Safe, secure, SCS
Feel free to call us: 0800 098 8131
Posted by: In: Blog 23 May 2017 0 comments

New Paxton Access Control Touch Screen

News from Paxton: Net2 Entry Touch panel is the latest addition to their door entry range, compatible with Net2 access control. The new panel comes with premium features, including a quality 7-inch colour touch screen with customisable options, making Net2 Entry suitable for more sites than ever before.

We have used the Paxton Net2 software based solution for many clients looking for Access Control. This latest addition to the Paxton range further enhances our support for quality access control system.

paxton access control

Features include

 

 

 

 

Options

The device is available is three version for different installations. Flush mount, Outdoors with rain guard and Surface Mount:

paxton access control options

Posted by: In: Blog 03 Apr 2017 0 comments

One of the up-and-coming trends in Access Control is wireless access control.

Access control technology is becoming so much more than a card at the door.

In an industry survey, the majority (69%) of respondents stated that less than 20% of their access control system installations involved wireless devices; meanwhile a survey of commercial end users saw increased interest expressed in remote (37%) and wireless (36%) access control.

wireless_locks

This room for expansion, fueled by new and innovative access control technologies, has created exciting engagement in wireless access control applications.

Retrofitting high-profile openings with wired access control devices has always been costly and labor intensive. Additional challenges, such as retrofitting a fire-rated door, can be expensive.

Today, access control devices need to, at times, be remote and mobile. The popularity of smartphone transactions is also in high demand.

New wireless access control technologies can be an appealing alternative for these situations and many more, and solve issues for customers in both the commercial and residential markets.

Let’s take a look at some of the latest technologies and offerings that can propel us into the ever-widening world of wireless access control.

Wireless access control via smart-phones is very popular. It is convenient to install and integrates well with other Internet of Things smart home devices.

Why Wireless Access Control?

Talk to any IT administrator today about the use of their existing IP-based network for security applications and you will hear a resounding “I need my bandwidth.” While this complaint is often directed at bandwidth hogs such as IP video surveillance, the use of access control devices can also be an IP network nuisance.

The need to extend existing Ethernet network cabling to remote doors and buildings can be costly. The many wireless technologies available today can help solve these challenges. One can easily be enthralled with the use of wireless access control devices.

However, it should be understood from the beginning that whenever possible the practical and cost-effective application of a dedicated point-to-point cabled system will be more reliable and secure than a wireless system.

That being said, wireless systems begin to shine as transmission distances increase, and competitive bidding, as often the case, takes priority. Integrators will always face the challenges of labor costs. The cost of trenching between buildings, copper and conduit materials can add up quickly.

On the other hand, the cost for Ethernet-based radio transceiver systems can now only be several hundred dollars, making them a very attractive option. Additionally, major cabling projects can cause interruptions in a customer’s daily operations.

wireless_locks_securitron

Smartphone Applications a Must

Everywhere you go it is apparent that most people do not want to be more than a few feet from their personal smartphones. You could say that people have unanimously adopted a new personal electronic identity. This popular concept has not gone unnoticed by the companies that provide mobile access control technologies.

The ScanPass mobile credential system from Connected Technologies is a good example of keeping it simple, and still utilizing common features of today’s smartphones. The company has partnered with many major security entities such as DMP, Bosch and Elk.

Access locations are identified by easily affixed barcode stickers thereby eliminating access control cards/fobs and readers. A dedicated smartphone application is used to scan the access point ID barcode and then securely communicate for access approval with the retrofitted access control module.

The door to today’s home isn’t just about keeping the bad guys out. It’s also about letting the right people in — customers’ family, friends and even service personnel like cleaners or pet-sitters — whenever they designate access and maintaining easy command over the home entrance.

A good example of this type of efficient residential wireless access control is the August Smart Lock from August Home. This system not only communicates through its own smart-phone apps but has integrated with such popular products as the Amazon Echo, Nest Cam, and IFTTT (If This Then That) home automation programming tool.

One of the nice features is that the Smart Lock device replaces only the interior side of the deadbolt, thereby leaving the existing exterior lock hardware in place. The solution is a great option for demanding millennial customers who want to upgrade to smart home technology.

Talk to SCS to learn more about Wireless Access Control System:

 

Posted by: In: Blog 14 Mar 2017 0 comments

We are always on the lookout for new products with a security benefit.

Security is big business – Did you know that last year over 730,000 UK homes were affected by burglary, costing insurers +£1.4bn? That’s close to three quarters of a million homes, in one year.

While we focus mainly in commercial security we do have a large number of residential security clients. We know that most homes do not have a sophisticated security system. Some studies  suggest that over 70% of homes are not under protected.

So when we saw the Cocoon we were intrigued. Security by ultrasound.

The claim is that the Cocoon Subsound technology, detects infrasound created by intruders, protecting the whole home from one device, and by using machine learning avoids false alarms. Clever?

concoon security

Units are priced £159 from Amazon or direct from the Cocoon website:

The company is new and crowdfunding at present – looking to raise £2 million to fund expansion.

 

Posted by: In: Blog 27 Jan 2017 0 comments

The latest home security cameras let you keep a watchful eye on your home, pets, children, cars and more during the day and at night. Our tips on what to look out for.

We all like to know that our home is secure and that everything and everyone is safe while we’re gone. In years past, that meant using a CCTV system to record, but few had remote access or alerts. Now you can buy a Wi-Fi connected camera which you can view from your phone.

Unlike the some of the networked IP cameras of old, which required a computer science degree to install and configure for access over the internet, modern home security cameras are very easy to set up. Some use cloud storage, so any evidence is saved online and is safe from thieves who might pinch your camera.

To help you choose the best security camera, we’ll explain the key features to consider.

Whether you’re looking for an easy way to check on your children and pets, or a motion detection system for intruders, you’ll find the right camera for your needs.

How to choose a connected home security camera

Most home security cameras perform the same basic functions – they detect an event, record the event and send you an alert – but they don’t all do it in the same way.

Certain cameras go beyond those basics and some can be mounted outdoors. Don’t forget to read our reviews to find out how each camera works in practice and whether its day and night video quality is good or not: don’t rely on a manufacturers specifications or claims.

Alerts: You should get notifications on your smartphone when your camera detect events. Without watching the live feed constantly, this is the only way to keep tabs on your home in relative real time. Depending on the camera, it may send text alerts when it detects motion, sound, a face (known or unrecognised), or all three. Some can send alerts to multiple people, usually anyone else in the household using that product’s app; others will send emails in addition to text messages as a fail-safe in the event you can’t access your mobile device.

Cloud recording: Many manufacturers now offer cloud storage plans with their camera. They record video to a server in the cloud and store it for 24 hours to a couple of  weeks. Sometimes offered free, these cloud plans typically require a monthly subscription, but may be worth it both for their convenience and if you want constant 24/7 recording. Some subscription services record video only when motion is detected and they’re not infallible and may miss an event. With 24/7 recording, like CCTV systems, you can rewind and watch any point in time (back the limit of your subscription). Bear in mind that some cameras – Nest in particular – only allows recording if you subscribe. If you don’t you can’t record anything and you’ll get only alerts.

Facial recognition: Netatmo is the only manufacturer we know which offers facial recognition. It does work, but not as well as you might hope. It can also take a long while before the camera can accurately identify people. It’s used to alert you when specific people are home – useful for keeping tabs on kids – and also avoiding unnecessary alerts as it can warn you only when an unknown person is seen.

Local storage: Some cameras include memory card slots so you can store video on the device. We like this option as it can eliminate the cost of monthly storage fees. The downside (if there isn’t any cloud storage option) is that if a thief steals your camera, he takes the video evidence with it.

Apps: All the latest cameras can be accessed (some even set up) via a smartphone or tablet app. In addition to offering a way to view the camera’s live feed, apps often let you adjust settings and turn on and off recording, motion detection and more. Often you’ll only be able to customise notifications, adjust motion and sound detection sensitivity, and set detection areas via the web  portal, but it’s great if you can do this in the app.

Motion detection: Motion detection is one of the most desirable features in a security camera. Built-in sensors pick up movement within the camera’s field of view and trigger video recording. Because these sensors are sensitive to any movement – event a shift in lighting or leaves blowing outside a window – it’s important the system also offers the ability to narrow the range of detection, adjust the sensor’s sensitivity or otherwise customise this feature to cut down on false alerts. Some don’t offer this and, generally, should be avoided.

Night vision: Most burglaries happen after dark, so this feature is nearly as important as motion detection. Technically, most home security cameras support infrared LED illumination, versus true night vision based on image intensification or thermal vision. Some camera’s will switch to night vision automatically in low-light conditions, while others allow you to customise when and how it should be activated. This won’t work through windows, as you’ll just see a reflection of the infrared LEDs.

Pan Tilt Swivel : Most security cameras – including all those reviewed here – can be manually tilted and swivelled to focus on a certain viewing area, but this is a purely set?it-and-forget it feature. A true pan/tilt camera is equipped with a motor so that you can move its lens – or even follow a moving object if you’re watching a live feed – using its app or browser-based app.

Resolution: No amount of security video will help you if it’s blurry, jittery or otherwise distorted. Look for a camera that offers the highest possible resolution. Most currently offer 720p (often referred to as ‘high definition’ or HD), but some newer cameras are coming out with 1080p (often referred to as ‘full HD’). Keep in mind higher resolution cameras use more internet and Wi-Fi bandwidth and battery life. Many cameras also offer a software zoom feature (which is not the same thing as having a physical zoom lens).

Scheduling: Scheduling features allow you to tell the camera to turn on and off, detect motion, and/or send alerts at specified times. This is useful when you, for example, only want to be notified when your children get home from school or just want to monitor your home when you’re away. It also reduces the amount of false alerts.

Two-way audio: While the idea of a security camera implies eyes-on monitoring, the ability to also hear what’s going on gives you a more complete picture of what’s happening on the home front when you’re away. It can also alert you to something occurring out of the camera’s field of vision. This feature can also allow you to speak through the camera, a great tool for remotely commanding an unruly pet or startling an intruder in the act, but be aware that you might need to plug in a powered speaker for this feature to work.

Viewing angle: The camera’s field of view determines how much it can see. As you’re probably monitoring a single room, you want a wide viewing angle. Most current cameras fall in the 130-degree range. These wide angles can sometimes cause image distortion at the edges in the form of a fish-eye effect, particularly when used in smaller rooms, but it’s not like you’re going to use a security to capture snapshots for your photo album.

Web client: Many cameras can be accessed through a web browser as well. This is handy when you don’t have access to your phone or a wireless connection. The web app should closely mirror its mobile counterpart, so you don’t need to learn a whole new set of controls. It may even offer extra features, such as the ability to download video clips.

Posted by: In: Blog 30 Aug 2016 0 comments
“Fingerprint access control system market” is expanding its roots into commercial, government as well as healthcare sectors. Its high penetration rate is projected to pose potential opportunities to the industry demand. North America fingerprint access control systems market was sized over USD 850 million in 2014.
fingerprint

Global fingerprint access control systems market size is expected to reach USD 4.4 billion by 2022, growing at a CAGR of over 7% from 2015 to 2022. Escalating safety and security threats is anticipated to drive industry growth. Fingerprint authentication offers a reliable solution to enhance access control thus, assists to mitigate security breaches as well as transaction frauds.

The global smartphone industry was valued at USD 2.5 billion in 2013. It is expected to reach USD 4.4 billion by 2022, growing at a CAGR of 7% over the coming years. Emergence of multi-functional and cost-effective smartphones is expected to fuel growth. Huge demand from Asia Pacific is estimated to drive fingerprint access control systems market demand.

Highly competitive business environment is likely to boost confidentiality needs for organizational data and information. Biometric systems market is anticipated to witness significant growth owing to incapability of password and security PINs to safeguard the data. This safety equipment is increasingly implemented for home fortification. Government around the globe is now taking stringent initiatives for biometric enrolment of their citizens. Advent of projects such as national identification programs, e-passports and border control are expected to drive industry growth. This measure can be attributed to secure borders, prosecute criminals, verify immigration or employment and combat identity fraud or terrorism

Implementation of this system requires huge capital investment. Apart from installation cost, it also involves allied expenses such as enrolling users, administering the system and training expenditures. However, theft or misuse of data is likely to pose a serious risk to the individual’s security. Fingerprint access control system market is expanding its roots into commercial, government as well as healthcare sectors. Its high penetration rate is projected to pose potential opportunities to the industry demand.

Product Overview

Capacitive products accounted for over 27% of the overall industry share in 2014. It is anticipated to exceed over USD 1.3 billion by 2022 owing to its low cost as well as compact size. Optical products were valued over USD 900 million in 2014. It is estimated to grow at a CAGR of over 7% from 2015 to 2022. The growth can be attributed to high image quality robust long life of the system.

Application Overview

Commercial application was the leading segment, valued over USD 850 million in 2014. It is expected to exceed USD 1.4 billion by 2022, growing at a CAGR of 6.5% over the forecast period. The surge can be addressed to rising safety as well as security demands in various organizations. Consumer electronics accounted for over 4.5% of the overall market share. The growth can be accredited to rapid growing need for access control features in tablets & smartphones.

Browse Related Category Market Reports @

Image Sensors Market

Position Sensors Market

Regional Overview

North America fingerprint access control systems market was sized over USD 850 million in 2014. It is projected to accumulate more than 30% of the overall industry share by 2022. Regional growth can be attributed to flourishing biometric application in healthcare as well as consumer electronics industries.

Asia Pacific fingerprint access control systems market is expected to witness considerable growth owing to increasing government initiatives in the region. It is likely to grow at a CAGR of over 7.5% from 2015 to 2022.

Competitive Market Share

The global fingerprint access control systems market share is highly consolidated by top three companies. 3M Cogent, Safran Group and NEC Corporation are estimated to account for more than 70% of the overall industry share in U.S. Other key players include Suprema, HID Global (Assa Abloy), Cross Match, Fingerprint Cards (FPC), Aware Inc, SecuGen, Daon Inc and Anviz Global among others.

Posted by: In: Blog 07 Apr 2016 0 comments

Tyco Security Products announces the integration of its C•CURE 9000 security and event management system from Software House with SALTO offline locks for seamless access control of an entire building through a single user interface.

The C•CURE 9000/SALTO solution is ideal for access control systems that require varying levels of security for interior and exterior access points. The solution deploys SALTO offline locks for interior doors that require a moderate level of security, such as storage and office areas, while Software House hard-wired door controllers are used for high security and perimeter access points. With this solution, security operators can control access to all doors into and within the facility through the C•CURE 9000 user interface, based on communications between C•CURE 9000 and the SALTO server.

“The C•CURE 9000/SALTO solution is a powerful integration that simplifies access control management by joining offline locks and hard wired doors together,” said Jason Ouellette, Product Line Director, Access Control, Tyco Security Products. “With C•CURE 9000 and SALTO, facilities can manage their entire access control infrastructure with a single credential and management platform.”

The C•CURE 9000/SALTO solution supports a nearly unlimited number of offline locks and uses SALTO online readers to update cards for offline reader access. The use of access cards for doors instead of mechanical keys results in cost savings, saving human and monetary resources previously spent on lost key replacement. The C•CURE 9000 guided user interface and single sign-on credentialing makes access control management more efficient and user-friendly. With the C•CURE 9000/ SALTO lock solution, no cabling is required for lock installation and offline locks can be installed on almost any door type.

To learn more about how Access Control can benedfir you contact Simon or Neil at SCCS.

Posted by: In: Blog 05 Nov 2015 0 comments

One of our key suppliers in Access Control is Paxton, a UK company who has been a leader in developing complete access control systems including Hardware, Software and Services.

The next generation of Door Entry Systems are now available:

paxton door access

Net2 Entry – Paxton’s award winning door entry solution, is probably the simplest door entry system on the market. Over the years SCS has installed many. many Paxton Access Control Systems.

You can now get your hands on the next generation of Net2 Entry panels, offering enhanced door entry functionality for versatile security and building management.

Net2 Entry works standalone or alongside Net2 access control, combining door entry with key features of Net2. It is a scalable solution, allowing expansion of up to a hundred panels and a thousand monitors.

Features of the new panels:

  • Smart new design – Net2 Entry standard panel available in anthracite grey and the Net2 Entry vandal resistant panel in stainless steel are both available in flush mount, surface mount and rain hood variants
  • Reads Paxton and MIFARE® token technology – ideal for sites using MIFARE® tokens
  • Pan/tilt functionality to capture an angled view – increase security

v2.14 system update includes

  • Grouping – enables partitioning of sites, buildings and floor levels. Ideal for sites ranging from multi-tenanted buildings, such as office or apartment blocks, to gated communities
  • Improved 3rd party SIP compatibility – RFC2833 DTMF protocol means Net2 Entry is SIP compatible with third party products to meet a large range of customer requests

Net2 Entry features:

  • Just 3 components, simply plug together
  • Units auto detect for easy installation
  • Easy plug and play expansion for large systems
  • Inbuilt Net2 access control for a complete solution
  • Intruder alarm and secondary camera integration for ultimate convenience
  • Full colour video camera –low light sensitivity for day/night use
  • Additional SIP backup server if primary server fails
  • IK10 impact rated *VR only
Posted by: In: Blog 10 Oct 2015 0 comments

ASSA ABLOY Access Control’s latest Aperio® wireless cylinders, PINpad escutcheon and L100 – the world’s first complete wireless security lock, have all been integrated into the latest Software House access control system.

Aperio® is designed to upgrade mechanically locked doors and wirelessly connect them online and to new or existing access control systems. With minimal modification to doors and premises; Aperio® offers a cost effective and simple security upgrade.

tyco-assa

Rafael Schrijvers, Product Marketing Manager for EMEA at Tyco Security Products, said:

“Our C•CURE 9000 system is one of the industry’s most powerful and flexible security management systems, allowing our customers to monitor events and manage personnel.

“Aperio® is wireless; therefore avoids invasive cabling, allowing quick and easy installation that will not be intrusive, ideal for installation listed buildings and other heritage projects.

“We have already deployed the solution across a number of healthcare and education projects and are looking to potentially integrate with more Aperio® in the future.”

Posted by: In: Blog 05 Aug 2015 0 comments

Nest Labs, the home automation company bought by Google for $3.2 billion last year, has launched its first new product since the acquisition – a home security camera

Google-owned thermostat and smoke alarm maker, Nest Labs, has announced it is moving further into the ‘connected home’ with the launch of its first security camera, called Nest Cam.

Nest Cam builds on the features of Dropcam – the start-up Nest acquired for $555m (£326m) in 2014 – including the ability to upload videos to the cloud and live stream them to a smartphone or computer.

However, Nest has added a slew of new features including full high-definition (1080p) video quality, improved night vision and a new design with a magnetic base that can twist around, bend at an angle, or be mounted upside down.

“It was always a no brainer that a camera would have a place in the home,” said Lionel Paillet, Nest’s general manager for Europe. “We spent a lot of time building on the Dropcam experience to nail it and really get it right.”

Nest Cam has a 130-degree viewing angle and a glass lens with a digital zoom that can magnify the picture up to eight times, allowing users to see fine details even from across the room.

Eight infrared LEDs and new algorithms have been added to improve night vision and motion detection. Nest Cam is smart enough to tell the difference between a torch and sunlight, so it won’t get confused and switch to day mode if an intruder shines a light at it.

Nest Camera

The Nest Cam costs £159 and will be available to purchase from a range of retailers including Amazon, John Lewis, Currys, PC World and B&Q.

For an additional monthly fee, users can subscribe to the Nest Aware cloud service, which allows them to scroll through 10 days of content for £8 per month or 30 days for £24 per month.

All video is stored and processed in the cloud. This allows Nest Cam to provide more accurate alerts when it detects movement in the house, and identify areas where common false alarms occur, like shadows moving across ceilings.

Users can make and share up to three hours of clips, including timelapses, and create custom ‘activity zones’ around areas of interest – such as a door – so they can be alerted to anyone coming in or going out.

“The cloud is not just used for video recording, but when you stream back to your phone, it can also be used for image processing – whether it’s algorithmic or to enhance resolution in certain areas or just get more depth, and you do that in real time,” said Mr Paillet.

The Nest Cam has a built-in microphone and speaker, so the user can talk to whoever is in their home via the smartphone app. Nest said that all data is encrypted in the cloud and while it is being transmitted between devices, to ensure it remains private and secure.

Although the primary purpose of the camera is home security, Nest also sees the potential for it to be used as an entertainment device. Nest is piloting the ability for users to stream directly to YouTube Live from a Nest Cam.

Unbox Therapy creator Lewis Hilsenteger, American videographer Devin Graham and YouTube personality Justine Ezarik have all been taking part in the pilot, giving viewers a behind-the-scenes look at their lives.

Nest said that some of the most popular camera feeds will stream directly to Nest’s own YouTube channel, so people can see live video of everything from puppies to scenic landscapes.

The launch of Nest Cam coincides with a refresh of the rest of Nest’s product portfolio, with the launch of the second-generation Nest Protect smoke alarm, new features for the Nest Learning Thermostat, and a new app for Android and iOS.

The new Nest Protect includes a sensor that can detect the small particles generated by fast-burning fires, as well as the large particles from slow-burning fires. It also carries out automatic safety checks and allows users to silence false alarms from their phones.

The Nest Learning Thermostat is getting new features via a software update, including safety temperature alerts to warn users if their home gets too cold, and the ability see smoke and carbon monoxide alerts from their Nest Protect on their thermostat screen.

Meanwhile the new app has a new look and added features that make it easier to control Nest products, as well as the ability for users to view live videos of their home via a Nest Cam and record clips.

“We’ve built a portfolio of best-in-class products that each stand on their own while doing more together,” said Nest chief executive Tony Fadell. “The result? Energy saved, lives spared, and countless memories recorded and shared.”

The new Nest Protect costs £89 and is available for purchase at nest.com. The new Nest Learning Thermostat software will begin rolling out today and will take up to two weeks to reach Nest customers. The Nest app is available for free in the Google Play Store and iOS App Store.

 

Posted by: In: Blog 14 Jul 2015 0 comments

Biometric technologies have been around for years, primarily providing physical access control or time and attendance. With the mounting integration of biometric readers into physical security network devices, such as desktops, laptops and mobile wireless devices, the shift has started a trend toward a more all-encompassing credentialing solution that strives to unify chief security officers (CSO) and their security colleagues. Another significant trend centers on the integration of biometrics into access card readers and badges that could be replaced with biometric devices.

Biometric devices quickly and automatically confirm the identity of end users by comparing patterns of physical or behavioral characteristics in real-time against enrolled computer records of those patterns. Leading technologies accomplish this by scanning data files of an individual’s fingerprint, hand, iris, palm or voice for authentication.

Functionality Going Well Beyond Physical Access

Many security industry insiders contend that biometrics enhance privacy by erecting a barrier between personal data and unauthorized access. Technically, biometrics-based capture devices create electronic digital templates that are encrypted, stored and then compared to encrypted templates derived from “live” images to confirm identity. The templates are generated from complex and proprietary algorithms and are then encrypted using strong cryptographic algorithms to secure and protect them from disclosure.

A number of post-9/11 federal government requirements are also driving biometrics into achieving dual functionality in both physical and logical security. For instance, with FIPS 201-1, CSOs are empowered with a tool to check the identity and status of individuals requiring access to enterprise or government resources. This increases capabilities beyond those of most legacy physical access credentials. It is important to understand the different authentication mechanisms and the levels of threat they mitigate. A CSO is in the best position to decide how to employ the FIPS 201-1 credential within the context of an overall security plan, bearing in mind requirements for throughput and operational and interoperability considerations for future expansions.

The high cost of data breaches and the need to meet compliance regulations are also pushing organizations to adopt heightened identity and access management (IAM) processes. Companies are looking to physical and logical identity convergence to increase security, reduce redundancies and create complete audit trails.

Converging physical and logical identity and access management enables organizations to more closely monitor which employees are requesting access to certain spaces and facilities, and not only when but also from where. In essence, identity convergence enables organizations to add a fourth factor of authentication. Traditionally, there are three possible ways in which employees can prove their identities: through (1) what they know via a password or personal identification number (PIN), (2) what they have via a proximity or smart card and (3) who they are via a biometric identifier. When physical and logical identity management processes are converged, companies can also use a fourth factor —where a person is — to verify identity.

Unified Credentialing Can Enhance Efficiencies

Without a unified policy, a person’s user accounts and credentials can become rogue identities that can be used by others to gain unauthorized access to information. With unified identity and access management processes, all of a person’s user accounts and credentials are managed centrally under a single identity. When he or she leaves, the identity and associated rights and privileges are removed, effectively disabling all of the user’s accounts and credentials assigned during the course of employment.

This integration also simplifies assigning employees new privileges when they take on new roles. Administrators can simply delete individuals from one user group and assign them to another to grant physical and logical access to everything necessary for the new role. This prevents the time lag that generally occurs in starting up a new user account — a period in which employees are unproductive or tempted to borrow each other’s account in-formation, a clear violation of many compliance regulations.

Physical and logical convergence also enables companies to use the same credentials, such as a fingerprint biometric, for physical and logical access. This can lower the cost of access control accessories as one authentication factor can be used for both, achieving a significant return on investment.

Using the same credential for both physical and logical identification requires technological interoperability. For example, the biometric reader on an employee’s laptop should use the same template to make a match at the biometric reader at the employee entrance.

Physical and logical convergence can also help organizations create more complete audit trails, enabling them to monitor not only the who, what, when and why of when confidential information is accessed, but the where and to whom as well. Security equipment manufacturers are moving rapidly to capitalize on a broad range of biometric applications, giving integrators an opportunity to help customers with much more than just security-related solutions.

Human eye being scanned by a futuristic interface. Digital illustration.

Human eye being scanned