brings opportunity - southcommmedia.cygnus.com/files/base/siw/document/2016/07/sd… ·  ·...

17
TRENDS TECHNOLOGY A CCESS CONTROL & July/August Supplement to Locksmith Ledger International, Security Dealer & Integrator, Security Technology Executive www.LocksmithLedger.com www.SecurityInfoWatch.com 2016 Disruption brings Opportunity • Electromechanical solutions for integrators • Upselling access control • Product showcase

Upload: voque

Post on 07-May-2018

214 views

Category:

Documents


1 download

TRANSCRIPT

TRENDS TECHNOLOGY

ACCESS CONTROL

&

July/August

Supplement to Locksmith Ledger International, Security Dealer & Integrator, Security Technology Executive

www.LocksmithLedger.comwww.SecurityInfoWatch.com

2016

Disruption brings

Opportunity• Electromechanical

solutions for integrators

• Upselling access control

• Product showcase

THE ONE BOX SOLUTIONFOR CYLINDRICAL & DEADLATCHES

All parts shown are included.

4200CC-10B-32D TWO COLORS IN ONE MODEL

VISIT: TRINEONLINE.COM

UL1034

Burglary

rated

BHMA

Grade 1 Low CurrentDraw

As the industry’s largest electrical and mechanical door hardware distributor, we also maintain the largest inventory. So no matter what you’re looking for, we’re sure to have exactly what you need, precisely when you need it.

That’s just one more reason industry pros choose Security Lock Distributors. Again and again.

INFORMED. IN STOCK. IN DEPTH.seclock.com | 800-847-5625

1.75 MILLION SKUS IN STOCK NOW.

Request information: www.SecurityInfoWatch.com/10215009 Request information: www.SecurityInfoWatch.com/10215438

S-4 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

Learn more at www.ooaccess.com/REAL

Open Options distributes Authentic

Mercury and is a Platinum

Elite Partner.

Always Open. Always Real.Open Options has been developing customer-centric software built around the Authentic Mercury open

hardware platform since 1998. From the beginning we have been dedicated to providing our customers a choice in access control solutions.

We are the best at what we do - open platform access control. Our software, DNA Fusion, interfaces with leading security technologies, giving you a best-of-breed security solution based on your unique needs.

We pride ourselves on our excellent customer service and open business culture. When you do business with Open Options, you will work with real people that care about your experience. You can always count

on being treated with respect and will always know where you stand.

Become a partner today.

Know where you stand. Know where you stand.

Visit SouthComm Security Media on the Web at www.SecurityInfoWatch.com

ACCESS CONTROL TRENDS & TECHNOLOGY 2016

SOUTHCOMM BUSINESS MEDIA at 125 S. Wile Rd., Suite 300, Arlington Heights, IL.60005. Phone: 847-454-2700, Fax: (847) 454-2759 • (847) 454-2700 and is a supplement to Locksmith Ledger, Security Dealer & Integrator and Security Technology Executive magazines.

PUBLISHER Group Publisher ...................................................................................Nancy Levenson-Brokamp

[email protected]

EDITORIALEditorial Director ........................................................................................................ Steve LaskyEditor, Security Dealer & Integrator ....................................................................... Paul RothmanEditor, Locksmith Ledger ..........................................................................................Gale JohnsonEditor, SecurityInfoWatch.com ....................................................................................Joel Griffin

ART & PRODUCTIONArt Director ............................................................................................................... Kayla BurgerProduction Manager ............................................................................................Jane Pothlanski

SALES CONTACTS East Coast Sales, SD&I, STE, SIW.com .................................................................Janice Welch

[email protected]

West Coast Sales, SD&I, STE, SIW.com .............................................................Bobbie Ferraro [email protected]

Midwest Sales, SD&I, STE, SIW.com, Locksmith Ledger, LocksmithLedger.com ..............................................................Brian Lowy

[email protected]

Display/Classified Sales, SD&I, STE, SIW.com, SD&I, STE, SIW.com, Locksmith Ledger, LocksmithLedger.com .........................................................Kristy Dziukala

[email protected]

List Rental ........................................................................................................ Elizabeth [email protected]

SUBSCRIPTIONS CUSTOMER SERVICE Toll-Free (877) 382-9187; Local (847) 559-7598 Email: [email protected]

REPRINTS To purchase article reprints please contact Brett Petillo at Wright’s Media: 877-652-5295 ext. 118 or [email protected]

SOUTHCOMM BUSINESS MEDIA CEO.............................................................................................................................. Chris FerrellCFO ...............................................................................................................................Ed TearmanCOO ..........................................................................................................................Blair JohnsonEVP Public Safety & Security..................................................................................... Scott BiedaVP Events, Public Safety & Security ...........................................................................Ed NicholsVP Production Operations ..........................................................................................Curt PordesVP Audience Development .............................................................................. Sharon Haberkorn

Advertiser's index

COVER STORY

8 Disruption Brings OpportunityBy Gale Johnson

The shifting lock technology landscape has brought disruption to the industry

FEATURES

6 Game Changers in Access ControlBy Steve Lasky

No one doubts that the face of access control has drastically evolved over the last three decades and in fact, is still morphing into new directions

14 Electromechanical Solutions for Controlled Access Doorsby Cameron Sharpe, CPP

Integrators must understand their options when it comes to choosing technologies that fit and meet code

20 Upselling Access Controlby Minu Youngkin

Successful projects require end user vision and integrator flexibility

NEW PRODUCTS

27 The Latest Access Control Technologies

Request information: www.SecurityInfoWatch.com/10214555

Company Name Page # Request more info atAccess Hardware Supply S-29 www.securityinfowatch.com/10722906

Aiphone Communications S-7 www.securityinfowatch.com/10212724

ASSA ABLOY S-23 www.securityinfowatch.com/10212899

BEA Inc. S-12 www.securityinfowatch.com/10297217

Camden Door Controls S-22 www.securityinfowatch.com/10213140

Continental Access S-25 www.securityinfowatch.com/10213301

DKS DoorKing Systems S-11 www.securityinfowatch.com/10213482

Dortronics Systems, Inc. S-28 www.securityinfowatch.com/10213494

DSX Access Control Systems S-31 www.securityinfowatch.com/10214208

Genetec Inc. S-17 www.securityinfowatch.com/10213771

JLM Wholesale S-30 www.securityinfowatch.com/10214128

Kaba ADS Americas S-15 www.securityinfowatch.com/10214145

Marks USA S-21 www.securityinfowatch.com/10214311

Mercury Security Corp S-13 www.securityinfowatch.com/10214361

Open Options S-5 www.securityinfowatch.com/10214555

SALTO Systems, Inc S-19 www.securityinfowatch.com/10225529

SDC-Security Door Controls S-32 www.securityinfowatch.com/10214991

Secured Cities S-27 www.securityinfowatch.com/10752984

Security Lock Distributors S-2 www.securityinfowatch.com/10215009

Trine Access S-3 www.securityinfowatch.com/10215438

TRENDS TECHNOLOGY

ACCESS CONTROL

&

July/August2016

S-6 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

No one doubts that the face of access control has drastically evolved over the last three decades and in fact, is still morphing into new direc-tions. The advent of the intelligent microchip, wireless, smartphones and the convergence of

network-centric technologies has changed the approach and implementation of access control forever.

So I asked technology expert and systems integrator Carey Boethel, President/CEO of Securadyne Systems, what he considered key game-changers in the development of today’s access control systems.

“The proliferation of wireless locks has been the biggest game changer in access control over the past five years. Wireless and WiFi locks have significantly expanded our addressable marketplace in two major ways. First, by lower-ing the price point of access controlled openings, end custom-ers can now secure more doors, which of course drive higher volume. Second, new applications have emerged that previ-ously were cost prohibitive. For example, in higher education, if you go back seven to eight years, electronic access control was limited to classroom and administrative office buildings, athletic facilities and other common areas,” says Boethel

On-campus housing was not part of the integrator’s typical scope of work. Today it is where most of the activity is occur-ring—all due to wireless technology at the lockset. The same could be said for multi-family housing. We estimate that the number of electronically controlled access controlled open-ings will grow exponentially over the next three to five years as a result of wireless technologies.” he adds.

So what are the trends and customer needs he sees influ-encing the evolution of physical access control in the next 10 years – easy, smartphones.

“I think everyone agrees that the smartphone will soon become the standard media for identity management and credentialing, which will give rise to new subscription-based offerings by product manufacturers and service providers. Established protocols like NFC, Bluetooth, and Wi-Fi are enabling this shift, as is the cloud. But the smartphone will also play an increasingly important role in systems monitor-ing and administration. Today we are seeing smartphones routinely used for remote locking and unlocking of doors, system-wide threat level escalation, and employee muster-ing,” Boethel says.

“Aside from the phone, modularization and prefabrication of access controlled openings will soon change the way in which electronic access control is procured, implemented and maintained. Today’s integrator spends much of his time in the field, on the job site, interfacing and connecting

disparate devices. For example, an integrator’s work at a typical card reader controlled door might include modifying the door to accept an electronic lock, adding or replacing a hinge for wire transfer, mounting a card reader adjacent to the door and fishing wire through the wall, modifications to the door and frame to accept a door position switch, and installation of a junction box above the door for wire aggre-gation and/or local logic control,” continues Boethel. “In the not-too-distant future, door assemblies will be designed, built, shipped and installed as one, all-encompassing solu-tion. As a result, as much as 25 percent of the integrator’s work at the door will be reduced or eliminated. This trend is enabled by virtual building design practices, technolo-gies like BIM, virtual reality, and software applications like Autodesk’s Revit.”

What does Brad Wilson, President of RFI Communica-tions & Security in San Jose, California, think the game-changers have been?

“Wi-Fi, wireless technologies that bring intelligence at the door, frictionless access control appliances and mobile cre-dentials; these are the game-changers. With a number of ret-rofits projects, today coupled with the increased capabilities of the firmware, the growth of Wi-Fi /NFC / BLE is evident. The high cost associated with wall space in IDFs and sus-tainability is also driving this trend. In addition, Data on Card is being deployed in many mixed-use facilities. This is very popular in Silicon Valley where many work, play, and habitat in large campus environments. We will continue to also see wearables /smart devices grow in popularity,” says Wilson.

He also sees a growing trend in Building Management Systems because of the emergence of web services and open protocols.

“The thirst for subscription services (RMR$) will drive product management and of course cloud offerings. Cyber will continue to be a hot topic, not just when, but how to recover. One area that is emerging is AI, behavioral analysis will be installed in VMS applications, as well access control. Scalable Big Data has many applications, but price prohibi-tive for the core market today. The ability to provide pro-ser-

vices to extract the critical business data will also be a place where certain integra-tor can live,” concludes Wilson.

Steve Lasky is editorial director of SouthComm Security Media and conference director of Secured Cities. www.securedcities.com

Game-Changers in Access Control

by Steve Lasky

For over 60 years, Aiphone has solidified its position as one of the most esteemed providers of communication and intercom systems around the world. In addition to being known for their innovative and quality products, Aiphone provides some of the best customer support in the industry. With representatives across North America, online QuikSpec assistance, and Technical Sales Support, Aiphone can answer any question from “What is the best system for my application?” to “Did I wire my system correctly?”

Aiphone Solutions include:

• Emergency Towers to provide security for exterior spaces

• Built-in HID® stations for use with card reader systems

• Remote mobility for centralizing security services

• Visitor identification to protect entrances

• Internal communication to quickly reach other locations

www.aiphone.com

Variety of Products. Unlimited Solutions.

SECURITY INTERCOMS

Request information: www.SecurityInfoWatch.com/10212724

S-8 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST JULY/AUGUST Access Control TRENDS AND TECHNOLOGY 2016 S-9

A recent television pro-gram presented a seg-ment on driverless cars. It showed cars cruising down the highway and

safely maneuvering through traffic with no physical steering wheel, gas pedal or brake pedal contact by a human passenger. Car manufactur-ers are said to have plans in the near future to produce fleets of identical cars which will be ready and available on demand. The general public may no longer own cars but simply call for a driverless car whenever a need for travel arises. In the same broad-cast, a commentator interviewed TV host Jay Leno who compared cars of today with snowmobiles. According to Leno, the few remaining cars as we now know them will soon only be used during short periods of time and treated as a recreational item instead of a daily necessity.

Driverless vehicle systems and

parking lots full of identical cars wait-ing on demand are prime examples of disruptive technology which will affect a significant part of the world’s popula-tion. Occupations such as body and fender repair, insurance companies, car dealers and even locksmiths could all be affected. If all driverless cars can be summoned by a cell phone call, then what need are there for individual car keys or push button fobs?

Modern examples of disruptive tech-nology essentially began in the late 1800’s with inventions such as electric lights, gasoline engines, wireless radio waves and mass production. Each one of these advancements caused problems for existing occupations but also spawned many new opportunities by moving established businesses to change the type of goods or services they offered. Surely the kerosene lan-tern industry was affected when elec-tric lights took over the market

For most of the twentieth century,

the lock industry was unaffected by new technologies. Linus Yale famously invented a compact pin tumbler lock system in 1865 and remnants of that locking system still remain in use today. Persons involved in the lock-smith business during most of the twentieth century enjoyed a peace-ful and profitable business climate. Most lock inventions, such as key-in-knob locksets, high-security locks, or double-sided car keys constituted an improvement in existing lock designs rather than a game changer.

Almost every security product sold and serviced by locksmiths during the twentieth century was mechanical in nature. When a security product failed, a locksmith was the logical person to call. Mechanical products are relatively easy to disassemble and technicians with a mechanical aptitude and an ample amount of spe-cialized training enjoyed a profitable career as a locksmith.

The shifting lock technology landscape has brought disruption to the industry

by Gale Johnson

During the last thirty years, four inventions have not only changed many other industries but have also heavily affected the security industry. Those four inventions are the transis-tor, the computer, the cell phone, and the internet. A common theme in each of these innovations is newly found ways to use electronics. Each inven-tion by itself is not as important as how ways have been found to use the

devices together. A perfect example of how today’s technology can inte-grate into a secure solution is a cell phone using an internet connection to send signals to distant locksets or key fobs that are wirelessly controlling a secured vehicle or even a campus dorm door.

Since many innovations introduced in the security field during the last 20 years use a mixture of the inventions

mentioned above, it is difficult for manufacturers to develop proprietary products. Every company has the same opportunity to use these new technolo-gies. This may result in many versions of almost every new type of security product being available. As an example, card-operated access control systems are available from numerous companies and an overwhelming number of CCTV manufacturers displayed similar wares

Disruptive technologies are changing the security industry as we know it. Demand for the types of services formerly offered by locksmiths is slowly declining. Image Courtesy of BigStock.com

OpportunityDisruption

brings

S-10 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

Request information: www.SecurityInfoWatch.com/10213482

at the 2016 ISC convention in Las Vegas this past April. The same can be said for electric strikes, electronic standalone locksets and almost every other type of electronic security device.

As opposed to mechanical products, electronic products normally have few moving parts. An electronic product is usually either operational or dispos-able. The result is that some of the specialized training formerly required in the mechanical security field is no longer as important. Mechanical repair work has been replaced by simple replacement of an electronic prod-uct that may have failed. Labor time formerly required for physically disas-sembling and repairing a mechanical security product is being replaced by labor time required to trace electronic problems and replacing the failed part.

The evolution of mechanical security products to electronic security prod-ucts can be seen on many fronts. Less than 30 years ago every hotel room used a mechanical pin tumbler lock

cylinder. Locksmiths were regularly called for hotel lock or cylinder repairs. Now, hotel locks using card systems have almost completely replaced metal key systems. Hotel manage-ment has the convenience of being able to control access to every hotel room from a central location at the front desk, a task which mechanical systems cannot deliver.

Locksmiths specializing in automo-tive work has also been affected. Chevrolet made one of the first vehi-cles to use electronic security when the 1986 Corvettes had an electronic pellet mounted in the key head. Other car models soon followed. Today the majority of cars, trucks, and even some cycles contain electronic secu-rity. Wireless fobs lock and unlock the vehicle, completely eliminating the use of key and mechanical car locks.

Another interesting example of disruptive technology in our industry is the pay phone. Baby Boomers will remember when there was a pay

phone on every street corner, at every drug store, and at every filling sta-tion. Each pay phone had a coin box and a coin box lock. The advent of cell phones doomed pay phones to oblivion and also forced the end of pay phone lock production by at least one well-known lock manufacturer.

Standardization of technology has also forced change. Every lock com-pany once had their own lock case dimensions. As a locksmith, I became adept at mortising doors to accept replacement locks. Rebuilding door closers was another vertical market for locksmiths. Every door closer had different hole dimensions, and it was simple and profitable to rebuild exist-ing door closers. However, modern hardware now uses identical hole patterns and mortise cutouts. Own-ers can now just replace old hardware with a screwdriver, not requiring the expertise of a locksmith.

Mechanical locking systems will never disappear since there will always

The evolution from mechanical security products to electronic security products can be seen on many fronts. Less than 30 years ago every hotel room used a mechanical pin tumbler lock cylinder. Locksmiths were regularly called for hotel lock or cylinder repairs. Now, hotel locks using card systems have almost completely replaced metal key systems. Image Courtesy of BigStock.com

4 Easy Steps Makes Cellular Access Control

Child’s Play

Voice and Online Programming Over Cellular!

As Easy as Activating Your Smart Phone A sustainable wireless solution for connecting managers and users to telephone entry access control systems.

Four easy steps: 1. Install DKS Telephone Entry system.* 2. Register your software on doorking.com (DKS software included). 3. Activate account with credit card. 4. Begin programming on your PC, controlling access for tenants

and employees.

Child’s play! No trenches to dig, no wiring to run, no telephone lines or ethernet cable to maintain. It’s the total package: voice communication and programming over a 4G LTE cellular connection. See how easy it is: doorking.com/cellular

Member: AFA, DASMA, NAA, IDA, NOMMA, NPA, SIA, SSA, CANASA

Parking Control Access Control Telephone Entry Gate Operators

for more information doorking.com/cellular800-673-3299 [email protected]

* Voice & Data (programming) with DKS 1830 and Access Plus series. Voice only with DKS 1802, 1802-EPD, 1803, 1808, 1810, 1812.

S-12 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

Request information: www.SecurityInfoWatch.com/10214361

be some physical fastening connection between a door opening and a door. However, it is how the door is controlled which is evolving. Whether it is an auto-mobile door, a residential door or a com-mercial door, electronics has emerged as a dominant player with an increasing role in how locking systems function.

Census figures show that the coun-try’s population has grown by 22.5 percent since 1990, which should be directly related to an increased requirement for sales and service of security products. Yet the number of locksmiths in business has not kept up with the population increase. The security landscape has become a quilt of high and low-end residential technology solutions, high-tech com-mercial applications and advanced video and alarm monitoring devices that now complement traditional mechanical security technology and locksmith services.

Examples such as electronic

automotive and hotel locks are tech-nologies that have already transformed and are ubiquitous in their use. It is the bigger picture which we must be pre-pared for. Kwikset and Yale are both currently selling residential electronic locks that do not contain a backup lock cylinder. A speaker for Allegion at a recent industry meeting stated: “Key-less is the Future”. Is it possible that the locksmith shop of the future may not have a keyboard?

Disruptive technologies are changing the security industry as we know it. Demand for the types of services for-merly offered by locksmiths is slowly declining. If a locksmith decides to stay the course, success will probably be as a sub-contractor installer for a large systems integrator or an access control vendor. There are no indications that the amount of key-dependent lock busi-ness we once knew will ever return.

There are 124 million households and 18 million businesses in the

country and everyone is a possible sale for an upgraded electronic secu-rity solution. As a locksmith, if oppor-tunities to sell and service CCTV, multi-door access control and wire-less are not currently on your radar, the soon should be. Access control opens you up to jobs with higher price tags and recurring monthly revenue (RMR).

Remember, it was a local locksmith business that installed electronic secu-rity in the Trump Tower in New Jer-sey, as well as a local locksmith who installed electronic security throughout the Hancock Building in Chicago. With disruption comes opportunity, so embrace it. ■

Gale Johnson is the longtime editor-in-chief of Locksmith Ledger. He has more than six decades in the lock and security industry.

Request information: www.SecurityInfoWatch.com/10297217 ©2016 Mercury Security Corporation

This is the door to a civilized world.

Better make it Merc.

These doors secure more than a building, they secure the foundations of society. And when local, regional and national government agencies seek to safeguard critical operations, they rely on the Authentic Mercury open platform. Our trusted par tners are ready to help you realize true access control by combining best-in-class solutions for a powerful system that is customized for your organization. Because when security is a top priority, it is important to think beyond wireless door locks to achieve a solid, systemic solution. Learn more by downloading the white paper. It is essential reading for the fully informed security professional. www.mercury-security/wireless-or-not

Platinum Elite Partners Platinum Partners

S-14 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

Kaba Access & Data Systems Americas

800.849.8324

kaba-adsamericas.com

Secure the Burden of Proof—Get fit with Kaba.Kaba realizes that security and control are not enough —

Accountability is essential to the overall integrity of any security system. Every person, be they employee, visitor, supplier or customer, must be held accountable while in a secured and controlled environment.

The E-Plex® wireless enterprise access control system manages and monitors multiple access points across varying levels of authority from a central location. Detailed reporting includes audit trail, operator activity, user groups, schedules, users by door, and credential use — validating every event at every access point.

For total access control and undisputed accountability — Get fit with Kaba.

E-Plex 5700 dual credential electronic access control

Request information: www.SecurityInfoWatch.com/10214145

Take, for example, an ill-informed integrator who is exploring electro-mechanical retrofit options with a major access control prospect dur-ing the pre-bid process. The facil-

ity’s existing openings have a variety of door and hardware types, so as the discussions progress, this project (and many others that followed) became a painfully slow process of negotiated compromises. The integrator quickly discovers that if his team had the proper knowledge to recommend the appro-priate electromechanical device for each opening, they would possess a significant competitive edge.

On the flip side, meet the Architectural Hardware Consultant, who, in many circles, is one of the industry’s well-kept secrets . The AHC is an expert on door openings and the mechanical and electromechanical equip-ment that make them work and is certified by the Door Hardware Institute. This hardware specialist has an extensive working knowl-edge of frames, hinges, closers, exit devices, locks, magnets, strikes and fire codes. Know-ing how technology impacts overall design and myriad fire and building codes is crucial to a successful installation project.

Making Technology WorkIn many cases, direct replacement or retrofit electronic options are available for existing locks and exit devices, providing functional

and architectural continuity to the facility.The following is a brief overview of your pri-

mary electromechanical options, with links to OEMs. An excellent primer titled “Code Inspec-tor’s Handbook for Understanding Electric Locking Hardware” is available from Securitron.com .

Magnetic Locks have been the staple of the access control industry for years. Mag locks are extremely reliable, easy to specify, cost-effective, and can be applied just about any-where. Request to Exit (RQE, or REX) is fre-quently handled with a PIR and an egress but-ton, by a UL Listed switch in an exit device, or with a delayed egress option.

Shear lock versions have often been applied to double-swing doors. Since double–acting door closers don’t consistently align, many installers feel they can improve reliability with door stops, limiting travel to out-swing only.

Cylindrical locks are popular in much of North America and many parts of the world. Robust lever handles, Request to Exit (RQE) switches and Fail-Safe or Secure options have made these bored locks a popular solution. Cylindricals generally use a small solenoid or motor to position the internal locking lug. Since the lever handle manually operates the lock from the inside, no RQE is required for free exit. These are reliable and simple solutions for wood or metal doors that do not require a panic exit device. Most can be fire rated.

Electromechanical solutions for controlled access doorsIntegrators must understand their options when it comes to choosing technologies that fit and meet code

by Cameron Sharpe, CPP

Magnetic Lock

Cameron Sharpe, CPP worked in corporate marketing for Caterpillar and Honeywell. He operated Best Access Systems in New Jersey and in Phoenix from 1975-2001.

S-16 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

Nothing happened

today

In a perfect world, no one thinks about access control except you. The hundreds of people coming and going don’t think about you,

or what a good job you’re doing, or how they always manage to get seamlessly where they need to go. Because you chose

Synergis access control, it was another great day.

genetec.com/synergis

© 2

014

Gen

etec

. All

righ

ts r

eser

ved

. Gen

etec

and

Syn

ergi

s ar

e ei

ther

reg

iste

red

trad

emar

ks o

r tr

adem

arks

of

Gen

etec

.

Mortise locks perform the same basic functions but are mortised into the edge of the door. These mortise devices offer ¾” latch bolts for higher level fire ratings and offer a wide range of functions. Some electrified mortise locks can also now monitor latch bolt status, door position, and even auxiliary deadbolt engagement.

Exit Devices come in three basic

types but always allow immediate free egress (except in delayed egress applications). These Panic Bars were developed to allow the door to be pushed open freely under crisis conditions to meet hazard egress requirements. Electric latch retraction or electrified unlocking trim are avail-able in new or retrofit applications for access control systems.• The Rim mounted exit device uses

a latch to engage a simple surface

mounted strike on the edge of the door frame. A surface mounted elec-tric strike, an electrically unlocked

exterior handle, or electric latch retraction can release the Rim Exit device from the outside.• With the Mortise Exit device, an actual lock assembly is mor-tised into the door edge, and operated by the panic bar. When

locked, the Mortise Exit device can be opened from the outside by

electrified exterior trim, or electric latch retraction.

• Vertical Rod exit devices are the most complex of all. These top and bottom latching rods may be surface mounted, on the face of the door,

or concealed within the door to pre-vent damage. Top engagement only or three-point latching is sometimes necessary.Double door exits are commonly

applied in high-occupancy areas. These large-volume exits can have a variety of device configurations. Doors can be secured independently with vertical-rod exit devices on each individual door leaf. Alternately, a vertical rod device can be installed on one leaf and a mortise exit device on the other with an overhead door coordinator insuring proper closure. In many cases, a cen-ter mullion may be installed, allowing each leaf to be secured with a much simpler (and cheaper) Rim or Mortise

Exit device. Removable center mullions are quite popular in these applications, as they allow a wide opening for equip-ment access.

Since building codes dictate hazard egress options, it is prudent to have an experienced AHC review any proposed modifications. Far easier than having the “Authority Having Jurisdiction” (AHJ) demand a do-over.

Delayed egress options are avail-able for Magnetic Locks and

Exit devices. This application is strictly controlled by fire codes.

Special Applications• Retrofit: Electrically operated retrofit

options are now available for most existing mechanical locking devices. It is often simpler and faster to just replace existing hardware with a matching new electronically-operat-ed version. Most exit devices can be

Electrified Mortise Lock

Mortise Exit Device

Rim Exit Device

Electrified Cylindrical Lock

Vertical Rod Exit Device

Request information: www.SecurityInfoWatch.com/10213771

S-18 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

Request information: www.SecurityInfoWatch.com/10225529

electrified by replacing the outside operating trim, allowing the door to be opened by the external lever han-dle when electronically unlocked.

• Extreme Service: High-value sites, dangerous neighborhoods, and some military or research applications may require more extreme vandal or attack resistance measures. New York-based Securitech has developed highly van-dal resistant exterior electronic trim for many lock and exit device appli-cations, as well as extreme service multi-point locks. Sargent & Greenleaf is also well known within the govern-ment security circles.

• Solid Glass Doors always present a challenge for the Integrator. Out-swinging doors, using top mounted electric strikes or magnets tend to be reliable for after-hours security. Double swing doors are best secured manually, using an alternate route for after-hours access.

• Storefront Doors: A glass door with a narrow-stile aluminum frame is the overwhelming favorite retai l con -figuration. Touch Sense Bars, along with a top-mounted magnetic lock, have been popular for some time. In recent years, Adams-Rite and several others have developed exit device options with electric latch retrac -tion or electrified exterior trim. RQE options are included.

• Sliding Glass Doors present some interesting challenges. Electronic activation is a standard option, but the break-away panic - exit panels once opened, are often left unse-cured. In one case, these emer-gency panels were secured with a hook- bo l t . An af ter- hours emergency egress door with electrified exit device was then installed – with the enthusias-tic blessing of the Authority Having Jurisdiction.

• Frame Mounted devices can include: Locking solenoids, “Hi -Tower” frame mounted latch release from SDC, and Unlatching strikes from Secu-ritron. These can eliminate the need for a power transfer cord or hinge.

Power OptionsLow current draw has gained increased importance in recent years. In the early days, electric latch retrac-tion on exit devices required powerful solenoids. Twelve to 16 amp inrush was common. A marginal power sup-ply or inadequate wiring might work sometimes but often failed to sup-ply adequate current when binding occurred. Present day locks and exit devices often use small motors with extremely low current draw to retract the latch, or hold it open.

Corbin-Russwin and Sargent divi-sions of ASSA/ABLOY now supply electrified locks with power consump-tion as low as .3 watt. Securitron offers an “Inductive Coupling” power trans-fer, producing 250 mills at 24VDC. The Best Division of Stanley and Schlage division of Allegion have announced a number of low-current options and pre-wired quick connectors.

Power over Internet is becoming an increasing reality in many applica-tions. The implications for the Integra-tor are that many good things are hap-pening to make installations better, faster and cheaper.

Re-working fire rated doors: It is important to understand the differ-ence between panic exit and fire rating requirements. Panic bars (exit devices) allow unimpeded exit. A panic-exit device may or may not be listed for a fire rating.

Modifications to fire-rated open-ings are required to be done by certified installers, in accordance with specified procedures. The good news is that exterior doors are seldom fire-rated (unless in close proximity to another structure). In most cases, electronic access con-trols are only applied to fire-rated openings that separate containment zones within a given building. Where required, Cross-Door Raceway drill-ing tools and training are available from Security Door Controls (SDC), and from Lockmasters.

The good news is that you now have many elegant and reliable elec-tromechanical options that can give you a competitive edge. ■

High-Security Lock Assembly

Unlatching Electric Strike

WIRE-FREE ELECTRONIC LOCKING SOLUTIONS Electronic locks, peripherals and software, in one customizable wire-free access control platform.

SALTO SYSTEMS INC.Toll Free: 866.GO.SALTOEmail: [email protected]

Mobile access Electronic Locks

Electronic Cylinders

Management software

Wall readers & door controllers

XS4 Platform. Next-generation keyless access control.

Smart building – Integrate all your visitors’ and staff’s security needs in a single card.

Stand-alone electronic locks – Long battery life.

Audit trail – Door visited, time, access granted or rejected.

Cost effective – Say goodbye to mechanical keys and key replacement expense.

Control – Who can access what, where and when.

Lockdown – Essential function in emergency situations.

S-20 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

• Lifetime Warranted* Life Safety Lock Series for managed liability, accident prevention and security in behavioral & health care institutions (and correctional facilities)

• Ergonomic shape and construction restricts the attachment of lines, laces, etc.

• Unprecedented cylindrical, mortise styles, models & functions available, including electrified units, ideal for Buzz-in and man-trap applications, plus antimicrobial finishes

• Easy installation and retrofit ALL popular preps and door constructions

• Facility-Friendly & Longest Life: ANSI 156.2 Grade 1; UL 3-Hour Fire Rated

Also, Push/Pull Paddlesets - Superior Strength, Durability & Ease of Use• Exclusive cylindrical chassis (not tubular) for maximum durability over

3.1 million cycles - 3X the ANSI Grade 1 Rating (ANSI 156.2)

• Attractive Stainless Steel; Neatly retrofits over all existing trims

• Easiest Hands-Free Entry with shortened angle and less force required

Want Healthier Business in Hospitals?

Marks LifeSaver™ Lock Series Solutions have a Lifetime of Advantages for you and your healthcare clients

For more contact Marks USA at 1-800-526-0233 • [email protected] • www.marksusa.com

Lifesaver is a trademark of Marks USA/ Napco Security Technologies. Lifetime Warranty is a lifetime mechanical warranty, see full details.

Request information: www.SecurityInfoWatch.com/10214311

Electronic access control has become the de facto security solution for commercial facilities around the world. This has resulted in an unprecedented number of options to enhance security, which, unfortunately, can leave clients feeling over-

whelmed by the selection process. As a result, it’s more important than ever for security consultants to function as trusted advisors who can help their clients successfully navigate the difficult process of finding the right products

for their specific needs. Your expertise can play a critical role in helping customers understand the many factors that they need to consider, including facility age, credential management platform and protocols, budget, and long-term security strategy. However, it’s important to remem-ber that anyone can sell products, but if you want to build the trust necessary to cultivate long-term clients, your pri-mary goal should always be to provide the best long-term solutions for their unique needs.

UPSELLING Access ControlSuccessful projects require end user vision and integrator flexibility

by Minu Youngkin

It’s important to remember that anyone can sell products, but if you want to build the trust necessary to cultivate long-term clients, your primary goal should always be to provide the best long term solutions for their unique needs. Image Courtesy of BigStock.com

S-22 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

Step One: CommunicationAs with any relationship, be it professional or personal, communication plays a crucial role. Particularly at the start of a project, you should focus on listening intently and encouraging them to communicate their needs. Start with the basics - what are their long term goals? Was there some catalyst like a security crisis that is driving their desire to install or upgrade an access control system? Are there any special considerations or limitations to be aware of?

Some clients may feel as though they already know what they want, and it will be your responsibility to point out any discrepancies between what they want versus what is actually needed. That’s not ever an easy task, but it will be more difficult if the client feels your primary concern is making a sale rather than improving their security.

Formulate a PlanNext, you’ll want to schedule a planning meeting that includes all of the key players in this process, from the facility manager to the head of finance. They will each have a vital role to play in the development of a practical solution that aligns with their building and their budget as well as determining how the system will be used and by whom.

During the planning meeting, it is important to discuss the issues that most impact which solution will be select-ed, including:• The access control system’s anticipated use and its overall

intent.• The necessary policies and procedures for access control.• How the implementation of access control fits into the com-

pany’s overall security plan.• The barriers and limitations to implementation.

One issue that is often overlooked during the planning process is the level of demand access control will place on bandwidth and internal networks. Involving the IT depart-ment during the planning phase will save a lot of time and frustration, and taking a collaborative approach will allow you to confirm that the IT infrastructure is up-to-date while signaling to IT that you are here to help.

“I’ve seen the best success when a company’s security and IT leaders are involved from the beginning. They set the tone for working together and jointly developing a solution,” says Erik Larsen, Allegion National Account Manager – Electronic Integrators. “When security under-stands the IT infrastructure—and, how, for example, the addition of locks or cameras impacts the network—and, on the other side, when IT understands the liability and reputation risks of not having the proper security solution in place, that’s when they can move forward implementing the right solution.”

Identify Appropriate SolutionsOnce you have established the overall system needs, bud-get and IT requirements, the next important decision is determining if the client is looking for a networked security system, a standalone one, or a combination of both.

Request information: www.SecurityInfoWatch.com/10213140

A wide range of Aperio wireless devices is available from ASSA ABLOY Group brands.

Copyright © 2016, ASSA ABLOY, Inc. All rights reserved.

THE BEST OF BOTH WORLDSNeed the convenience of wireless, and the real-time communication of online access control?

Then the new IN100 Aperio® wireless lock is for you.

• Remote lock/unlock in less than 10 seconds

• Streamlined design with your choice of black or white reader, 50+ levers and 14 finishes

• Simultaneous support for HID Mobile Access® and multiple credential types, including smart cards and Prox

• Seamless integration with a broad range of access control platforms

Available from ASSA ABLOY Group brands:

CORBIN RUSSWIN | SARGENT

IntelligentOpenings.com/IN100

Request information: www.SecurityInfoWatch.com/10212899

S-24 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

If you are dealing with a large cam-

pus or business site, the security needs are likely to be much more complex, with different types of buildings requiring different levels of security. Not every door in the facility has to be a controlled entrance, nor is it always necessary to have 100 per-cent, 24-hour control. Your guidance on these types of projects will be par-ticularly crucial in determining what is appropriate.

The building’s construction will also play a role in determining the right solution since it can be difficult to wire a system in an existing or histori-cal building. Networked locks that connect to a central access control system give you the flexibility to build a system that includes both hard-wired and wireless locks.

A wireless solution allows for easy installation that results in minimal disruption to their environment and can be finished quickly and cost-effectively. It’s important to remem-ber though that not all wireless locks need to be networked to function effectively. For clients who lack the IT infrastructure necessary to support a fully networked system, standalone wireless locks may be a good solution for some or all of the doors.

Flexibility is KeyClients frequently express concerns that the system they select today will not be flexible enough to be upgraded and expanded over time as their needs change. One of the biggest challenges integrators face is providing a viable, integrated solu-tion that can meet current safety and security issues, as well as accom-modate emerging technologies that will allow the system to expand and adapt as needed in future. Such solutions should be able to oper-ate current technologies, as well as those under development, without compromising or risking investments in their present systems.

As more businesses adopt elec-tronic access control, there is a greater appreciation for the value it provides—namely, enhanced secu-rity, more efficient management and greater convenience. In fact,

now businesses are not only adding access control to their main facilities, but they’re asking security integra-tors how they can extend it to parking garages, warehouses, storage units and other buildings not connected to the main facility.

Successfully extending the secu-rity perimeter to remote locations requires careful evaluation.

Limitations to extending access control include data transmission and potential costs. As a result, it often becomes a phase 2 or 3 initiative for a client. A client may know what they want, but the fiscal planning may occur over a period of time. In those cases, it’s typically best to create a scalable plan that ensures the IT infra-structure and associated products are “future-proof.” Design an open platform system that will provide the end user with many options now and in the future, rather than locking them into a proprietary technology that forces them into a specific product or brand—and another significant invest-ment if they want to make changes.

Achieve BalanceIn any given facility there are multiple openings to secure, and multiple people who need access. Helping your client understand their credential options and what credential works best for their needs will be an impor-tant part of planning and implement-ing their access control solution. Issues to review and consider include:• Are they choosing a networked sys-

tem where issuing and managing card credentials make sense?

• Do they need to integrate cashless vending with their credential system?

• Will they be integrating time and attendance into their access control system?

• Are the locks being accessed in an interior or exterior location where weather may be a concern?

• How deeply will they want to monitor each user’s access and movement within the facility?

• Does everyone have the same level of security clearance or is there a need for multiple security/access levels?“Typically, security, technology,

and usability are the key priorities,”

Larsen explains. “The goal is to bal-ance priorities for each organization. In a clean room environment, for example, usability may be the driving priority because handling keys, cards or keypads may not be conducive or convenient. In that scenario, the client likely needs a biometric solution.”

But he points out that there’s no one-size-fits-all solution when it comes to access control and security. The key is to achieve a balance.

“Many people try to select creden-tials by leading with the technology,” Larsen says. “Instead, they should be finding out about the user, the appli-cations, and the culture. The right technology will follow once those things are understood.”

Solutions over SalesWith customers facing more choices than ever before, they depend on your advice and experience to help them formulate a practical security plan and select an appropriate access con-trol solution. It’s vital that each new sales lead is treated not merely as a potential sale, but as an opportunity to build a lasting relationship that will lead to repeat business for your com-pany. The end result will be an access control solution for the present and future, and a satisfied client willing to refer you to others.

To find out more about how Allegion can help you implement the right solution for each customer, or about our electronic access control solutions, visit us online at www. allegion.com. ■

Minu Youngkin is the Integrator Marketing Man-ager for Allegion. For more information, visit us.allegion.com.To request more information about the company, visit www.SecurityInfoWatch.com/10215684.

A Napco Security Group Company

Today’s Wireless, Multi-Door & Every-Door Access Control Solution

Uniquely, this hardware and software we integrate with is all made right here, includ-ing sister division Alarm Lock’s Networx Locks, NetPanel, Expanders and Wireless Gateways, so of course it’s reliably integrated to deliver fast, fully-scalable, real-time performance for you. And, that includes customizable ArchiTech Networx access locks with choice hundreds of designer looks & multi-technology readers and all-new upwardly mobile iLock® BlueTooth App.

www.cicaccess.com • Amityville, NY USA • (631) 842-9400 • 1.800.645.9445

From ContinentalAccess…Integrated advanced electronic access for every one of your doors, all from under our one roof every one of your doors, all from under our one roof

Product Club 12:55 PM 79%

Long-Range Extenders & Gateways

Networx® NetPanel Controller

Trilogy Networx Locks in Real-time

Integrated Scalable Access Control Software

iLock BlueTooth App for ArchiTech Custom Locks

Request information: www.SecurityInfoWatch.com/10213301

S-26 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

New Products

School-Focused Lockdown SolutionDetex lockdown systems enable rapid control of entry and interior doors so intruders are denied access to educational facilities in a crisis situation. Components include durable Advantex hardware with electric latch retraction or electric dogging, remote control switches (central or multiple), and power supplies. Auxiliary security equipment can include door prop alarms, vandal-resistant breakaway trims, door position

switches, and the ProxiPen proximity-based system for guard tour verification.Request more info: www.securityinfowatch.com/12167961

Standalone Wireless, Keyless LockThe Trilogy T2 DL2700LD with LocDown from Alarm Lock is ideal for school and campus security. The standalone wireless keyless digital access lock includes a lockdown keyfob and visual lockdown indicator bar on the inner door. The lock features rugged Grade 1 durability, and can be installed in under an hour, retrofitting any standard lockset. The keyfob can control up to four locks for remote lockdown activation up to 100 feet.Request more info: www.securityinfowatch.com/12163979

Energy Efficient PoE Access ControlPoE locks from ASSA ABLOY Group brands Corbin Russwin and SARGENT connect directly to a server via Ethernet cabling, enabling facilities to leverage existing network infrastructure for enhanced security and easier, more cost-effective installations. Bringing the power of the network to access control delivers sustainable access control by improving energy efficiency, reducing infrastructure, and simplifying installations. The locks eliminate panels and traditional power supplies, significantly reducing components and materials.Request more info: www.securityinfowatch.com/12070114

Mobile Access ControlHID Mobile Access for access control and other applications supports NFC and Bluetooth Smart for interoperability with many smart devices. Its “Twist and Go” gesture technology enables users to open doors or gates from a distance. HID Mobile Access is used with the company’s iCLASS SE and/or multiCLASS SE readers, and includes mobile IDs, apps and access to the HID Secure Identity Services portal for managing users and issuing or revoking IDs.Request more info: www.securityinfowatch.com/11706496

Access Control Management SoftwareWith a redesigned user interface, Keyscan Aurora Access Control Management Software from Kaba ADS simplifies database creation and maintenance by assigning multiple credentials and permissions to a person, and users can be issued multiple credentials with up to 10 different group access assignments. The system comes with a 10GB database limit and offers an optional module to support full Microsoft SQL Server. It delivers efficient transfer of all system changes to the panels.Request more info: www. securityinfowatch.com/11300475

November 15-17, 2016Houston, Texas

Crowne Plaza Hotel • Reliant Park

New Date!

Secured Cities has moved to November 15-17, 2016 in Houston, so tell

your colleagues and friends. 48 sessions, 4 on-site tours – a most unique event!

New Schedule!

More sessions, more peer encounters, more vendor interaction, more opportunities to learn!

New Innovations!

Security Innovations Awards Evening Reception allows you to mingle with the winners and enjoy

good food, drink and trusted peers! Visit Secured Cities.com for submission information!

BROUGHT TO YOU BY: SECURED CITIES PARTNERS:

Register Today at SecuredCities.com Check back daily for conference updates.

Pricing

Starts at

$199

Attention: UASI Funding is Available for Secured Cities.

Contact your financial officer or grant administrator

for details.

Gate Access and Entry ControlThe Cellular Select Gate Series from Select Entry Systems is a GSM mobile solution to control gate access from a mobile device. The system offers users programming controls and commands via SMS Text message, including checking unit signal strength, changing passcodes, setting relay control, PIN code management. Users can program 10 Phone Numbers to dial out from the keypad. Free SGMC (Select Gate Mobile Control) app is included.Request more info: www.securityinfowatch.com/12224625

Access Control SoftwareAMAG Technology’s Symmetry V8.1 Access Control software is available in all product editions: Symmetry Business, Professional, Enterprise, Homeland and Global. It also integrates with the latest version of the Symmetry CompleteView Video Management System. Features include: expanded identity verification via video; integratiojn with the Symmetry GUEST Visitor Management System; integration with IP-enabled locks from Sargent and Corbin Russwin; a Maintenance Mode feature; and integrations with DMP alarm panels and Genetec Security Center v5.3.Request more info: www.securityinfowatch.com/12188377

Request information: www.SecurityInfoWatch.com/10752984

S-28 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

New Products

JULY/AUGUST ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 S-29

Grade 1 StrikesCamden Door Controls has introduced two new ‘Universal’ Grade 1 strikes that come with three stainless steel faceplates designed for ANSI square, round and wood frames. The CX-ED1079L (low profile, for 5/8” latch projection) and CX-ED1079DL (standard depth, for 3/4” latch projection) offer selectable 12/24V AC/DC and fail safe/fail secure operation. With easy fit connectors, they each offer horizontal faceplate/body adjustment and latch monitoring. They are backed by a full five year warranty.Request more info: www.securityinfowatch.com/12210646

Cabinet Locking SolutionsThe K200 Cabinet Lock and KS200 Server

Cabinet Lock from HES are the wired counter-

parts to the HES K100 and KS100

with wireless Aperio tech-nology. Ideal

for healthcare applications, the

K200 uses Wiegand communication between a multi-technology reader and an access control system, enabling real-time audit and door monitoring. The KS200 also uses Wiegand to integrate with access control systems and ID badges. It supports a Small Format Interchangeable Core (SFIC) mechanical key override.Request more info: www.securityinfowatch.com/12192260

Access Control TabletSRI Identity’s IOM Access Control Tablet for mainstream access control applications fuses an access-control reader, biometrics, keypad, intercom, camera and other capabilities. Built on a scalable Android computing platform, the tablet can provide additional functionality beyond its access control functions such as time and attendance, two-way video communications, employee alerts and scheduling without additional equipment. The unit is a viable option to replace card readers in new or existing access systems.Request more info: www.securityinfowatch.com/12182927

Bob,

Have you seen this new

field configured interlock

for up to 5 doors? It’s the

economical solution we

were looking for.

— Jill

The 4800 PLC interlock controller is the controller that changes when the job does. The 4800 Series controls up to five doors.

Features include 12 field assignable inputs and 12 configurable relay outputs, compatibility with leading access control software,

a watchdog circuit that constantly monitors operation, LED input/output connection status indicators, voltage spike/surge kickback

protection, plus adjustable propped door, panic release and system pause timers. Available as board module or with a 4 amp power supply, the 4800

Series delivers big performance at a small price.

4800 Series Interlock Controllers

The controller that changes when the job changes

1668 Sag Harbor Tpke., Sag Harbor, NY 11963 (800) 906-0137 (631) 725-8148 Fax www.dortronics.com

Request information: www.SecurityInfoWatch.com/10213494

www.accesshardware.comph: 855.847.5691

The Adaptable Design 3Total coverage for today and tomorrow

The adaptability and modular design of Schlage’s AD Series Locks allows for customization for present and future application needs without removing the locks from the door.

3 Modes of Adaptable Design

AD-Series Networked Wireless Locks offer the key bene� ts of a hardwired access control system without the wires – to secure doors that were traditionally dif� cult to run wires to in the past.

When it comes to AD Locks, AHS is the place – as we are a major regional distributor of “All Things Schlage”. Call us at 855.847.5691 or visit accesshardware.com for more details.

AD-Series Standalone Locks are a cost-effective way to upgrade from traditional mechanical locking devices. They are easy to use and manage – without installing a facility-wide network.

AD-Series Hardwired Locks allow instant control of a system – from locking down or unlocking one door or all doors in your facility; to adding or removing a user or viewing the status of the opening.

The Adaptable Design 3Total coverage for today and tomorrow

The adaptability and modular design of Schlage’s AD Series Locks allows for customization for present and future application needs without removing the

AD-Series Standalone Locksare a cost-effective way to upgrade from traditional mechanical

AD-Series Hardwired Locks

Request information: www.SecurityInfoWatch.com/10722906

Access Control Management ApplianceKeri Systems’ i2 Box Mini Appliance is an embedded mini appliance PC with keyboard and mouse that has the capability to manage an access control system of up to 64 readers and 3000 cardholders. It comes pre-loaded and licensed with Keri’s Doors.NET Appliance Edition Software. It removes Windows problems and other system issues commonly found using a PC provided by the customer or purchased from a retailer, reducing installation time.Request more info: www.securityinfowatch.com/12163982

Video Intercom with Card ReaderAiphone has announced that its IS, IX, and JP Series audio/video entry systems are now available with integrated multiCLASS SE readers from HID Global. The contactless readers support a broad array of credential technologies and a variety of form factors including; cards, fobs, and mobile devices. The embedded readers allow the video door stations to easily integrate with new or existing access control systems.Request more info: www.securityinfowatch.com/12139541

USB Audit LockSargent and Greenleaf’s

USB Audit Lock (Model 3006/3007) is a commercial-grade digital lock system with audit trail capabilities. The Audit Lock

is ideal for applica-tions in banks, retail outlets,

small offices and other businesses. Using a verified USB flash drive, security data – including who accessed the lock and when – can be easily uploaded to coordinate and analyze the security of a single or multiple lock system across many users.Request more info: www.securityinfowatch.com/12214492

Wireless Lock Unit with Prox ReaderPaxton’s Net2 PaxLock is a secure wireless battery-powered access control unit that features Genuine HID Technology. It can be installed quickly and comes pre-fitted with a C keyway core, also available to fit SFIC keyway. The battery-powered unit comprises a networked access control system in a door handle, combining secure wireless technology with a stylish proximity reader. It communicates with the supplier’s Net2 software at a central point by a secure, low-power radio link.Request more info: www.securityinfowatch.com/12036283

GSA-Approved Intelligent ControllerThe Open Options SSP-D2 is a native IP-ready intelligent controller with a built-in reader interface module allowing control of two doors right off the board and a total of 64 using additional reader and/or IO modules. Registered on the GSA Approval list (APL #10075) under the PACS Infrastructure category, the unit connects directly to the LAN and supports the new Open Supervised Device Protocol (OSDP) for bidirectional communication to RS-485 and biometric devices.Request more info: www.securityinfowatch.com/12224598

Retrofit Lock for Mobile AccessCyberLock’s FlashLock system uses serial optical communications technology to giver mobile access to any lock retrofitted with the unit via handheld device. Users can grant one-time access or multi-day access via permissions sent by text or email. Once the person needing entry accesses the link, the hand-held device will flash. The person hold the phone to the lock and the lock will flash, then the lock can be turned to open.Request more info: www.securityinfowatch.com/12224645

S-30 ACCESS CONTROL TRENDS AND TECHNOLOGY 2016 JULY/AUGUST

New Products

Request information: www.SecurityInfoWatch.com/10214208

Slide Gate OperatorThe DKS 9024 Slide Gate Operator from DoorKing keeps running when AC power has been lost, thanks to solar power and built-in 7.2 Ah batteries. The small, compact design is ideally suited for residential or commercial applications. A 1/2 HP Quadra Drive DC Motor and a belt drive/30:1 gear-box reduction system provides powerful, yet extremely quiet, slide gate operation. It uses an advanced micropro-cessor control circuit.Request more info: www.securityinfowatch.com/12224628

Request information: www.SecurityInfoWatch.com/10214128

IP Single-Door Access ControllersSDC’s IP Pro IP-based Single Door Access Controllers, now available with PLUS PC Client Software, allow expansion from one standalone door up to a 100-door grid, enabling users to configure and manage every door from a single interface. Each controller comes with secure, built-in software to manage up to 32 doors from any standard web browser to allow for real-time monitoring, user manage-ment and audit trail up to 5,000 events.

Request more info: www.securityinfowatch.com/12168131

Keypad Access LockYale Locks & Hardware’s nex-Touch keypad access control unit is available with a capacitive touchscreen or an ADA-com-

pliant push button keypad for tactile environments. The

cylindrical lock fits easily into standard door preps

and features a privacy button that prevents access from the outside. It can be used as a standalone keypad lock that uses a PIN code or upgraded for expansion of ZigBee or Z-Wave capable alarm systems in small businesses.Request more info: www.securityinfowatch.com/12192330

Enterprise Access Control Software

CA3000 v2.11 Enterprise Access Control Software from ContinentalAccess offers dealers and integrators new

RMR potential with remote hosted services. The hosted managed services enable a dealer to partition just one server run-

ning CA3000 and use it for multiple clients. Each user can securely “remote-in” and view just their system to check status and make routine changes such as editing users for new hires or departing

employees, or changing access privileges by group.Request more info: www.securityinfowatch.com/12224636

Mini EscutcheonThe XS4 Mini Escutcheon from SALTO is built from stainless steel and comes in Mifare and BLE (Bluetooth Low Energy) versions so it can be operated by conventional smartcards and/or via SALTO’s JustIN Mobile app. Readers can be black or white, with both featuring a modern, large easy-to-read LED to clearly indicate when access is granted (green light) or denied (red light). Power is via three AA batteries.Request more info: www.securityinfowatch.com/12197617

10731 Rockwall Road | Dallas, TX USA 75238-1219888.419.8353  | 214.553.6140  | [email protected]

• Backwards Compatible Architecture

• Alarm Text Message/ E-Mail Notification

• Hot Swap Redundant Communication Server

• High Level Elevator Control Interface

• Integrated Wireless Locksets

Quality. Reliability. Integrity. The Security Professionals’ First Choice.

www.dsxinc.com

DSX Access Systems, Inc.• No “Per Seat” Licensing In System Pricing

• LAN/WAN Compatible

• Smart Card and Biometric Integration

• Unlimited Access Levels Per Cardholder

• Integrated Photo ID Badging

• Backup SQL Server

CREATING THE FUTUREOF SECURITY . . . TODAY

The Security Professionals’ first choice for today’s security infrastructure, from one room to multi-location complexes around the world. Our reputation is based on a time-honored tradition of rock-solid quality, premium reliability and the integrity of DSX and our network of factory-trained, authorized dealers and support.

When you are staking your reputation on a solution - choose the most powerful and intelligent access control systems in the world, choose the total security relationship with DSX.

SDCSecurity.com • 800.413.8783 • [email protected]

the lock behind the system

SDC’s IP ProTM IP-based Single Door Access Controller – now available with PLUS PC Client Software - allows expansion from one Standalone door up to a 100-door “Grid.” Configure and manage every door from a single, flexible interface system that grows with you and eliminates all the headaches of costlier, more complicated enterprise solutions. Finally, IP door security is in your hands.

For details and specifications: SDCSecurity.com/IPProPlus

DOORS100INTERFACE1HEADACHES0

Request information: www.SecurityInfoWatch.com/10214991