It’s a new dawn, It’s a new day, It’s a new life…

It’s been a tumultuous few months during which all aspects of our lives have changed. As the ‘new normal’ is defined and workplaces begin to welcome employees back, those responsible for building services infrastructures are busy reappraising how existing technology and ways of operating need to be adapted and augmented to create more hygienic environments. Security and access control is no exception and has the potential to be a vital part of an effective infection control strategy.


Point of contact

By now we are used to washing our hands more frequently, using sanitiser before and after touching anything and avoiding physical contact with shared surfaces. Given what’s at stake from cross contamination, it’s not surprising that people are changing the way they engage with technology. Research from Foolproof found that 80 per cent of people believe they will now behave differently when interacting with public technology that they have to touch.

This cautious attitude will hopefully permeate into the workplace. Initially at least, returning employees are likely to be nervous, apprehensive and uncertain. On top of that, a place that was previously familiar may now seem alien and there is likely to be some confusion about how any new operational policies work in practice. A building’s security and access infrastructure will therefore play a vital part in reducing bottlenecking, enabling people counting, enforcing social distancing, ensuring wait and hold areas operate correctly, and maintaining the effectiveness of one-way systems.

Greater consideration will also need to be given about how people access and egress a building, who is on the premises, where they are, how long they’ve been there for and who they have been in contact with. This will involve assessing how access control can be integrated with identification credentials such as cards, tokens and smartphones, and devising ways to check whether facemasks and other items of personal protective equipment (PPE) are being correctly worn, or if temperature screening has been carried out.

On the radar

This is where video verification, video analytics and greater integration of security and access control provide vital business intelligence (BI). BI now has the ability to evolve from something that simply supports sales operations to providing data that builds resilience and maintains safety.

Social distancing will remain a key facet of lockdown easing and infection control strategies, so identifying, verifying and analysing where in a building this is not taking place, and acting on it quickly, is imperative. Video management and analytics systems can establish awareness of a situation, confirm that distances are being maintained, respond to unsafe behaviour and analyse data to identify areas and activities that are proving problematic. Integration with other security and access control technology makes it possible for designated personnel to be sent real-time alerts when people are too close together or a space is overcrowded.

Any issues need to be dealt with quickly and it might not always be practical to deploy security personnel to attend. Both audio and visual messaging can be integrated with video to automatically send a message to politely remind building occupants to maintain a safe distance if the video identifies people crowding in a particular area.

Touchy subject

Viruses and bacteria are able to survive on surfaces for up to three days and, put simply, the fewer particles that are on a surface, the lower the chances that someone touching it will become infected. Although contactless technology has been considered a luxury rather than a necessity, this will change as employers and building managers make their buildings as hygienic as possible in order to mitigate any potential health risks.

Avoiding the use of devices that could easily become contaminated should be high on the agenda. Take, for instance, the humble request to exit (RTE) button, which has become a common access control device but is often touched by many hundreds of people each day. Contactless variants are now available to help reduce the possibility of cross contamination and protect occupants, while also lowering the number of surfaces that need to be regularly cleaned.

The current situation will also hasten the move towards contactless biometric technologies, as well as mobile credentials. The latter allows a user to authenticate their smartphone and use it as a way to enter and exit a building. Gartner has predicted that by the end of this year 20 per cent of organisations will use smartphones in place of traditional physical access cards and tokens. Highly secure, they offer a range of contactless identification modes and often incorporate two-factor authentication (2FA) functionality, which allows them to be used for contact tracing. Quick and easy to configure, by downloading an app a virtual credential can be produced in a smartphone wallet, allowing the user to have multiple virtual ‘keys’ for different areas or sites.

Opportunity knocks

As we enter unchartered territory, it also provides an opportunity for organisations to look at how they can reduce the capital and operational expenditure associated with their security and access control systems. Cloud based options are outpacing all other forms of security technology adoption and for those that haven’t moved in this direction, now is the perfect time.

The cloud allows users to pay as they go, tap into advanced technology as required, lower the amount of on-site IT resources they need and make the use of remote monitoring easier. Meanwhile, planned preventative maintenance, firmware and software updates, regular patching, firewalls, malware prevention, encrypted password changes and other preventative safeguards protect data. To highlight the importance of this, a study by Morphean found that 77 per cent of respondents believe that their physical security systems are not optimised. This has significant data integrity implications can contravene the General Data Protection Regulation (GDPR).

One step beyond

As we enter the post-lockdown era organisations need to use security and access control technology in smarter ways than ever before in order to combat the spread of infection, protect building occupants, create more hygienic workplaces and adhere to new safety guidelines, while observing data protection regulations. For many this will be a step into the unknown and a daunting task, however, adapting to the fundamental changes in the way we work, as well as in workplace design and operation, will be made easier through the use of technology that is readily available and by working with best in class manufacturers.

Credit: Pete England – Global Product Manager

For more information, please contact us : [email protected]  or +44 (0) 161 406 3400

ievo

Type of Integration: Biometrics

Software: ievo

Description: The integration between ievo fingerprint readers and PAC access control provides a secure and scalable biometric solution suitable for your access control needs. The ievo biometric range of readers comes complete with a PAC output enabling direct connection to any of the PAC 511 and 512 series of controllers and is CPNI certified. The ievo readers have been designed after many years of research by a team of professionals who have been at the cutting edge of biometric deployment, installation, and integration and they are guaranteed to work accurately, with a strong emphasis on efficiency and reliability.

Key benefits & features when integrated with Comelit-PAC:

  • ievo biometric readers are compatible with any PAC 511 and 512 series controllers
  • ievo biometric readers support the use of users fingerprints as a credential
  • ievo biometric readers can be used at a point of entry to verify users via their fingerprint
  • All compatible ievo readers are fully integrated with Access Central™ management software enabling them to be easily incorporated within a new or existing PAC access control system

Additional costs: n/a

PAC Compatibility: Access Central™ v5.4

Languages available: English, German, French, Spanish, Italian, Dutch.

How to buy/Contact: Please contact [email protected] or call +44 (0) 1707 377203 to buy compatible ievo products.

EntrySign

Type of Integration: Visitor Management

Software: EntrySign

Description: EntrySign is an easy, simple, and smart Visitor Management system. Designed for and installed in small to large organisations across the UK and worldwide. EntrySign is suitable for a multitude of industry solutions including education, healthcare, industrial, commercial, and public sector. Available as a self-contained standalone kiosk, or as a desk or wall-mounted solution, EntrySign simplifies your sign-in process, reduces administration, improves health and safety, safeguarding and security. EntrySign seamlessly integrates with PAC access control systems and is the perfect addition for a truly integrated solution.

Key benefits & features when integrated with Comelit-PAC:

  • Share RFID card/fob technology between EntrySign and PAC access control solutions
  • Push users from EntrySign > Access Central™
  • Pull users from Access Central™ > EntrySign
  • Push credentials from EntrySign > Access Central™
  • Pull credentials from Access Central™ > EntrySign
  • Open doors/speed lanes/barriers
  • Issue one-time access control links
  • Pre-book visitors and contractors
  • Receive visitor arrival notification via email/SMS
  • Contactless sign in via QR code

Additional costs: n/a

PAC Compatibility: Access Central™ v5.4

Languages available: English (UK), English (US), French, German, Italian, Dutch, Japanese, Latvian, Arabic, Spanish, Spanish Latin, Welsh, and Urdu. Other languages available upon request.

How to buy/Contact: Please contact Osborne Technologies at [email protected] for any orders or queries. Alternatively visit EntrySign website www.entrysign.co.uk/comelit or call +44 (0)1226 295455.

Dahua

Type of Integration: Thermal Monitoring

Software: Dahua

Description: PAC’s long-standing tradition of security integration is now extended to the Dahua Temperature Monitoring Terminal, which has functionality to check a person’s temperature and determine if a face mask is being worn when entering a building or area. The ability to secure the building and protect the occupants is a true value add for customers planning strategies in times when minimising the risk of infection and preventing the spread of the virus are critical. The recommended means of installation ensures that access rights for individuals can be dynamically managed. Taking an output from the Dahua Thermal Monitoring Terminal into the PAC access control system will withdraw access rights for anyone who does not meet the user configured thresholds.

Key benefits & features when integrated with Comelit-PAC:

    • Enables a single access control system for management of all secured areas/entrances
    • Supporting the Dahua temperature and mask checking functionalities before enabling use of the PAC access control credential to unlock the secured entrance
    • Enables clear demarcation of building controls as the PAC access control system is used for all access control and the Dahua Thermal Monitoring Terminal is used as added check for temperature and mask wearing

Additional costs: n/a

PAC Compatibility: Access Central™ v5.4

Languages available: English

How to buy/Contact: Please visit Where to Buy – Dahua Technology (dahuasecurity.com) for more details on how to buy.

Thinking Software​

Type of Integration:Time & Attendance (API)

Software: Thinking Software – RotaOne

Description: RotaOne is a powerful time and attendance system. Whether you’re a small hotel or a multinational manufacturing company, RotaOne helps you manage shifts and staff rotas, record employee time and attendance, control employee holidays, absences and much more!

Key product benefits & features:

  • Easily add authentication applications to PAC OPS™ credentials via built-in encoding solution.
  • Windows compatible software.
  • High Resolution 300dpi printing on ISO proximity cards.
  • 3-year product warranty and lifetime warranty on the print head.
  • Compliant with UL, CE, FCC, KC, CCC, CSA

Security features:

  • Ribbon erase function prevents leakage of personal information.
  • IPSec Security for Secure Data Encryption IPv6 and IPv4.
  • Secure lock for input hopper and supplied/front door housing.

Additional costs: n/a

How to buy/Contact: Please contact [email protected] or call +1 732-271-7369.

Digital ID

Swiftpro K30D Retransfer Card Printer

Partner function: Application encoding on ISO prox. cards and ID badge printing

Partner: Digital ID

Description: The Swiftpro K30D retransfer card printer has an outstanding print quality for single and double sided printing with 300dpi printing density. The ultra-fast Swiftpro K30D printer is available with contact and contactless smart code encoding technologies and 100-card input and output hoppers, with an optional 250-card input hopper upgrade.

Widely used throughout Education, Healthcare, Government, Corporate, Retail, Finance, Transport, Residential market sectors.

Key product benefits & features:

  • Easily add authentication applications to PAC OPS™ credentials via built-in encoding solution.
  • Windows compatible software.
  • High Resolution 300dpi printing on ISO proximity cards.
  • 3-year product warranty and lifetime warranty on the print head.
  • Compliant with UL, CE, FCC, KC, CCC, CSA

Security features:

  • Ribbon erase function prevents leakage of personal information.
  • IPSec Security for Secure Data Encryption IPv6 and IPv4.
  • Secure lock for input hopper and supplied/front door housing.

Additional costs: n/a

How to buy/Contact: Please contact [email protected] or call +1 732-271-7369.