From the Product Manager's POV

A conversation with Mas Kosaka

ACCESS controllers are a mainstay of many security systems, but the technology hasn’t seen many leaps or innovations. PCSC promises a new day with its Fault Tolerant™ Controller. We talked with Mas Kosaka, president and CEO of PCSC, about the product and how the technology is helping push controllers into the next generation.

Q. You have recently introduced the Fault Tolerant (FT) Controller. What is this product and how will it improve access control, alarm monitoring and output control systems?
A.
The controllers are the next generation of controllers, and are designed to greatly improve system integrity and reliability. Our definition of integrity is to provide an online security network without any system degradation, even during the loss of communication or hardware/firmware failure.

Q. How is it possible to increase reliability and the responsiveness of security systems and networks using the product?
A.
We’ve developed a system that automatically enables itself to be dynamically reconfigured, eliminating failed components from the system. If there is a loss of primary communications, the controller provides an optional communication path to reconnect back to the host and remaining controllers. This self-healing technique is called real-time dynamic network architecture. The alternate communication path can be landline or wireless, whichever is best. Upon a hardware or firmware failure, current controllers just fail. Our FT controllers provide 100-percent backup operations—if one fails, another simply takes over its duties. As long as there is at least one FT controller, the system will operate without any security degradation.

Q. What are the main enhancements that make the Fault Tolerant system work so well?
A.
The FT system uses the capabilities of 32-bit CPU and Ethernet topology to provide a higher level of computing and communication integrity. We incorporated a self-healing architecture to automatically reconfigure itself upon communication or hardware failure.
Q. Why did PCSC develop a new controller?
A.
There have been no new innovations within the access control industry in a long time. The controllers have become faster, include the latest communication techniques and incorporate the use of many card technologies, but essentially, today’s controller functions like it did more than 20 years ago.

During the design process, we wanted to develop something that was truly innovative. We wanted to design features for the next generation of controllers to be useful for integrators, as well as end users. Our design goals were to provide high reliability and the most flexible system configuration architecture to meet today’s industry demands. We wanted to develop a system that created the least amount of impact to the end user during a failure. The design that best fit our goals was the Fault Tolerant architecture for access control and alarm monitoring. Fault Tolerant architecture is not new to the PC world, but is not available in access controllers—until now.

Q. What makes this the next generation of controllers?
A.
This series provides the next logical evolution in controller development. The FT architecture provides a self-healing architecture for communications and controller hardware failures. The FT architecture provides full security during primary communications failure or hardware failure. During a failure, the system will automatically reconfigure its network and continue to process access decisions, alarm and other transactional information to and from the host system, LiNC-NET.

The system provides primary, secondary, tertiary or even quandary communication ports for communication backup. You would have to lose all four communication ports before you had a communication failure. We offer a variety of communications topologies like LAN, ZigBee wireless, Wi-Fi and PoE. Not only is the communication redundant, the controllers operate in a redundant mode, using peer-to-peer communications to maintain network and database status. If one MC fails for any reason, its duties are automatically transferred to another MC. If the secondary MC fails, another MC will automatically cut over to take over the failed controller’s duties. As long as there one operational MC, the system will continue to offer 100-percent security.

Q. What are the IT implications?
A.
The advantage for the IT professional is the MCs are an appliance. Unlike the existing products, where installation of a controller is provided in a wall-mounted can, the MCs are offered in a standard 19-inch rack. These racks can be installed in the IT center for security and maintenance. The only connections to the MC are the communications and power, similar to a router. The wirings for the door, such as reader, lock, door status and REX, are located near the door or in an electrical closet. The MCs provide an option for PoE, enabling the power backup to match existing backup systems within the IT center.

Q. Why would an end user choose this technology compared to existing architecture?
A.
The FT series provides end users with a variety of configuration options and feature sets, enabling them to custom design a security system that meets exact requirements using standard components. The FT design architecture can be optimized for single-building, campus or enterprise configurations. FT provides system reliability with its self-healing RDNA process. Today, when a controller fails, it requires immediate attention, and the need to repair the problem becomes an emergency. With the FT series automatic redundancy, emergencies become a thing of the past. Even after MC fails, access decisions are processed and alarms are monitored with no degradation to the security of the system. A failure of a MC becomes a status notification rather than an emergency response. The end user and integrator can now schedule the repair of the MC rather than having to replace or fix the MC in an emergency manner.

Q. What are the advantages for the integrators?
A.
Integrators can now design exact security architecture for every client without cutting corners on security. Integrators will be able to design systems that enable clients to process access decisions and monitor alarms, even during a MC failure. Controller failures are no longer an emergency.

Depending on the number of MCs at a customer site, the integrator can determine the urgency of the failure and have the ability to schedule the replacement of the failed component. Even routine, preventive maintenance had to be scheduled and coordinated with the end user so not to affect the security. Installers today can replace boards without degrading the system security or operations.

Q. Will the product meet new Homeland Security requirements?
A.
The controllers offer high-security alarm input monitoring using a “Four” state monitoring rather than three on all inputs, even the Wiegand reader port. The controllers provide supervision on all readers, including biometric devices. We even provide monitoring of the REX in four states to prevent tampering in high-security installations.

Our current controllers support a 12-digit card number, but we realized the need for larger card numbers, so the new MCs are implemented to support a 24-digit card number exceeding any requirements for the FIPS and TWIC card formats.

Q. Since the architecture is new and completely different from your existing systems, how are you planning to support legacy products?
A.
Our corporate design philosophy has been to provide an upgrade path for legacy products. All of our designs incorporate inherent upgrade capabilities, enabling customers to upgrade, even systems installed in 1983. We have some customers that still insist on using their very old system. The FT architecture is different from our current controller architecture, but our new host system, LiNC-NXG (LiNC-NET Next Generation), will accommodate both architectures at the same time. This enables our existing end users to retain their current PCSC controller platforms, and for future expansion, provide a simple add-on process to incorporate Fault Tolerant architecture.

Featured

  • UL Solutions Launches Artificial Intelligence Safety Certification Services

    UL Solutions Inc., a global leader in safety science, today announced the launch of artificial intelligence (AI) safety certification services, enabling comprehensive assessments for evaluating the safety of AI-powered products. Read Now

  • ESA Announces Initiative to Introduce the SECURE Act in State Legislatures

    The Electronic Security Association (ESA), the national voice for the electronic security and life safety industry, has announced plans to introduce the SECURE Act in state legislatures across the country beginning in 2025. The proposal, known as Safeguarding Election Candidates Using Reasonable Expenditures, provides a clear framework that allows candidates and elected officials to use campaign funds for professional security services. Read Now

    • Guard Services
  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.