will have to be issued for that location. This is an ideal time to look at access control for the entire organisation. It may be time to standardise all locations into one system.
  • Re-issuanceprocess: As new employees join, many organisations manage costs by purchasing additional cards that work with their old technology. Some organisations may also need to change their cards due to a new brand image or logo,at which point they can upgrade to newer technology.
  • New card applications: Organisations that want to add new applications such as time and attendance, secure print management systems, or cashless vending functions will need to issue some type of associated card to users. They can migrate to a contactless smart card that combines access control with these other functions, enabling employees to carry a single card for many functions. Administration of these functions is centralised into one efficient and cost-effective system. Organisations also can seamlessly add logical access control for network log-on to create a fully interoperable, multi-layered security solution across company networks, systems and facilities. In the future, they can migrate to the convenience, flexibility and security of carrying digital keys and credentials on smartphones and other devices.
  • Risk management improvement: Either due to insurance requirements or to improve risk-management costs by reducing liabilities, moving from an outdated system to a current one can dramatically improve the security in an organisation.
  • Changes in security requirements: As a result of new legislation or regulatory requirements, an organisation may be required to increase its security. Similarly, if a company acquires a new client that requires a high level of security, it may need improved access control. A new building tenant may also trigger the need for greater building or campus security, either to protect the parent organisation or to comply with the tenant’s requirements. They also might want to add new visual security technologies to prevent counterfeiting.
  • Security event: The reality is that sometimes it takes an unexpected event or security breach to move an organisation to make the investment in a new access control system. Ideally, an organisation should migrate before there is a problem, especially if the system is still low frequency, which can be easily cloned.

There is significant value that can be derived from shifting the traditional way of thinking about change, and looking at it as a leadership opportunity rather than something initiated in response to an adverse event. With the right approach, users can easily and inexpensively expand and upgrade their systems to meet changing needs while taking advantage of new technologies. By using dynamic rather than static technologies, security becomes independent of hardware and media, and the infrastructure can evolve beyond current abilities with the adaptability to combat continuously changing threats.Making the right technology decisions today will also help organisations meet new requirements with the confidence that they will be able to preserve investments in their existing infrastructure.

What’s so good about open standards in Access Control? An industry round-table responds

London, July 2018 — As solutions proliferate in the access control market, interoperability has never been a more pressing topic. A recent industry report* finds: “91% [of professional respondents to a survey] agree integrating security systems with each other and with other building technology has become noticeably more important in the last five years.”

Agreed standards are one powerful integration tool. Among the most important lock standards is the OSS Standard Offline (OSS–SO) from the Open Security Standards Association. Each lock manufacturer has its own approach to writing and reading cards, but customers installing offline locks from brands that subscribe to the OSS–SO are guaranteed interoperability**. With the OSS–SO, offline locks from different manufacturers read the same access rights from a card and interpret them in the same way.

We spoke to a round-table of manufacturers and integrators about the standard’s importance — and its future.

Frederik Hamburg, Chairman of the Open Standards Security Association

What are the benefits of open standards for manufacturers and end-users of access control technology?

Customers see huge benefits of an open standard like the OSS Standard Offline. Open platform development dramatically cuts a customer’s dependence on a single supplier, leaving them free to choose the best device for the job. Open standards offer more frequent opportunities to tender projects, because you are freed from compatibility concerns. Ultimately, that can be a significant cost advantage.

There’s plenty of evidence, too, that open standards are generally more secure than proprietary solutions.

For manufacturers, membership of the OSS gives them a seat at the table when it comes to designing the standard’s specification. All participating manufacturers are able to optimise development costs and by adhering to pre-agreed standards, time-to-market for new devices is reduced.

Mattias Weiß, Product Manager Aperio® at ASSA ABLOY EMEA

Why did you choose to get involved in driving the OSS Standard Offline forward?

We were formerly using the SOAA standard, but decided together with Nedap, primion, dorma+Kaba Group, Deister, ACS and others to found the OSS Association and use our combined industry leadership position to drive open standards like the OSS Standard Offline. We are already working with colleagues to take industry open standards beyond offline components, and into more areas of this exciting, fast-growing market.

Which ASSA ABLOY solutions are compatible with the new standard?

The OSS Standard Offline was implemented into the Aperio® firmware platform. In this way, we ensure all battery-powered Aperio® access control products — including cylinders, escutcheons and handles — support this functionality across the EMEA region now, and in the future.

What do you consider the major benefits of the new standard for facility and security managers?

Interoperability is critically important for any end-user investing in new or upgraded access control. They need to plan for eventualities they may not even see yet, and open standards allow them to do that. Ending reliance on a single, proprietary solution makes installed access control more flexible. You can add a new building, for example, and bring its access control into the existing system seamlessly.

Customers increasingly understand these advantages. In “The Wireless Access Control Report 2018”*, a majority of security professionals polled say it is “very important” (58%) that access control support open standards like the OSS Standard Offline in order to be flexible and future-proofed. A huge majority (91%) said it was at least “somewhat important”.

The future is open.

Ruben Brinkman, Alliance Manager at Nedap Security Management

Which Nedap OSS Standard Offline solutions are currently available?

The AEOS platform adheres to all the latest OSS–SO standards, meaning all current (and future) offline locks and updaters that also adhere to these standards seamlessly communicate with the Nedap system. That’s the beauty of it. Organizations secured by AEOS are therefore very flexible in choosing their offline lock solutions.

Thinking about your major new installation at Hospital Maria Middelares, in Belgium, what benefits did choosing OSS–SO devices bring to the project?

Within the premises of the new AZ Maria Middelares Hospital, 700 doors were equipped with battery-powered offline Aperio® locks and connected to the Nedap access control system. As one of the founders of the OSS Association, Nedap’s security platform AEOS allows for seamless integration with other OSS–SO solutions such as Aperio® wireless access control. The joint solution between ASSA ABLOY and Nedap has not only secured Maria Middelares, but the scalability and cost-effectiveness of it has also made the hospital future-proof and ready to grow.

Ray Phillips, Managing Director at ACS Ltd.

From an integration point of view, how does your business and your customers benefit from adopting the OSS Standard Offline?

As the manufacturer of an access control system that incorporates both software and hardware elements, we find an increasing amount of our development resource is consumed by adding to and updating third-party integrations. The business benefit to us is clear: OSS Standard Offline has meant our dev team can concentrate on enhancing our solution, instead of playing catch-up with third-party APIs that only benefit a small number of customers. The business benefit to our customers is that we can offer increased choice and the protection of a non-proprietary, open standards–based solution.

What integration plans do you have for devices that meet the new standard?

None! This is the main attraction of open standards. When new compatible locking products become available, there should be little or no work for us to do, save for some validation testing and documentation.

One example is the recently launched H100 Aperio® wireless door handle from ASSA ABLOY. The entire development lifecycle of this product happened post-OSS but, because the firmware complies with the open standard, our systems support it already.

You can learn more about the Open Security Standards Association and the OSS–SO at www.oss-association.com.

Visit campaigns.assaabloyopeningsolutions.eu/aperio to learn more about cost saving with wireless access control.

Is it time to upgrade your access control system?

When is it ever a good time to upgrade your access control solution? Many organisations follow the policy of ‘if it isn’t broken, don’t fix it’ but this can be a risky situation in a world where technology and threats are changing so rapidly. The use of older, legacy access control systems exposes an organisation, a building, a server room, a computer to the possibility of unauthorised access and the consequences of this. But why should users upgrade?

Jaroslav Barton – Product Marketing Director, Physical Access Control, EMEA – HID Global

Data Privacy

One of the biggest drivers for updating legacy access control systems is the need for enhanced levels of data privacy. This could come about through the on-boarding of a client that requires high levels of security, new legislation being brought in for specific industries, or even new building tenants. The driver remains the same: data or the building itself is in some way exposed to or at risk and needs added protection. Yesterday’s technology is no longer sufficient for today’s access control and identity management challenges.

In The Access Control Report 2016: Legacy Infrastructure and Motivations for Upgrading, 44% of respondents stated they were planning on upgrading their access control solution. This is a strong indicator that end-users are acknowledging that the risk to organisations is evolving, and the need to protect their physical assets and consequently data assets is important.  It would take a security breach that exposed a flaw in the current system for 92% of respondents to consider changing their current access control system, but not beforehand.

On any site at any one time, in addition to regular employees, there are also individuals and groups that have access to various parts of a site for short periods of time. These could be visitors, maintenance teams or contractors. In the report, 75% of respondents have third-party members on site on a regular basis. Integrated visitor management solutions in modern access control systems significantly improve the distribution and use of temporary credentials but also safeguard various parts of the site to unwarranted access. Access control solutions, such as mobile access, make it easier for facilities and securities managers to track who is accessing what parts of the site to ensure nobody is in an area they shouldn’t be.

User Convenience

The continual development in consumer technology has spilled over into the business world with devices now being used for work and in our personal lives. Bring Your Own Device, mobiles and wearables are all common features of today’s office environment. Organisations can utilise this growing level of secure technologies that employees are carrying around with them on a daily basis. Instead of having several key cards or fobs that have a high chance of being left behind, users can now utilise, smartphones or smart devices, their closest pieces of technology for secure access control as well. Mobile access control is increasingly coming into the market and the benefits this brings are numerous.

Understanding the requirements from building occupants is an important step before undertaking an access control update. The report noted that 48% of respondents would like an easy-to-use access control system, with 32% requesting multiple levels of access depending on authority required. This added security element is clearly an important function, and one that can be easily designated with more modern technologies. Having mobile credentials that allows for multiple access levels, for instance, saves the users from having multiple access control devices that could lead to confusion or possibly misplacement. The survey also noted that 29% of respondents would like future-proof technology. This can easily be provided through mobile access solutions which grant users modern techniques for access control, but also a single credential for multiple access devices. Utilising smartphones are a very straightforward solution that solves three of the top concerns of employees looking for updated access control.

One of the largest stumbling blocks to updating an enterprise’s access control system is the perceived disruption that the upgrade will cause. 69% of respondents in the report believe that upgrading to a new access control system would be disruptive to their daily business, while 55% cite cost as the biggest misgiving about upgrading. Despite the perceived disruption, many sites can be retrofitted using existing access control hardware behind the scenes, with minimal replacements needed to upgrade technologies. Not having to start from scratch also helps to significantly lower the costs, making it a more cost efficient venture with minimal disruption.

Flexibility

A new access control solution must be flexible so users don’t just see it as an ‘expensive way of opening doors’. Open Supervised Device Protocol (0SDP) for secure communication between field devices in a physical access control system has gained increased importance allowing for standardization, more flexibility and freedom of choice for security managers.

Flexibility also supports multiple applications for managing not only physical access but also logical access applications, like computers and software logins. Additional access control systems, such as secure print management, require an associated card issued to users. This represents a prime opportunity for organisations to consolidate to a single access control device, such as a contactless wearable or smartphone that combines access control with other functions.

By exploiting modern technology, such as mobile devices and wearables, users are afforded the opportunity to simplify their access control devices: one device, with one credential providing access to multiple areas and requirements. It was found that nearly a quarter of respondents wanted to manage multiple credentials across a single device. With mobile access solutions, multiple credentials are rolled into one and stored on one device. The facilities or security manager is capable of controlling access and distributing credentials to those with the right security clearance. Technology such as the latest high frequency access control systems ensure security is independent of hardware and media. This makes it easier for organisation to support functionality and higher levels of data privacy.

Conclusion

Although, there are clearly several barriers to the adoption of more sophisticated access control systems, organisations are placing increasing importance to safeguard their physical assets as it supports in providing protection to their IT infrastructure as well.  This is mainly due to the belief that current systems in place are adequate enough until they are proven to have failed and the fact that a replacement system is perceived to be an unnecessary expense. Despite the technological advancements, users are still content with cards and fobs, regardless of the lack of sophisticated security and encryption contained in these when compared with mobile access control solutions. The change to a more sophisticated system is likely to come from employees themselves, rather than decision makers. Existing access control solutions are also easy to upgrade which provide minimal disruption and cost-efficient site retrofits. Facilities and security managers need to question whether it is more expensive to replace an outdated system, or recover from a site or data breach.

Find out more about the key benefits of upgrading to new, more dynamic technologies that will help you to consider the right approach for your organisation –  Three Reasons to Upgrade Your Access Control Technology.

Solving the security dilemma of shared data centres

Who is accessing your company’s most sensitive data? Where? When? And if someone without authorisation did, how would you know?
Some of the world’s best-known companies have succumbed to data breaches that proved expensive—in terms of both cost and reputation. The focus, usually, is on a digital attack. Passwords and anti-hacking procedures come under scrutiny, particularly in a world where so much of our information lives in the cloud.

But there is another way that company data can fall into unauthorised hands: someone could walk right up to your server and access it physically, with equally disruptive results.

The risks increase when companies use shared data centres — or ”colocation” — which has become an increasingly popular option. According to 451 Research KnowledgeBase, the global colocation market could grow from $23 billion in 2014 to $37 billion by 2017. All our “big data” has to go somewhere, and shared data centres provide a cost-effective solution, even for information of the most sensitive kind.

Data centres have stringent security procedures, of course. But is it wise to fully entrust your valuable data, sensitive customer information, to a third party? Can you be certain that a third party’s security procedures meet your legal compliance commitments, to the European Data Protection Directive, the Sarbanes–Oxley Act, the PCI Data Security Standard and other personal and commercial data protection regulations?

And do you even know who you share server space with? It could be a direct competitor.

Disruption of physical security and potential breach as a result may not even be deliberate or malicious. Server rooms have a steady flow of authorised traffic: cleaners, maintenance staff, repair technicians and more. Unfortunately, accidents happen.

For these reasons, data centre security management needs to be high on any company’s agenda. As high as cyber-security. In an interview with datacenterknowledge.com, Jason Cook, CTO of BT Americas, suggested: “Physical security is still one of the easiest ways to get access to data. With all of the sophistication in current technology, what’s the point, if someone can walk in and open the door?”

IBM estimates the average cost of a single data breach at $3.79 million. Fortunately, technologies that can help secure servers—even in colocation data centres—cost a lot less than that.

A high-security mechanical lock might seem like a solution. But a mechanical system can be expensive to run, due to the costs of secure key management and replacement when keys go missing. Once issued, there’s no way to change a physical key’s user rights. A mechanical-key audit trail—who had access to your servers, when, for how long—will probably not be enough to conduct a proper investigation in the event of any type of breach. Even high-security perimeter doors and CCTV-powered server room security will not suffice, if your server rack has an old-fashioned mechanical lock.

Server cabinet locks are the last line of defence against a physical breach, yet mechanical keys are still a common sight in data centres. This is becoming increasingly unsatisfactory, especially when that server could hold the key to your business success.

One solution is ASSA ABLOY’s Aperio® KS100 Server Cabinet Lock. The KS100 adds real-time access control capabilities to a server cabinet, drawer or rack. It brings server racks into an existing third-party access control system, without breaking the bank. KS100 electronic locks work with smartcards using all standard RFID technologies, including iCLASS® from HID, Seos™, MIFARE® and DESFire.

Installation is quick and easy, with power coming via a Power over Ethernet (PoE) connection. Once installed, KS100 locks integrate with your access control system and communicate wirelessly through an Aperio® Communication Hub. With online integration, when any of your smart credentials is presented to the lock, access decisions are communicated from and recorded by the system wirelessly.

With Aperio®, lost cabinet keys no longer compromise server security: smart credentials are simply de-authorised and a valid replacement can be quickly re-issued. The current status of any lock can be revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 invaluable for incident investigation. With Aperio® server cabinet locks, businesses have the freedom to manage access to their own equipment and data, even in colocation data centres.

Do you know exactly who last had access to your servers, and when? Install Aperio®, and next time your data manager asks, the answer is yes.

For more on how Aperio® can secure a data centre, see www.assaabloy.co.uk/securedata.

The Aperio H100 wireless handle awarded Intersec’s Access Control Product of the Year

A new addition to the range of Aperio® wireless access control devices has scooped a major award in the Middle East region. The Aperio® H100 electronic handle is Intersec’s Access Control Product of the Year for 2018.

The new Aperio® H100 packs the power and flexibility of wireless access control into one cleverly designed door handle. With easy retrofitting to almost any interior door, comprehensive RFID compatibility and simple integration with third-party access systems, the new H100 handle makes it cost-effective to extend your access control to more doors.

“Aperio® is a global technology from ASSA ABLOY and the new H100’s stylish and robust design has proven a perfect fit for high-traffic office and facility doors,” says Murtaza Husaini, ASSA ABLOY Business Development & Marketing Manager for the Middle East. “It’s also easy to retrofit, with no drilling or wiring needed. You still use the existing mechanical cylinder — the handle simply adds powerful access control functionality without wires.”

The Aperio® H100 can work within an online access control system or offline. A standard battery fits inside the slim handle, ensuring a minimal footprint and a discreet look to gel with any contemporary door style.

The new Aperio® H100 extends a range of Aperio® wireless access control devices that already includes online and offline cylinders (C100/C900) and escutcheons (E100/E900); an online and offline security lock (L100/L900); and a wireless lock for server racks and cabinets (KS100), to integrate them with the same access control system as doors.

To discover more about how you can extend your access control system with award-winning Aperio® wireless access control, download a free brochure at https://campaigns.assaabloyopeningsolutions.eu/aperio.

For more information please contact:

Thomas Schulz

EMEA Marketing and Communications Director

Digital and Access Solutions

Phone: +49 (0) 30 8106 2970

E-mail: thomas.schulz@assaabloy.com

About ASSA ABLOY

ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience. The Group has 47,500 employees and annual sales of EUR 7.9 billion.

The success of Wireless Access Control — voices from market players and security professionals

London, October 2018 — Following publication of “The Wireless Access Control Report 2018”, we hear from leading security professionals in a range of industries about how they see the market, and the future, for wireless access control.

Why demand for wireless continues to grow

Figures from the 2018 edition of “The Wireless Access Control Report” show continued strong growth for wireless vs. wired solutions. Why do you think security and facility managers are “cutting the wires” more and more?

Russell Wagstaff, Director for Commercial Access Solutions, ASSA ABLOY EMEA: “Among the many advantages of wireless discussed in the report, I would highlight two. Firstly, removing the need to cable every door makes it much easier and more economical to bring many more doors into your access system. So, wireless technology can upgrade your building’s security in an instant. Secondly, the energy-efficiency of wireless doors delivers significant cost savings. The standard batteries locks use have long lives, and only fully ‘power up’ when there’s a credential to read. Wired doors are generally connected to the mains 24/7.”

The new report forecasts growth in wireless locks for “non-door” applications (lockers, servers, and so on) to outgrow those for doors. Why is wireless technology especially suited to these “non-doors”?

RW: “Partly it’s about convenience. The more applications that can be secured and unlocked with a single credential, the better for site users. Facility managers benefit from the wider scope of their access system, which gives them more control. In addition, because these ‘non-door’ devices are wireless, access control can easily extend outdoors. Padlocks for gates, machinery locks, storage lockers. With the right lock, these can all be secured within the same access control system as your front door.”

Wireless access control for small to medium-sized businesses

What specific problem did SMARTair® solve at ULab?

Enrique Burgos, Director at ULab: “In addition to regular daily traffic [of around 100 staff], weekly traffic can almost multiply by ten if an event is held. We needed an access control system as flexible and convenient as SMARTair®.”

One of Spain’s newest co-working spaces, ULab’s vision incorporated the latest in security, accessibility and design to create a 21st-century business centre. Wire-free SMARTair® delivered real-time access control to accommodate both regular daily traffic and busy one-off events.

Wireless access control in large or complex businesses

How does the flexible access management offered by CLIQ® impact on your day-to-day security?

Christophe Nublat, Head of Study & Works Division, Eau de Valence, France: “All the energy is in the key. There is no power supply to the lock, and therefore very little maintenance. Also electronic and mechanical cylinders are managed by the same key.”

The municipal water authority of Valence supplies safe drinking water to 65,000 local residents. It also manages 4 boreholes, a storage unit and 300km of water pipes. With CLIQ® key-based access control, audit trails for every lock, key and padlock are available on demand, so monitoring contractor visits is easy. Weekly mandatory key revalidation provides another layer of security. Five of their keys are equipped with CLIQ® Remote technology, so supervisors can also update access rights on the move, via Bluetooth.

Integrating wireless access control

The new report picks out “integration” as a growing trend — with an overwhelming majority of survey respondents saying integrated systems are “important” or “very important” at a site. How does integration with ASSA ABLOY Aperio® wireless locks benefit AXIS Entry Manager customers?

Stephanie Hensler, Business Development Director at Axis Communications: “Axis completed integration of the Aperio® RS485 hub with our AXIS A1001 Door Controller. AXIS Entry Manager is our web-based access control system, built into the A1001 Door Controller. Because most users value real-time access, we chose to integrate with an Aperio® online hub. Users appreciate how intuitive it is to manage this integrated solution.”

How wireless access control saves companies money

Can switching to Aperio® wireless access control deliver concrete budget benefits?

Magnus Svensson, Infrastructure Manager at Lund University: “Aperio® has proven to be very cost effective. We have been able to reduce the time we spend on user management and system administration radically.”

After 20 years, Lund University’s Faculty of Law was looking to upgrade its access control system. Aperio® battery-powered escutcheons and cylinders with card readers are now fully integrated with Pacom’s Unison system. Aperio® locks work with the existing MIFARE® smartcards, so there was no need for 42,000 students and 7,500 staff to return their smart-cards for reprogramming, or even to visit update readers to reactivate their permissions. Every door or card is still managed centrally from a single admin interface.

You can download a FREE copy of “The Wireless Access Control Report 2018” now at https://campaigns.assaabloyopeningsolutions.eu/wacreport2018

Thermal cameras: Growing demand thaws prices

Thermal imaging has faced many setbacks in the security market, namely with price point. However, with technological advances and demand on the rise, the price of thermal imaging equipment has come down, allowing for wider adoption of this valuable piece of technology. Source: www.asmag.com

Unit shipment growth in the uncooled thermal security camera market is forecast to grow 25 % over the next 5 years, according the latest report from IHS. This growth is close to twice the rate of the CCTV and video surveillance market. Therefore, what has spurred this growth in unit shipment? Several factors including new technology, demand, and competition have caused this downshift in price, resulting in an upshift in growth in the thermal market.

Driving Down Prices

In the past, one of the biggest challenges faced by the thermal imaging industry was the perception that thermal products were too expensive for commercial use. This “sticker shock”, as noted by Jeremy Hickman, Business Development Manager, Thermal Imaging at Pelco by Schneider Electric, resulted in limited adoption in the commercial market. While there still may be some truth to the price concern, the thermal industry has worked hard to prove that thermal cameras are not only more effective in security applications, but also more cost effective in the long run.

Tech Advancements Lower Production Costs

In order to reduce selling prices, costs must first be reduced at the source. As noted by Hickman, “ongoing R&D, some funded by the industry and some funded by governments, have brought higher yields and lower production costs through improvements in material science and sensor manufacturing techniques.”

Several technological advancements are helping bring thermal prices down. “At the sensor level, for a quarter VGA we have a pixel pitch reduction that helps the size of the existing infrared camera chip today,” said Emmanuel Bercier, Market Group Leader of Ulis, a subsidiary of Sofradir and GE Equity that specializes in the design and manufacture of high quality infrared imaging sensors for thermography, security and surveillance, automotive, and military applications. By reducing the pixel pitch, also known as dot pitch or phosphor pitch, “just at the level of the sensor, there is a cost reduction thanks to new technology in the sensor.”

At the optics level, key thermal industry players noted the use of molded lenses also as a driver helping to lower overall thermal camera prices, which drops roughly 10 percent every year according to Bercier. By using chalcongenide glass instead of expensive crystalline materials like germanium, zinc selenide, or zinc sulfide — commonly used materials for thermal imaging lenses — costly grinding and polishing can be avoided. Since chalcongenide glass can be molded instead of cut by a machine, these lenses can be manufactured in high volume with a highly repeatable, consistent performance that is much more cost-effective. Additionally, molding yields more reliable lenses, in terms of quality consistency, versus machined lenses that can result in variations in surface figure, which can cause variations in performance from lens to lens.

Increasing Demand, Decreasing Price

The dramatic increase in volumes of sensors produced has helped lower prices, according to Bill Klink, VP of Security and Surveillance at Flir Systems. “With BMW and Audi both using Flir sensors in select models, the total volume of sensors produced has increased dramatically,” said Klink. “This increase in efficiency has enabled us to produce more and more affordable finished cameras to the security market space, which, in turn, has generated increased demand and awareness of the technology as a viable and more affordable 24/7 imaging solution.”

In addition to automotive, higher volumes from procurements in other market areas, such as military and firefighting, have “resulted in higher operating yields and greater amortization of manufacturing overhead costs across a great number of units,” added Hickman.

A market analyst at IHS attributes the decline in thermal imaging prices to increased competition, in addition to new technology developments. This sentiment is echoed by industry players. “There is certainly much more intense competition both at the supplier level of the thermal cores and the camera level, where everybody is trying to get more and more market share by coming up with attractive prices,” said John Romanowich, CEO and founder of SightLogix.

Thermal cameras: Thermal technology faces market challenges

Even though the price of thermal equipment is coming down, that does not mean that the thermal market is suddenly seeing a massive surge in growth. As a market that has been dealing with the “thermal is too expensive” argument, industry players are actively doing what they can to dissuade consumers of this thermal myth.

Education, Education, Education

Lack of education and awareness is one of the main challenges being faced by the thermal security market. Bercier explained that the security industry is not educated enough on the benefits of thermal for security applications. Thermal industry players want the security market to understanding that thermal is the most effective 24/7 video detection solution available. Many have pointed out that detection range and the ability to record the temperature of objects detected are major benefits of thermal imaging for security.

One of the main advantages that thermal cameras have over visible cameras is the ability to detect under all types of weather conditions, be it snow, rain, fog, etc., as well as harsh lighting conditions such as blinding sunlight or pitch black nights. This makes thermal cameras the best solution for 24/7 security surveillance.

The thermal industry as a whole is working hard to educate the security market on these benefits. Through participation in exhibitions, showcases, seminars, etc. around the world, thermal industry players are doing what they can to spread awareness. An increasing number of thermal players are showcasing products in exhibitions worldwide. These exhibitions not only provide a platform for the thermal industry to get out information regarding the benefits of thermal imaging, but it to also give consumers a chance to see for themselves just how thermal imaging works.

Highlighting how a thermal solution can be more economical than a traditional visible solution is another point thermal players are trying to educate the market on. Infrastructure costs are a major consideration of any outdoor video security solution, whether it is thermal, IP, or analog. While it may be true that thermal cameras cost a lot more than the average HD IP camera, those in the thermal industry are quick to point out that a thermal solution can actually be the more affordable long-term solution. When taking into account that longer-range thermal cameras cover more area, thereby eliminating the number of poles and cameras needed, as well as reduce the need for lighting and power infrastructures, thermal cameras prove to not only be affordable, but practical as well.

Spoiled by HD

Unfortunately, in an age where megapixel cameras have made its way into mobile phones, consumers have not only gotten used to a certain level of clarity when it comes to images, they expect it. Consumers want high definition — they want to be able to see every strand of hair and every bead of sweat. Hence, when it comes to thermal imaging, the question of why a consumer would want to take a black and white image that’s much lower in resolution, as compared to HD images, is raised. “People out there today are confusing security with surveillance,” said Romanowich. “If you care about security, then having the absolute best image sometimes is not as relevant as having a really good image all the time.” This lack of differentiation between security and surveillance is a challenge being faced by the thermal imaging community when it comes time to choose between a thermal imaging solution and a standard visible camera solution.

As the thermal imaging industry tackles market misconceptions, lower prices at both the sensor and camera level will help attract more markets to this highly effective technology. Growing awareness and education regarding the benefits of thermal imaging for security applications will hopefully not only dispel the myths about thermal prices and application restrictions, but also allow for thermal imaging to flourish into even more commercial sectors and beyond.

Product Innovation and Quality Control Create Hikvision Accomplishment

Based on the latest 2013 survey on worldwide major professional security buyers by a&s, Chinese products are ready to prove their worth with improved quality and service. Hikvision, a total solutions provider in video surveillance, headquartered in China, is starting to gain global recognition amongst worldwide buyers to shape the new image of Chinese manufacturing.

Product Innovation and quality control has laid the foundation for Hikvision’s accomplishment. In the recent world market report for CCTV and video surveillance equipment from IMS research (an IHS company), Hikvision was ranked as the number one supplier under the category of “CCTV and Video Surveillance Equipment”, with 8-percent market share in 2012. In the category of “Security Cameras”, Hikvision was also ranked third with a 9.7-percent world market share, while maintaining first place in “DVR suppliers” for four consecutive years in 2012.

Hikvision’s first auto-focus camera module was launched in early 2000 and marked a major milestone for the company. Thereafter, Hikvision has gradually transformed into a total solutions provider in video surveillance, said Yangzhong Hu, President of Hikvision Digital Technology. “Hikvision’s sales revenue in surveillance cameras has also started to double and even triple since then.”

Positioning itself in the middle- to high-end market sectors, Keen Yao, International Marketing Director said “As a worldwide provider of video surveillance products and solutions, Hikvision’s main competitiveness are product innovation and quality control, which support Hikvision in providing quality products plus reasonable prices. Both factors also allow the company to achieve good gross margin continuously since its establishment.”

@3: Product Innovation

To optimize new product development, as well as maintain product innovation and technological leadership, Hikvision employs a matrix management structure for its R&D department, which allows it to succeed in cross-department project cooperation between its resource teams and product teams. Hikvision resource team is divided by several key technologies – hardware, image processing, video/audio codec, compression, networking, streaming media, FPGA applications, video data storage, embedded applications, software structure, and others. At Hikvision, a specialized project team, composed from groups of resource teams for technical input and the corresponding product teams, is usually formed to develop a new product.

Hikvision process control has also achieved international standards. Since 2009, the company has introduced Capability Maturity Model Integration (CMMI), a process improvement training and certification program and service administered and marketed by the Software Engineering Institute (SEI) at Carnegie Mellon University, to greatly improve its process management of product research and development.

Besides, Hikvision also follows the innovated “integrated supply chain” concept for market-oriented product development. Hikvision invites suppliers (manufacturing partners) and clients for joint product evaluation and collaboration, and asks their suggestions on how to make the products meet international standards and how to optimize the structure/system, ensuring Hikvision’s products meet the real market demand.

@3: Quality Control

At Hikvision, the quality control is a complete system from R&D design, manufacturing to service, to provide further assurance for customers — Design Quality Assurance (DQA) and Manufacturing Quality Assurance (MQA). DQA is under the R&D product testing department mainly for product reliability verification. Hikvision has around 350 engineers on the R&D team, which accounts for over 15 percent of the team, who are responsible for product testing. The product testing group is in charge of software tests, hardware tests, and reliability tests, which all play an important role in product development and guaranteeing product quality.

MQA is divided into four categories: raw materials quality control, productive process, tests, and outgoing quality control. It is achieved by Hikvision’s state-of-the-art production facilities, manufacturing equipment, and resources. As an example of this point, Hikvision introduced Siemens’ fully-automatic SMT equipment for production lines, ensuring world-class technical capability and purchased a SAP system from Germany to avoid any problems in materials preparation cycles which may lead to downtime of the production line.

Apart from delivering products with the highest reliability through various tests, Hikvision also has strict compliance to international safety and emission standards. All Hikvision products are certified by UL/CUL, CE, FCC, Australian C-tick, RoHS, WEEE, etc.

@3: Shaping the Future

Hikvision has successfully transformed to become a trustworthy and quality-guaranteed solutions provider. With 12 regional branch offices in other parts of the world to offer customers in-depth local services, Hikvision has shaped the new image of Chinese manufacturers and the company’s future development in the global market can be highly anticipated.

CMOS and CCD – Small Differences Along the Way from Light to a Signal

How everything began

Historically, CCD (Charged Coupled Device) sensors have existed much longer than CMOS sensors, that is to say, for more than 40 years. Due to constant improvement and optimization over the years, CCD sensors today stand for excellent image quality. In 2009, the American scientists Willard Boyle and George E. Smith were awarded the Nobel Prize for Physics for the invention of the CCD sensor. Originally developed in 1969 for the storage of data, the potential of the Charge Coupled Device as a light sensitive apparatus was soon realized. By 1975, the first sensors with a resolution sufficient for television cameras appeared. However, it took more than 10 years before the process technology was mature enough to begin production of CMOS (Complementary Metal Oxide Semiconductor) sensors. In the mid-nineties, the first commercially successful CMOS sensors appeared on the market. Source: www.asmag.com

The more sensitive the better

CMOS sensors are based on the same physical principles as CCD sensors. They convert incoming photons into electrons by means of a photo effect. As a result of their sensor structure, the maximum sensitivity of CMOS sensors is in the red spectral region (650 – 700 nm). CCD sensors, not least because of the numerous innovations during their longer technological history, have a maximum at about 550 nm – exactly where the human eye is most sensitive. For a variety of technical reasons, CMOS sensors in the past were considerably less efficient in converting the incoming light to an electrical signal. The photosensitive area within each pixel in a CMOS sensor occupied only a fractional part of the total pixel area. The rest of the pixel area was populated by the individual readout electronics associated with each photosensitive area. The structure of CCD sensors is different. In CCDs, the electronics for the evaluation of the charges collected by the sensor surface is located outside of the chip, so almost the entire chip surface is available for photosensitive structures.

Over the last few years, design improvements have increased the size of the light sensitive area of CMOS sensors to near the level of CCD sensors. One example of such an improvement is the micro-lens array that is now applied to the CMOS chip. The lens array collects the light impinging on each pixel area in the CCD sensor and focuses it on the available light sensitive region within the pixel.

The price of individuality

One set of electronics for all pixels – this phrase regarding processing capability is valid for CCD sensors and at first sight, sounds rather like a trade-off. But in fact, it is an advantage for image quality. Because there is one common electronic path for a large fraction, if not for all, of the pixels in a CCD chip, all analog pixel signals are evaluated and processed in the same way and they are all converted to digital signals in the same way.

CMOS chips carry individual processing electronics on board each pixel and are different in this respect. This characteristic means that they can be read out faster and that the image area can be accessed in more flexible ways. However, there are tiny variations within the individual electronic structures used to process each pixel, and this means that signal offset can differ from pixel to pixel within a CMOS sensor, although the amplification slopes are almost identical. Variations between the offset values of the pixels in a CMOS sensor are typically ten times larger than those of CCD sensors.

Taken together, this offset variation represents a difficulty with respect to the sensitivity threshold of the sensor. This is especially true when a weak signal that is slightly greater than the background noise must be detected. In this situation, a CMOS sensor looks worse than a CCD sensor. By definition, this threshold is reached when the signal from the sensor is as high as the noise (i.e., the signal-to-noise ratio or SNR equals one). A technical term that quantitatively describes this characteristic is known as the Fixed Pattern Noise (FPN). CMOS sensors exhibit a higher FPN than CCD sensors.

Less sensitivity, but lots of space for electrons CMOS sensors, however, do score much better in another area – they can provide a higher full well capacity. The full well capacity represents the maximum number of electrons that an individual pixel can hold. On CCD sensors, this number is often artificially limited to a reduced saturation capacity to avoid certain technical problems. The ratio of the saturation capacity (full well capacity, respectively) to the sensitivity threshold determines the sensor’s dynamic range. In comparison to a CCD sensor, a CMOS sensor wins with regard to the saturation capacity what it loses when it comes to low-light sensitivity. As a result, CMOS and CCD sensors have almost the same level of dynamic range. Certain procedures can be used to modify the characteristic response curve of a sensor so that it matches what a human eye perceives. This is especially true for CMOS sensors, and therefore a logarithmic behavior with a dynamic range of more than 100 dB can be achieved. This modification differentiates dark regions within an image more precisely than bright regions and should be applied with care.

The saturation capacity is related to a second important parameter of an imaging device, the maximum signal-tonoise ratio. This parameter quantifies the ratio of a signal associated with light under optimum conditions to pure sensor noise without any light exposure. It can be shown, that in principle, the maximum signal-to-noise ratio equals the square root of the saturation capacity. Thus, the CMOS sensor excels with respect to the maximum signal-to-noise ratio, but it needs more light to do so.

As a simplified rule-of-thumb, one can say that CCD sensors are the preferred choice for applications with little light and CMOS sensors are a good alternative when there is a lot of light.

It can become too bright for a sensor

If especially bright light is present, users must sometimes struggle with other effects. When a CCD pixel is overexposed to light, the pixels can generate an excess of electrons that can migrate into neighboring pixels. In this situation, very bright image structures seem to extend into the darker structures, an effect known as “blooming”. CMOS sensors don’t see the migration effect and are not prone to blooming like that.

After a CCD sensor has been exposed to very bright light, the charge transportation process can cause bright stripes to appear in the image. The bright structures within the image appear as white smeared lines. This effect is known “smearing” and can be seen, for example, in images acquired at night when a car approaches the camera with its headlights on. As with blooming, CMOS sensors have an advantage compared to CCD sensors because they do not exhibit smearing.

Small bad habits and how they are moderated

For technical and cost reasons, quite a large number of commercially available cameras with CMOS sensors implement a rolling shutter. With this image acquisition method, all of the lines in a sensor are not read out of the sensor at a single instant in time. Instead, there is a time lag between the start of readout for each line in the frame.

In cameras with a global shutter, exposure is started for all pixels at the same time and is stopped for all pixels at the same time. In cameras with a rolling shutter, exposure is started sequentially line by line and is ended sequentially line by line. With rolling shutter technology artifacts can occur, particularly with rapid moving objects (unwanted, for instance, in intelligent transportation systems). These days, other CMOS sensor technical inadequacies can easily be compensated for within the camera. This includes non-uniformities that appear during the conversion of charges to gray values (ADC inequality) or that result from variations in the electrical properties of the numerous individual readout structures used in a CMOS sensor. Defective pixels can be corrected by interpolation in the camera. In addition to correcting the inadequacies already mentioned for CMOS sensors, the electronics in today’s cameras can also correct for the irregularities exhibited by CCD sensors.

The agony of choice

CMOS sensors have a shorter history than CCD sensors, but they are now technically mature and even represent the best choice for some applications. Even novelties such as backside illuminated sensor technology (BSI), which was first introduced for CCD sensors, are currently entering the CMOS world. With this technology, the photosensitive area in each pixel is increased because no electronics are obscuring the pixel area.

But when you must choose the optimum solution of a specific task, many of the aspects mentioned in this article will come into play. In the end, the constraints and the details of your application should determine which sensor technology represents the best alternative.

Dahua Introduces Smart Thermal Network Camera Series

HANGZHOU, CHINA/January 7, 2016 — Dahua Technology, a world-leading manufacturer of video surveillance products headquartered in Hangzhou, China, introduces the smart thermal camera series to provide superior image quality and advanced features for perimeter, electric industry, manufacture security applications. The camera series is designed to find heat sources, able to offer highly detailed images and an extensive feature set.

Dahua new smart thermal network camera family includes thermal hybrid PTZ camera, hybrid speed dome camera, thermal bullet camera and thermal dome camera, all equipped with a variety of smart functions. The smart thermal cameras adopted top-notch sensor that is capable of detecting tiny differences in temperature. Those camera series can achieve higher detection accuracy and it is able to function in complete darkness and adverse weather conditions. Furthermore, the cameras combined intelligence, efficiency and high performance such as smart detection, smart analyze, smart perception, smart tracking and smart control.

The smart thermal network cameras can precisely determine the object temperature and the temperature distribution even on small and fast moving objects. Those cameras are excellent for detecting water leak behind a wall, a person hidden in the bushes at night, or identify passengers with a fever passing through a checkpoint.

Dahua thermal hybrid network PTZ camera is a professional combination of a visual camera with integrated max 40x optical zoom lens and a thermal camera, perfectly synchronized in pan and tilt movements. The network camera can capture images in full scale without the need to step back or frame the shot. The thermal camera is for whether night-vision missions or precise thermographic surveys. The special lens focuses the infrared light emitted by all of the objects in view. It can deliver several independent H.264 streams for different quality needs and bandwidth constraints simultaneously.

Dahua also provides software and accessories include smart PSS, NVR and DMSS to work together to meet the individual requirements of transportation industry, energy industry, border and

coastal surveillance, etc and other special applications.

Dahua smart thermal network camera family

Thermal Hybrid PTZ Camera PT8320/8620(-T)

  • Thermal resolution:640*512 or 336*256
  • Lens optional:35/60/100mm
  • Visible camera support 40X optical zoom
  • Support IVS
  • IP66-rated

Thermal Hybrid Dome Camera SD8320/8620(-T)

  • Thermal resolution:640*512 or 336*256
  • Lens optional:25/35/50mm
  • Visible camera support 30X optical zoom
  • Support IVS
  • IP66-rated

Thermal Bullet Camera BF5300/5600(-T)

  • Thermal resolution:640*512 or 336*256
  • Lens optional:7/13/19/35mm
  • Tri-mode output:IP/HDCVI/Analog
  • Support IVS
  • IP67-rated

Thermal Dome Camera SD5300/SD5600(-T)

  • Thermal resolution:640*512 or 336*256
  • Lens optional:13/19mm
  • Tri-mode output:IP/HDCVI/Analog
  • Support IVS
  • IP66-rated