Access and Beyond now has the ‘trendy’ Access in a BOX, ready to add simplicity in your life. All the software to operate your access control system is built into the controller – NO computer needed. Pre-wired cluster controller, reader module & switch mode power supply with battery charge for optional battery backup.
Welcome to Access and Beyond Fiaez Peer
The team is proud to introduce our NEW systems support specialist. The young man possess 7 years experience in CCTV and Access control installations, has extensive product knowledge and is a fully accredited Impro Systems specialist. Access and Beyond looks forward to utilise his expertise in growing our technical support division and trust he will be of great benefit to our customers.
Access and Beyond are a proud distributor of Arecont Vision and now also the new Contera range
As with Arecont Mega cameras, Contera cameras feature world-class designs and manufacturing quality. All Contera cameras feature H.264 and H.265 codecs, SNAPstream+™ bandwidth reduction technology, NightView™ color low light technology, and Enhanced WDR up to 120db.
All models include multi-streaming at full frames per second (fps), defog technology, digital image stabilization, industry-standard security and network protocol support, and are ONVIF G and S compliant.
Most models include both Smart IR that adapts to object distance and angle and an SD card slot for onboard storage. Outdoor models are compliant with theIP66 environmental and IK-10 shock resistance standards.
The Contera Total Video Surveillance Solution is composed of:
- Megapixel cameras (Arecont Vision Mega™ and ConteraIP® single- and multi-sensor families.
- The ConteraVMS offers Standard (16 cameras), Premium (64 cameras), and Professional (128 cameras) license choices with a range of advanced features.
- ConteraWS (web services) enables recording to occur locally for reliability and optimized frame rates, while leveraging remote management and uploading clips of interest securely in the cloud. This eliminates the need for local administration and allows secure access and administration from anywhere.
- The ConteraCMR series offers four customizable cloud management recorder platform choices.
- ConteraCMR NVR appliance (2U form factor, 8 or 16 PoE ports, up to 20TB storage).
- Compact Desktop NVR Server (maximum of 32 channels and 24TB storage with optional RAID 5)
- Compact NVR server (2U form factor, maximum of 64 channels and 24TB storage with optional RAID 5)
- High Performance NVR Server (extended 2U form factor, maximum of 128 channels and 80TB storage with optional RAID 5).
- ConteraMobile® is also available from the Apple and Google app stores.
All Arecont Vision products include a 3-year manufacturer’s warranty.
Contact your Sales representative for more information on this popular new range.
Access Portal 3.0
Impro has released their new Access Portal 3.0 software on April 6th 2018.
We are very excited to be able to offer this incredible product to you
Access Portal 3.0 has a completely new look and feel. They have created mega menus, structured relevant information
together and added some new icons for quick tasks. The new software will also simplify how you go about setting up your site and makes customising the information you want, quicker and easier.
Many organisations undertake random searches of people entering the premises and now, through Access Portal the function can be automated based on specific parameters, such as one person is randomly selected from every ten, to breathalyse or be
If you’re migrating or upgrading your system, this has been made easier with the ability to import existing tagholders from an Excel spreadsheet. Other convenience features include the ability to personalise your transaction view in the dashboard and the system will remember your choices the next time you log in; as well as the ability to undertake batch printing of access
Mobile Portal is a handheld device that operates as a remote reader, allowing for the tagging in or out of people with
pin, card or biometric. The unit has been further enhanced to synchronise transactions over Wi-Fi, removing the need to frequently dock the device to upload data.
Data filters further extend the security features of Access Portal, by controlling the information a user can see in the transactions (previously Live!) view. The limits include a specific site, person or door.
Click on the Access Control tab to get more info now.
BIOMETRIC LOCKS VS. STANDARD LOCKS
Have you ever considered how secure your system is?
Biometric systems are gaining popularity in the security industry because they are dependent on a variety of biological characteristics. This however, still raises the question “Is an electronic biometric system better than a hardware locking system?” Any security system faces a number of vulnerabilities.
Security Solutions Magazine summarized these into 3 categories namely;
- 1. Destructive Entry
- 2. Covert Entry
- 3. Surreptitious Entry
Physical security hardware can be broken open. In order to open a standard lock, you can simply drill out the lock cylinder and open it with a screwdriver. Anti-drill plates and pins in standard locks add more protection, but they can still be overwhelmed in this way, where biometric locks cannot.
On a Biometric lock this is much harder as this system does not use a pin tumbler system. Biometric locks are more complicated and if a biometric lock is securing digital data, breaking the device, may also destroy the desired information. When it comes down to ease of forced entry, it is much harder to effectively break a biometrically locked door open.
Covert entry is almost undetectable to the naked eye, but it can be discovered with forensic investigation. These types of attacks are most common in standard locks. Something like a bump key or lock picks, leave scratches and impressions on the internals of the lock. Because there is no physical keyway for a biometric lock, common covert entry methods are not applicable. However, if a biometric lock’s housing was disassembled and then reassembled, this might leave detectable marks on set screws or the lock housing. It may also be harder to know to look for signs of covert tampering with biometric locks if the intention was something other than opening the door. For example, new ransomware attacks and data collection software are popular installations to biometric locks
Surreptitious entry is when there is no way to detect any illegal or unauthorized opening of the lock. In terms of surreptitious entry, there is no way to even forensically identify lock tampering.
With biometric locks, there are certainly some widely publicized methods of surreptitious entry, but they are not easy for just anyone to pull off successfully.
A standard lock could have a key copied, stolen, or the lock could just be left open. Copying a biometric key is much more difficult, but still very possible.
Once this type of method is used on any lock, you will need to change authorization. For standard locks, the simplest way to do this is by rekeying or replacing locks affected by the attack. For biometric locks, they can simply be reprogrammed.
The main concern with biometric locks is the threat of software attacks. If the biometric lock you are using does not have decent cyber security, then hackers can override your lock’s functions without the need for physical biometric confirmation. This can also be done remotely if the biometric lock is part of an internet iterated system.
Theoretically, a criminal targeting you could know how to make the perfect copy of a fingerprint from a water glass, and some rubber cement. But it is highly unlikely. It is more likely for a standard door lock key to get lost, stolen, or copied. As for the so-called “danger” of false acceptance for biometric locks, this is largely untrue.
Biometric locks have a whole host of separate concerns than a standard lock. Some vulnerabilities are the same, but those that vary are often simpler to use on the standard lock types. It is also harder to leave your biometric keys lying around, so forgetfulness and neglect are less likely to result in a loss of access control. To find out the best type of lock for your needs, you should always determine the threats that your security faces.