Public Safety vs. Public shootings

Unfortunately, it appears that public shooting rampages are no longer a rare event.  One or two events are in the news or making breaking news every month.  As managers of both public and private buildings, we in the building maintenance industry are faced with an increasingly important challenge: how to keep the occupants of our buildings safe. This entails both keeping out trespassers and providing safety measures for the interior of the building in cases of emergency.

This is where the security experts at LaForce can help you. They can work with you to design a security system for your particular building needs. Options and benefits can include:

• In case of an emergency, lock down your entire facility in an instant.

• Control who can enter the building at what time, and which entrance they can use, along with an audit trail of all transactions.  This can be applied to employees and visitors.

• Lock down the building during business hours and restrict access to only those who have been granted access via user rights and credentials.

• No more handing out keys that are not returned or that are handed off to others without your knowledge.  No more rekeying all locks when keys are lost or compromised.

• 24-hour surveillance prevents theft, decreases violence and offers increased security and peace of mind.

• Access and control your security system from anywhere around the world via the web or mobile device.

To learn more about how we have helped other facilities and how we can help you, check out this case study.

Near Field Communication and Mobile Access

Times are changing. In the past it was uncommon for anyone to leave the house without their wallet or purse. Now, it is now uncommon for people to leave the house without their mobile devices, especially their smart phones. If you forgot your wallet or purse, oh well. You forgot your phone? Turn that car around as fast as you can! In fact it takes 226 hours for a person to report a stolen or lost wallet. It only takes 68 minutes to report a lost or stolen phone (Unisys, 2012).

With this new need for smart phones, it is an easy and sensible transition to have our mobile phones become our form of identify, way to purchase and, from the door and hardware industry, a way to control access to our secured buildings. More and more time is being spent developing solutions to unlock doors and allow access by using a mobile device with key apps and built in chips or smartcards (credentials).  One swipe of your device in front of a door reader and the lock strike unlatches.  Your phone is becoming the digital key, and there is no need for key fobs, mechanical brass keys or plastic cards.

This Near Field Communication (NFC) technology can be set to allow different levels of access control, just like using a key fob, and different phones can have different access levels. A high degree of security and privacy can be provided with the smart phones, while still being flexible and easy to operate and make changes to the system.  This type of technology is not wide-spread, yet. But it is predicted that in the near future, college campuses, employee entrances to businesses, and hotels will be filled with access control readers that are operated using a smart phone.

The idea of security on the smart phone is always in question. Could someone hack into your phone or phone system and steal your credentials that open your secure entrances?  Smartphone credentials are protected from this theft by using anti-playback technology.  Each time the phone is used for access control, the anti-playback technology changes the code, so one transaction cannot be cloned. The code that allows you to enter once will not work a second time.  Also, the coding that provided access used encrypted credentials and all the information about the credentials is by passwords and pins in case the phone is lost or stolen.

As we become more and more reliant on our smart phones, why not use them as the “key” to our entrances?  By using this new technology, we have the luxury of not having to carry with us one more key, fob or card.

Biometric Access Control Technologies

After being at ASIS show in Chicago a couple weeks back and seeing the newest technology first hand, Rob R., LaForce Security Integration specialist, notes a few of his insights.

“The surest way to know exactly who is coming and going into a secure area is with biometric technology.  A brass key, push keypad, credential card or fob can be borrowed, lost or stolen, but it is very difficult to borrow, replicate or steal a person’s biometry.  Biometric technology has come a long way in recent years.  It once only read a person’s fingerprint. Now it goes much deeper and can even read vascular structure.

Biometric solutions are more affordable than ever before with increasing sophistication and reliability.  There are several models LaForce works with, including Suprema’s BioEntry Plus and Bioscrypt 4G V-Flex.  Both have proven to be reliable for customers demanding a secure and flexible technology.  These products work with most access control systems and can be used in place of most card credential readers at an opening.  These types of products perform best when they are kept clean and are protected from the weather.

Newer and more costly biometric technologies including facial recognition, retina scanners and many others continue to be developed. In fact, at the ASIS Show in Chicago, I was able to see and experience an over-the-door iris-based identity authentication system first hand at the Stanley booth.  After being registered for the first time, the Eyelock HBOX device read my retina as I walked up to the door and upon validation, the automatic door opened while stating my name.  Stanley also offers a smaller version for a single operated door with less traffic known as the Eyeswipe.  The best aspect of biometric technology is the fact you do not need to carry keys or an access card with you.  Your body essentially becomes the credential which no one can replicate… at least for now.”

3 Types of Host Systems for Your Building: PC/Server Software-based vs. Browser-based vs. Cloud-based

Did you know there are different types of software management systems for your building’s access control and security system?  Each of these systems has its advantages. The three systems include PC\Server Software-based (the oldest technology, 40+ years) Browser-based (technology less than 10 years old) and Cloud-based (the newest technology).

1.)    PC/Server Software Based System

Access Control (entry throughout the building):

This system requires a personal computer (PC) or Server for software installation and operation.   Depending on software, there is the ability to interface the data with other computer systems, but this leads to a more specialized system. This is the most common and traditional approach to host sytems.

Connection Availability:

Although the building’s access system will still control the building’s security, if the PC or Server crashes, you will not be able to make changes to the software. The system will be forever the same. To allow system editing capability to return, the computer would need to be rebuilt, the software would need to be re-install and system data would need to be restored, which can become very costly.

Common Uses:

The PC/Server Software based system is most common for large enterprise systems.  This system is appropriate for those with an full-time IT/computer staff that can manage the data because there is a medium to high need for continuous motoring and editing.

Cost:

There is a one-time installation and set-up fee for this type of system, but it typically requires a dedicated PC or Server to maintain software.  There are no recurring fees for the system itself.

2.)    Brower Based System

Access Control:

The access control in this system is controlled through your internal computer network. Given the proper permissions, any computer or device connected to the network can access the system via a browser based interface like Internet Explorer, Firefox, Chrome or Safari.  The Internet is not required to connect to this system.

Connection Availability:

This system does not require a PC/Server for control, since there is no software to be installed.  The system’s software resides on a system controller (a small unit, like a modem, usually based in an office) and accessed via a browser.  If the system controller crashes or fails, it will need to be replaced and the backup information restored to the system controller.

Common Uses:

This system is appropriate for small to medium size businesses with low to medium need for a IT/computer staff to motor the system’s changes and capabilities.

Cost:

There is a one-time installation and set-up fee.  There are no recurring fees.

3.)    Cloud Based  

Access Control:

To control the access controls in this system and for the controls to function properly, the Internet is required.  The Cloud based computing system is very similar to on-line banking.  The software resides on a secure server on the World Wide Web and the software can be accessed from anywhere with internet connection.

Connection Availability:

This system does not require software to be installed on a PC/Server; the software resides on a secure website.  No need to worry about data, backups or computer failures.

In the event the Internet is unavailable, the building’s access system will still control the building’s security, but you will not be able to make changes to the software.

Common Uses:

This system is appropriate for property management companies, where there is little to no IT/computer staff available to monitor or make changes to the system.

Cost:

There is a one-time installation and set-up fee and the system’s owner is responsible for monthly, quarterly or annual recurring fees. These fees can become costly.