New Mobile Solution from Galaxy Control Systems Extends Access Control Reach and Functionality

Galaxy Control Systems is demonstrating the company’s new mobile access solution here at ASIS 2014. By pairing the company’s industry leading System Galaxy access control platform with a new handheld reader powered by Telaeris, users can extend the boundaries of conventional access control operations to include both on-site and off-site mustering, verification, entry/exit, rostering and attendance applications.

“Our new mobile access handheld reader is a game changer that takes access control technology into the field for immediate identification and assessment applications,” said Robert Laughlin, president, Galaxy Control Systems. “By extending our powerful System Galaxy access control solution beyond typical boundaries, security management can react faster in emergency situations while also establishing new zones of protection to better detect and respond to potential security breaches.”

Galaxy Systems’ new mobile access solution employs a new handheld reader powered by Telaeris populated with System Galaxy access control software. Data is communicated between the handheld reader and the System Galaxy access control platform in real-time via wireless networks. When network connection is not available, all activity is stored in the handheld reader until a TCP/IP connection is established. All major credential types are supported including Prox, PIV, iClass, barcode and magstripe. The mobile solution is compatible with both new and existing System Galaxy access control installations enabling users to easily enhance security operations.

The handheld device features an LCD to display an individual’s photograph as well as first and last name to ensure identification is verified for access or privileges. The handheld reader is ideal for confirming that everyone is accounted for in the event of an emergency evacuation (mustering). It also delivers robust solutions for rostering applications on group trips or athletic team travel to verify head count and identity, in entry/exit applications in order to keep a detailed record of what areas individuals have accessed and are located, and for verification in remote locations such as parking lots as well as hazardous and high security areas.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.