Expanding Access Control At ISC West

Companies in the access control vertical are finding a way to expand past doors.

My favorite thing about coming to ISC West is figuring out what the trends are and how they mold the evolution of the products, solutions and integrations of the security industry. This year, one of the first things that stood out to me was within the access control vertical.

We see a lot of these companies as protectors of our spaces, starting at and limited to our doors. But these guys want to provide so much more.

Here’s a few access control solutions that I saw today that are pushing how we think of access control.

HID Location Services

HID Global announced its new HID Location Services that provide organizations with visibility into the location of their workforce in a facility, making it possible to analyze room usage for better building management and increased operational efficiency. HID Location Services is enabled by Bluvision, a company recently acquired by HID, and provides numerous capabilities based on an organization’s needs. Its real-time location services are ideal for monitoring and providing deeper analytics around the movement of personnel in a building for better insight to optimize usage of facilities, common areas and individual rooms. The proximity-based services verify when personnel are nearby a given area for use cases such as monitoring employee check in and check out; it also helps organizations meet health and safety regulations by monitoring room occupancy.

Nortek Security & Control's Linear BluePass

Nortek Security & Control's Linear BluePass offers a complete ecosystem of smartphone/tablet-based mobile credentials, user and dealer apps, and multi-tech Bluetooth readers that provide a more secure, easy to use approach to access control. BluePass reduces total cost of ownership by protecting the customer's existing system controller and software investments and enables a smooth migration from legacy credentials using both the multi-tech readers and a cloud-based credential issuance and management portal. Additional credentials can be easily procured, even in small quantities, with channel-friendly credential bundles.

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3