Safe, secure, SCS
Feel free to call us: 0800 098 8131
Posted by: In: Blog 30 Aug 2016 0 comments
“Fingerprint access control system market” is expanding its roots into commercial, government as well as healthcare sectors. Its high penetration rate is projected to pose potential opportunities to the industry demand. North America fingerprint access control systems market was sized over USD 850 million in 2014.

Global fingerprint access control systems market size is expected to reach USD 4.4 billion by 2022, growing at a CAGR of over 7% from 2015 to 2022. Escalating safety and security threats is anticipated to drive industry growth. Fingerprint authentication offers a reliable solution to enhance access control thus, assists to mitigate security breaches as well as transaction frauds.

The global smartphone industry was valued at USD 2.5 billion in 2013. It is expected to reach USD 4.4 billion by 2022, growing at a CAGR of 7% over the coming years. Emergence of multi-functional and cost-effective smartphones is expected to fuel growth. Huge demand from Asia Pacific is estimated to drive fingerprint access control systems market demand.

Highly competitive business environment is likely to boost confidentiality needs for organizational data and information. Biometric systems market is anticipated to witness significant growth owing to incapability of password and security PINs to safeguard the data. This safety equipment is increasingly implemented for home fortification. Government around the globe is now taking stringent initiatives for biometric enrolment of their citizens. Advent of projects such as national identification programs, e-passports and border control are expected to drive industry growth. This measure can be attributed to secure borders, prosecute criminals, verify immigration or employment and combat identity fraud or terrorism

Implementation of this system requires huge capital investment. Apart from installation cost, it also involves allied expenses such as enrolling users, administering the system and training expenditures. However, theft or misuse of data is likely to pose a serious risk to the individual’s security. Fingerprint access control system market is expanding its roots into commercial, government as well as healthcare sectors. Its high penetration rate is projected to pose potential opportunities to the industry demand.

Product Overview

Capacitive products accounted for over 27% of the overall industry share in 2014. It is anticipated to exceed over USD 1.3 billion by 2022 owing to its low cost as well as compact size. Optical products were valued over USD 900 million in 2014. It is estimated to grow at a CAGR of over 7% from 2015 to 2022. The growth can be attributed to high image quality robust long life of the system.

Application Overview

Commercial application was the leading segment, valued over USD 850 million in 2014. It is expected to exceed USD 1.4 billion by 2022, growing at a CAGR of 6.5% over the forecast period. The surge can be addressed to rising safety as well as security demands in various organizations. Consumer electronics accounted for over 4.5% of the overall market share. The growth can be accredited to rapid growing need for access control features in tablets & smartphones.

Browse Related Category Market Reports @

Image Sensors Market

Position Sensors Market

Regional Overview

North America fingerprint access control systems market was sized over USD 850 million in 2014. It is projected to accumulate more than 30% of the overall industry share by 2022. Regional growth can be attributed to flourishing biometric application in healthcare as well as consumer electronics industries.

Asia Pacific fingerprint access control systems market is expected to witness considerable growth owing to increasing government initiatives in the region. It is likely to grow at a CAGR of over 7.5% from 2015 to 2022.

Competitive Market Share

The global fingerprint access control systems market share is highly consolidated by top three companies. 3M Cogent, Safran Group and NEC Corporation are estimated to account for more than 70% of the overall industry share in U.S. Other key players include Suprema, HID Global (Assa Abloy), Cross Match, Fingerprint Cards (FPC), Aware Inc, SecuGen, Daon Inc and Anviz Global among others.

Posted by: In: Blog 07 Apr 2016 0 comments

Tyco Security Products announces the integration of its C•CURE 9000 security and event management system from Software House with SALTO offline locks for seamless access control of an entire building through a single user interface.

The C•CURE 9000/SALTO solution is ideal for access control systems that require varying levels of security for interior and exterior access points. The solution deploys SALTO offline locks for interior doors that require a moderate level of security, such as storage and office areas, while Software House hard-wired door controllers are used for high security and perimeter access points. With this solution, security operators can control access to all doors into and within the facility through the C•CURE 9000 user interface, based on communications between C•CURE 9000 and the SALTO server.

“The C•CURE 9000/SALTO solution is a powerful integration that simplifies access control management by joining offline locks and hard wired doors together,” said Jason Ouellette, Product Line Director, Access Control, Tyco Security Products. “With C•CURE 9000 and SALTO, facilities can manage their entire access control infrastructure with a single credential and management platform.”

The C•CURE 9000/SALTO solution supports a nearly unlimited number of offline locks and uses SALTO online readers to update cards for offline reader access. The use of access cards for doors instead of mechanical keys results in cost savings, saving human and monetary resources previously spent on lost key replacement. The C•CURE 9000 guided user interface and single sign-on credentialing makes access control management more efficient and user-friendly. With the C•CURE 9000/ SALTO lock solution, no cabling is required for lock installation and offline locks can be installed on almost any door type.

To learn more about how Access Control can benedfir you contact Simon or Neil at SCCS.

Posted by: In: Blog 05 Nov 2015 0 comments

One of our key suppliers in Access Control is Paxton, a UK company who has been a leader in developing complete access control systems including Hardware, Software and Services.

The next generation of Door Entry Systems are now available:

paxton door access

Net2 Entry – Paxton’s award winning door entry solution, is probably the simplest door entry system on the market. Over the years SCS has installed many. many Paxton Access Control Systems.

You can now get your hands on the next generation of Net2 Entry panels, offering enhanced door entry functionality for versatile security and building management.

Net2 Entry works standalone or alongside Net2 access control, combining door entry with key features of Net2. It is a scalable solution, allowing expansion of up to a hundred panels and a thousand monitors.

Features of the new panels:

  • Smart new design – Net2 Entry standard panel available in anthracite grey and the Net2 Entry vandal resistant panel in stainless steel are both available in flush mount, surface mount and rain hood variants
  • Reads Paxton and MIFARE® token technology – ideal for sites using MIFARE® tokens
  • Pan/tilt functionality to capture an angled view – increase security

v2.14 system update includes

  • Grouping – enables partitioning of sites, buildings and floor levels. Ideal for sites ranging from multi-tenanted buildings, such as office or apartment blocks, to gated communities
  • Improved 3rd party SIP compatibility – RFC2833 DTMF protocol means Net2 Entry is SIP compatible with third party products to meet a large range of customer requests

Net2 Entry features:

  • Just 3 components, simply plug together
  • Units auto detect for easy installation
  • Easy plug and play expansion for large systems
  • Inbuilt Net2 access control for a complete solution
  • Intruder alarm and secondary camera integration for ultimate convenience
  • Full colour video camera –low light sensitivity for day/night use
  • Additional SIP backup server if primary server fails
  • IK10 impact rated *VR only
Posted by: In: Blog 10 Oct 2015 0 comments

ASSA ABLOY Access Control’s latest Aperio® wireless cylinders, PINpad escutcheon and L100 – the world’s first complete wireless security lock, have all been integrated into the latest Software House access control system.

Aperio® is designed to upgrade mechanically locked doors and wirelessly connect them online and to new or existing access control systems. With minimal modification to doors and premises; Aperio® offers a cost effective and simple security upgrade.


Rafael Schrijvers, Product Marketing Manager for EMEA at Tyco Security Products, said:

“Our C•CURE 9000 system is one of the industry’s most powerful and flexible security management systems, allowing our customers to monitor events and manage personnel.

“Aperio® is wireless; therefore avoids invasive cabling, allowing quick and easy installation that will not be intrusive, ideal for installation listed buildings and other heritage projects.

“We have already deployed the solution across a number of healthcare and education projects and are looking to potentially integrate with more Aperio® in the future.”

Posted by: In: Blog 05 Aug 2015 0 comments

Nest Labs, the home automation company bought by Google for $3.2 billion last year, has launched its first new product since the acquisition – a home security camera

Google-owned thermostat and smoke alarm maker, Nest Labs, has announced it is moving further into the ‘connected home’ with the launch of its first security camera, called Nest Cam.

Nest Cam builds on the features of Dropcam – the start-up Nest acquired for $555m (£326m) in 2014 – including the ability to upload videos to the cloud and live stream them to a smartphone or computer.

However, Nest has added a slew of new features including full high-definition (1080p) video quality, improved night vision and a new design with a magnetic base that can twist around, bend at an angle, or be mounted upside down.

“It was always a no brainer that a camera would have a place in the home,” said Lionel Paillet, Nest’s general manager for Europe. “We spent a lot of time building on the Dropcam experience to nail it and really get it right.”

Nest Cam has a 130-degree viewing angle and a glass lens with a digital zoom that can magnify the picture up to eight times, allowing users to see fine details even from across the room.

Eight infrared LEDs and new algorithms have been added to improve night vision and motion detection. Nest Cam is smart enough to tell the difference between a torch and sunlight, so it won’t get confused and switch to day mode if an intruder shines a light at it.

Nest Camera

The Nest Cam costs £159 and will be available to purchase from a range of retailers including Amazon, John Lewis, Currys, PC World and B&Q.

For an additional monthly fee, users can subscribe to the Nest Aware cloud service, which allows them to scroll through 10 days of content for £8 per month or 30 days for £24 per month.

All video is stored and processed in the cloud. This allows Nest Cam to provide more accurate alerts when it detects movement in the house, and identify areas where common false alarms occur, like shadows moving across ceilings.

Users can make and share up to three hours of clips, including timelapses, and create custom ‘activity zones’ around areas of interest – such as a door – so they can be alerted to anyone coming in or going out.

“The cloud is not just used for video recording, but when you stream back to your phone, it can also be used for image processing – whether it’s algorithmic or to enhance resolution in certain areas or just get more depth, and you do that in real time,” said Mr Paillet.

The Nest Cam has a built-in microphone and speaker, so the user can talk to whoever is in their home via the smartphone app. Nest said that all data is encrypted in the cloud and while it is being transmitted between devices, to ensure it remains private and secure.

Although the primary purpose of the camera is home security, Nest also sees the potential for it to be used as an entertainment device. Nest is piloting the ability for users to stream directly to YouTube Live from a Nest Cam.

Unbox Therapy creator Lewis Hilsenteger, American videographer Devin Graham and YouTube personality Justine Ezarik have all been taking part in the pilot, giving viewers a behind-the-scenes look at their lives.

Nest said that some of the most popular camera feeds will stream directly to Nest’s own YouTube channel, so people can see live video of everything from puppies to scenic landscapes.

The launch of Nest Cam coincides with a refresh of the rest of Nest’s product portfolio, with the launch of the second-generation Nest Protect smoke alarm, new features for the Nest Learning Thermostat, and a new app for Android and iOS.

The new Nest Protect includes a sensor that can detect the small particles generated by fast-burning fires, as well as the large particles from slow-burning fires. It also carries out automatic safety checks and allows users to silence false alarms from their phones.

The Nest Learning Thermostat is getting new features via a software update, including safety temperature alerts to warn users if their home gets too cold, and the ability see smoke and carbon monoxide alerts from their Nest Protect on their thermostat screen.

Meanwhile the new app has a new look and added features that make it easier to control Nest products, as well as the ability for users to view live videos of their home via a Nest Cam and record clips.

“We’ve built a portfolio of best-in-class products that each stand on their own while doing more together,” said Nest chief executive Tony Fadell. “The result? Energy saved, lives spared, and countless memories recorded and shared.”

The new Nest Protect costs £89 and is available for purchase at The new Nest Learning Thermostat software will begin rolling out today and will take up to two weeks to reach Nest customers. The Nest app is available for free in the Google Play Store and iOS App Store.


Posted by: In: Blog 14 Jul 2015 0 comments

Biometric technologies have been around for years, primarily providing physical access control or time and attendance. With the mounting integration of biometric readers into physical security network devices, such as desktops, laptops and mobile wireless devices, the shift has started a trend toward a more all-encompassing credentialing solution that strives to unify chief security officers (CSO) and their security colleagues. Another significant trend centers on the integration of biometrics into access card readers and badges that could be replaced with biometric devices.

Biometric devices quickly and automatically confirm the identity of end users by comparing patterns of physical or behavioral characteristics in real-time against enrolled computer records of those patterns. Leading technologies accomplish this by scanning data files of an individual’s fingerprint, hand, iris, palm or voice for authentication.

Functionality Going Well Beyond Physical Access

Many security industry insiders contend that biometrics enhance privacy by erecting a barrier between personal data and unauthorized access. Technically, biometrics-based capture devices create electronic digital templates that are encrypted, stored and then compared to encrypted templates derived from “live” images to confirm identity. The templates are generated from complex and proprietary algorithms and are then encrypted using strong cryptographic algorithms to secure and protect them from disclosure.

A number of post-9/11 federal government requirements are also driving biometrics into achieving dual functionality in both physical and logical security. For instance, with FIPS 201-1, CSOs are empowered with a tool to check the identity and status of individuals requiring access to enterprise or government resources. This increases capabilities beyond those of most legacy physical access credentials. It is important to understand the different authentication mechanisms and the levels of threat they mitigate. A CSO is in the best position to decide how to employ the FIPS 201-1 credential within the context of an overall security plan, bearing in mind requirements for throughput and operational and interoperability considerations for future expansions.

The high cost of data breaches and the need to meet compliance regulations are also pushing organizations to adopt heightened identity and access management (IAM) processes. Companies are looking to physical and logical identity convergence to increase security, reduce redundancies and create complete audit trails.

Converging physical and logical identity and access management enables organizations to more closely monitor which employees are requesting access to certain spaces and facilities, and not only when but also from where. In essence, identity convergence enables organizations to add a fourth factor of authentication. Traditionally, there are three possible ways in which employees can prove their identities: through (1) what they know via a password or personal identification number (PIN), (2) what they have via a proximity or smart card and (3) who they are via a biometric identifier. When physical and logical identity management processes are converged, companies can also use a fourth factor —where a person is — to verify identity.

Unified Credentialing Can Enhance Efficiencies

Without a unified policy, a person’s user accounts and credentials can become rogue identities that can be used by others to gain unauthorized access to information. With unified identity and access management processes, all of a person’s user accounts and credentials are managed centrally under a single identity. When he or she leaves, the identity and associated rights and privileges are removed, effectively disabling all of the user’s accounts and credentials assigned during the course of employment.

This integration also simplifies assigning employees new privileges when they take on new roles. Administrators can simply delete individuals from one user group and assign them to another to grant physical and logical access to everything necessary for the new role. This prevents the time lag that generally occurs in starting up a new user account — a period in which employees are unproductive or tempted to borrow each other’s account in-formation, a clear violation of many compliance regulations.

Physical and logical convergence also enables companies to use the same credentials, such as a fingerprint biometric, for physical and logical access. This can lower the cost of access control accessories as one authentication factor can be used for both, achieving a significant return on investment.

Using the same credential for both physical and logical identification requires technological interoperability. For example, the biometric reader on an employee’s laptop should use the same template to make a match at the biometric reader at the employee entrance.

Physical and logical convergence can also help organizations create more complete audit trails, enabling them to monitor not only the who, what, when and why of when confidential information is accessed, but the where and to whom as well. Security equipment manufacturers are moving rapidly to capitalize on a broad range of biometric applications, giving integrators an opportunity to help customers with much more than just security-related solutions.

Human eye being scanned by a futuristic interface. Digital illustration.

Human eye being scanned

Posted by: In: Blog 07 Jul 2015 0 comments

The global smart security market is expected grow at 18.6% CAGR over the next few years until 2019, according to Infiniti Research.

The forecast covers end users of smart security such as residential users, commercial sector, utility sector and government sector.

The research indicates that the rise in terrorist attacks has forced many countries to implement smart security solutions. The U.S. government has taken initiatives to investigate and identify criminals by using security systems like video surveillance, access control systems, intruder alarms, perimeter intrusion prevention systems and advanced software.

Also, the study mentions that terrorism has increased significantly in areas like the Philippines in the last few years, resulting in an increased number of deaths from 2012-2013. This has led to higher demand for smart security solutions.

The report emphasizes cloud-based video surveillance systems, which provide a more cost-effective and flexible solution for end users to invest in.

Smart security solutions are used to monitor the activities and behavior of people in areas that are more prone to unauthorized access or damage, such as enterprises, educational institutions, commercial buildings and utility infrastructure.

Smart security includes advanced security systems such as IP surveillance cameras, biometric access control systems, integrated perimeter intrusion prevention systems and wireless alarms.

These solutions can secure an area from miscreants, terrorist activities and data theft.

Posted by: In: Blog, Video 07 Jun 2015 0 comments

This caught our eyes as we are always looking for enhanced products to bring to our clients especially in the CCTV space. There are a great deal of products on the market and most are average at best.

This new FLIR TCX Thermal Mini Bullet camera (pictured is the ceiling mount version) looks interesting. The makers say it combines 24/7 thermal video and built-in video motion detection. FLIR TCX is powered by the company’s Lepton camera core.

FLIRTCXceilingmount CCTV Camera

FLIR say that their TCX outperforms visible-light cameras by providing the advantage of seeing clearly in darkness without any illumination, in bright sunlight, through smoke, dust or even light fog – reducing false alarms. The makers say that their product is suitable for indoors and out – even in temperatures as cold as minus 40 degrees C – and for public buildings, factories, large and small businesses, or residential areas. Featuring intrusion detection and accurate video alarm verification in one device, TCX supports lighting control, people counting, retail traffic flow, and queue management, and enables other applications, including:

• Intrusion/presence detection: vehicles, people, animals
• Video alarm verification
• Night vision – 24/7 CCTV
• Residential security
• Short-range perimeter security
• Safety and fire assessment

John Distelzweig, Vice President and General Manager of FLIR Security, said: “Whether you’re a small business looking for intrusion detection and video alarm verification, a retail company looking for a solution to monitor customer traffic flow, or a small business trying to prevent break-ins, the TCX Mini Bullet is an extremely accurate solution.”

Contact Simon at SCS to lear more.

Posted by: In: Blog 16 Sep 2014 0 comments

The Manager’s Handbook for Business Security is designed for new or current security managers who want build or enhance their business security programs. This book is not an exhaustive textbook on the fundamentals of security; rather, it is a series of short, focused subjects that inspire the reader to lead and develop more effective security programs. Chapters are organized by topic so readers can easily-and quickly-find the information they need in concise, actionable, and practical terms.

managers handbook

This book takes you through the business case for ‘crafting a measurably effective security program’. Chapters cover leadership (how to influence others, such as the legal and marketing people inside the business), risk assessment, selling the ‘security program’ to the business, information and physical security, how to raise awareness (and of what), resilience, good conduct (or ‘corporate hygiene’), the supply chain, and last but definitely not least metrics. Whole books have been devoted rightly to subjects that the authors whizz through in ten pages or fewer, such as ‘safe and secure workplaces’. That is no criticism; there’s simply so much to do, to push through change, to make security in an organisation professional, so that when an emergency or data theft happens, it’s tackled, and lessons are learned. The book ably sets out how the head of security management has to be a manager besides a security figure; and has to build a team, communicate well, and anticipate. Highly, highly recommended for the reader who aspires to be a chief security officer, or is in corporate security already and wants to brush up.

Available from Amazon for £57.00


Posted by: In: Blog 28 Aug 2014 0 comments

The rapid rise and innovation in Home Automation is poised to change many aspects of home security. The evolution of home automation technology, which is now easily attainable by a majority of consumers, has forever changed the landscape of the  home security market, according to a new research note from Blake Kozak, senior analyst for security and building technologies at IHS. Over the past several years, for example, a number of big cable and telecommunications companies have entered the market offering both security and home automation services, altering both the perception and demand for these systems in the process. Here is the rest of Kozak’s note on the state of the market.

Prior to this paradigm shift, the use of a residential burglar alarm system was often a purchase to protect a property and in many cases, an ‘after the fact’ purchase as a result of a break in. While many reasons exist to why a homeowner may purchase security equipment, the reason is no longer solely security, with many users looking to add additional features which are life safety and convenience driven. 

IHS estimated the world market for security devices in traditionally monitored homes [for example – ADT] to be worth about $2.9 billion in 2014, compared with $670 million for smart homes [for example – ADT Pulse]. By 2018, the revenue of smart homes is forecast to top $2.4 billion, according to a recent report from IHS.

These rapid changes to the residential security market have been mostly positive; however, the influx of competitors has dramatically changed the make-up of this industry. Ten years ago, professionally installed, centrally monitored systems were the main offer available to end-users. However, this has changed and today products are offered by monitoring companies, MSOs (multiple-system operators), electric companies, retailers and DIY (do-it-yourself) equipment manufacturers. End-users can find innovative products from new market entrants such as Google and Apple which until recently did not have an offering for the residential security or home automation space.  

So what does this mean for ‘smart’ residential security market moving forward? For manufacturers, it means despite the increase in competition, the market offers ample opportunity for all due to the current, low penetration rate of smart products. For end-users its means more product/solution and pricing options are available than ever before. Finally for the dealers, installers and monitoring companies, the release of new, innovative products/solutions creates better sales opportunities by being able to better meet customers’ needs and budgets.”


The Google Nest is one of the first radically smart home products in that it monitors smoke and air quality levels and communicates with a home owner. We expect many more of these types of products to appear over the coming months.