12.14.2009

Digital locking cylinder - Network Inside

We already have the unique WaveNet, which wirelessly networks the components in the Digital Locking and
Access Control System 3060. Until now, this process has required a separate wireless LockNode at each door in addition to the Digital Locking Cylinder 3061.


Now, with the help of miniaturisation, this LockNode has been so dramatically scaled down it can be integrated in the knob of the new “Digital Locking Cylinder 3061 - Network Inside”.


But not only that: At the same time additional functions have been implemented, so that the Network Inside cylinder can for example also be used as a “gateway” in the virtual network, transferring information
via the transponder. The transponder sends and receives information through the “gateway”; this information can for example be transmitted to other doors or made available to the system administrator. The following tasks should be particularly noted:
  • time correction in the system
  • tasks and access authorisations can be linked to dates and appointments
  • forwarding of a cylinder battery warning as part of system status monitoring
  • reading the access lists
In new buildings, the System 3060 can be networked wirelessly in a few minutes by installing a compact
special cylinder. In existing locking and access control systems from SimonsVoss, the wireless WaveNet network can be upgraded quickly and cost-effectively at any time by replacing the knob cap on the cylinder,
without having to change the door or door frame.
_

PRODUCT VERSIONS.
  • Version „network inside“ for direct wireless networking
  • With integrated Lock Node
  • Available with each profil and in all versions
  • G2 locking cylinder with advanced functionality refer to G2 locking systems
_
TECHNICAL DATA.
  • Available as cylinder with Euro-profile according to DIN 18252/EN 1303, with Scandinavian Oval, British Oval or Swiss Round profile
  • Battery lifespan: up to 150.000 lockings or up to five years stand by
  • 3,000 operations can be recorded
  • 5+1 time zone groups (G2: 100)
  • Up to 8,000 transponders can be managed per cylinder (G2: 64,000)
  • Up to 48,000 lockings can be managed per transponder (G2: 304,000)
  • Various duration / opening modi (office function)
  • Upgradeable firmware
  • Additional technical specifications refer to profil and versions of the suitable cylinder
_
Technical data of the network knob.
  • Network knob as retrofit knob for networking of a TN4 cylinder
  • Dimensions of the knob: length 26 mm, diameter 30 mm
  • Power supply: 3V DC battery in the TN4 cylinder
  • Power consumption with no data traffic: approx. 8µA
  • Battery life: up to 5 years on standby or up to 150,000 activations
  • Max. transmission power: approx 1 mW
  • Sensitivity: -95 dBm
  • Range from central / router node: up to 30 m, depending on building structure
  • Only suitable for indoor use (down to 0°C)

12.03.2009

Access Control - Then and Now


Access control systems have changed and grown exponentially since they were first introduced. In 2009, amazingly, the majority of access control systems on the market continue to utilize the same basic technologies that were introduced in the late ‘60s: a combination of simplistic card readers lacking electronic intelligence, linked by multiple wires to a centralized power supply and a central control panel. This setup makes the “allow entry” decisions for the card or other credential presented at the door. These systems are energy hogs, they’re difficult to install and –more simply put- they’re a relic of past technology.

Then – A look back in access control history

The original access control system was a simple lock and key. Still in use today, keyed locks are easy to install and affordable, yet easy to break into. The first generation of automated door access systems used what would today be referred to as primitive readers with no intelligence which passed credential information -from a magnetic or RFID-enabled card- to a central control panel, which made the “allow entry” decision. The next generation of readers made slight improvements so that the reader could be connected to the control panel with an RS-485 bus and had enough intelligence to open the lock. These second-generation “semi-intelligent” readers however still passed the credential codes to the control panel so there was no improvement in either installation cost or energy consumption cost.

Although the advent of “intelligent” readers improved memory to allow access decisions to be made at the reader, independent of the control panel, the panel was still necessary since updates to the system and event histories were uploaded to it. Though some current panels have added the ability to connect to a network, they still offer no new advances in installation time, costs or energy consumption.

As shown below, the installation of even the most modern panel-based system remains a labor and cost intensive exercise. The panel also has the disadvantage of limitations to the number of doors supported per panel – typically 4, 8 or 16 doors depending on the brand and model. This means that adding just one more door to a full panel system necessitates the addition of another panel, thus increasing the cost on both a total system and a per-door basis. The ongoing operational costs of any panel-based system are also higher than the state-of-the-art ISONAS alternative for two reasons;

Panel-based systems must be maintained by specially trained  personnel since they do not employ widely available computer standards of operations.

 They consume significantly more energy






Now – Intelligent IP reader-controllers

Alternatives exist today that take advantage of modern computing and networking technologies to provide a number of significant improvements over panel-based systems by improving the basic functionality of access control systems, improving the overall security parameters of these systems, lowering the cost of installation, lowering energy usage associated with the system’s operation and easy integration with other security and building management systems.

The ISONAS Powernet Access Control System utilizes a customer’s existing Ethernet-based Internet Protocol (IP) network to link intelligent reader-controllers via a CAT5 or CAT6 cable -the same cables that provide power to the ISONAS reader allow data communications to any inexpensive standard Windows computer running the system’s access control software – the ISONAS Crystal Matrix Software System.

“Allow entry” decisions are made at the door by the intelligent PowerNet IP reader-controller with historical event data passed, on a periodic basis, to the host software. The PowerNet reader contains a list of individuals that are allowed entry to the door (cabinet, gate, etc.) along with the times or shifts that they are allowed entry. Management of the system is easily accomplished via web-based pages from any computer with access to the internet. Individual reader-controllers can be set to stay open for specified periods or to remain locked until an authorized user’s credential is presented. Requirements such as anti-pass back, holidays and other special actions are easily accomplished through the Windows-based management software. Should the network go down, the PowerNet reader-controller continues to function in “standalone mode” and automatically updates the Crystal Matrix software when the network comes back online.

With Power over Ethernet (PoE) made possible by using the customer’s existing Ethernet network and industry standard CAT5 or CAT6 cabling, the additional power sources and wires needed for a standard panel-based system are simply unnecessary. The PowerNet reader-controller, the magnetic lock or strike and all the typical accessories, such as request to exit (REX) devices and door sensors, are powered by low voltage PoE through the PowerNet reader-controller. The on-going power usage of the system as a whole is therefore significantly more efficient than with any panel system, and installation is accomplished much faster -and is more cost effective- than is possible with a panel-based system.

The PowerNet is designed for both indoor and outdoor use and since it is not encumbered by a control panel, it can be installed in virtually any location with no limitation on the number of doors or access points. Adding new doors is as simple as adding a single CAT5 cable to the existing network facilities, attaching the PowerNet, the appropriate lock and accessories to the entry point and programming the reader-controller via the reader’s web-based pages from any computer with access to the internet.

Since the PowerNet system is managed by a software system (the ISONAS Crystal Matrix Access Control Software System) that runs on a standard Windows-based server, and is accessible through the normal IP network, integrating the PowerNet reader-controller with a web-based video system, building management system or other electronic security system is quite easily accomplished. The combination of access control and IP video into a single platform not only optimizes security and efficiency during operations but it also minimizes the costs of hardware, maintenance, and training of security personnel.

With this platform in place, it can easily be expanded to create a complete IP-based security and process monitoring system. Perimeter security devices, motion detectors, and/or additional cameras for monitoring key operations can be quickly added to the infrastructure. As illustrated below, the installation of a combination of IP-based access control and video surveillance is more efficient and cost effective than the installation of panel-based system.

Summary
Utilizing the capabilities of PoE allows access control devices to break free from the limitations of a control panel. Today one of the major advantages brought by PoE to the security marketplace is the freedom to install reader-controllers virtually anywhere. In a traditional panel-based system if the control panel fails the functionality of all the doors in the system is lost, severely impacting facility security. With an ISONAS system if the reader-controller fails it is isolated to one door.

The reason for the reduced installation costs of the ISONAS system is simple: Since the IT infrastructure already has PoE built in, no additional power infrastructure needs to be added to support the access control system. The number of wiring terminations required for an ISONAS system versus a panel based system is significantly reduced since an electrician installing a panel-based system terminates the wire at a junction box near the door and runs proprietary wiring back to the control panel where it has to be terminated again. With the CAT5 wire installation of the ISONAS system, “termination” is a single wire per reader-controller, pulled by less expensive installation personnel (no electrician required since CAT5 is low voltage) and uses the same simple plug familiar to anyone who has ever plugged a laptop into a network.

The installation labor of an ISONAS system is typically at least 30% less than a comparably sized panel-based system.

With a lower manufacturing carbon footprint and the lower voltage required from the PoE ISONAS devices, access control can now legitimately claim to have gone “green” since the power usage of an ISONAS system is significantly lower over its lifetime than with any panel system.

And since the actual hardware cost of a panel system with all its pieces and parts is more expensive than the simpler but more powerful ISONAS IP-at-the-door reader-controller, the whole system is more cost effective than any alternative available. Better security combined with more cost effectiveness – the difference between THEN and NOW.

11.13.2009

What Is Lock Bumping & Should I Care?

Bumping, also referred to as "rapping" is not new. In fact, it's been around for at least half a century! When this method is used correctly it is extremely effective in over 90% cylinder type locks. As with any other lock picking technique it requires some time and patience to master. A bump key is a key in which all the cuts are at the maximum depth. Bump keys can be cut for standard pin tumbler type locks as well as "dimple" locks.

In the 1970s, locksmiths in Denmark shared a technique for knocking on a lock cylinder while applying slight pressure to the back of the lock plug. When the pins would jump inside of the cylinder, the plug would be able to slide out freely, thus enabling the locksmith to disassemble the lock quickly. The use of a bump key was not introduced until some time later and was first recognized as a potential security problem around 2002–2003 by Klaus Noch who brought it to the attention of the German media. After further examination of the procedure, a white paper was drafted in 2005 by Barry Wels & Rop Gonggrijp of The Open Organization of Lockpickers (TOOOL) detailing the method and its applicability.


A patent exists for a lock device following the same principle as the bump key from 1926–1928. The technique then attracted more popular attention in 2005 when a Dutch television show, Nova, broadcast a story about the method. After the method received further publicity from TOOOL presentations at security conference talks, members of TOOOL and a Dutch consumer group, Dutch Consumentenbond, analyzed the capability of the method on 70 different lock models and with trained and untrained users in a 2006 study.

At the same time, Marc Tobias, an American security expert, began to talk publicly in the United States about the technique and its potential security threats. In 2006, he released two further white papers regarding the technique and its potential legal ramifications.


High-quality locks may be more vulnerable to bumping unless they employ specific countermeasures. More precise manufacturing tolerances within the cylinder make bumping easier because the mechanical tolerances of the lock are smaller, which means there is less loss of force in other directions and pins move more freely and smoothly. Locks made of hardened steel are more vulnerable because they are less prone to damage during the bumping process that might cause a cheaper lock to jam.


Locks having security pins (spool or mushroom pins, etc.)—even when combined with a regular tumbler mechanism—generally make bumping somewhat more difficult but not impossible. Electronic locks, magnetic locks, and locks using rotating disks are not vulnerable to this attack.


Because a bump key must have the same blank profile as the lock it is made to open, restricted or registered key profiles are not any safer from bumping. While the correct key blanks cannot be obtained legally without permission or registration with relevant locksmith associations, regular keys can be filed down to act as bump keys.


Locks that have trap pins that engage when a pin does not support them will jam a lock's cylinder. Another countermeasure is shallow drilling, in which one or more of the pin stacks is drilled slightly shallower than the others. If an attempt were made on a lock that has shallow drilled pin stacks, the bump key will be unable to bump the shallow drilled pins because they are too high for the bump key to engage. Many bump-resistant locks are available which can not be easily opened through the lock bumping method.

Of course you can also prevent such worries with an access solution such ISONAS' PoE PowerNet IP or SimonsVoss' Digital Locking & Access Control System.



If you have any questions, please do not hesitate to contact us here.


Creating a Keyless World with Simons-Voss

SimonsVoss has taken it upon themselves to make living and working with their system more secure, easier, more convenient and more efficient. In doing so, they've revolutionized classical mechanical locking media by applying digital technology and access control features. Their idea of a digital transponder instead of keys has been globally accepted. They've successfully and consistently turned their vision into reality with a radio-controlled, wireless locking and access control system.


SimonsVoss is the undisputed technology leader in the rapidly growing marked for digital, battery-operated locking and access control systems. More than 56,000 systems have been installed all overt the world proving that their vision has already become a reality. Below, you'll find a list of some of the most frequently asked questions about their innovative access control system.

Do I need both an RF lock and a SmartRelay for a Door?
No, the two components work independently of one another and have different tasks in the system. The RF Lock operates a mechanical latch. The SmartRelay operates a solid-state relay. As a result, you need only one of these components at a time.

Can the transmission of data over the radio link be tapped and reproduced?
The radio transmission is based on a method tested by the military. It is a constantly changing code sequence (crypto codes), which is not reproducible. Even renowned test institutes such as VdS and BSI, for example, couldn’t crack the code.

How is the system protected from attack?
The components are designed to resist mechanical, electrical and magnetic attacks.

Can I add a wireless network at a later date?
Yes, the system is designed to add a wired, wireless or virtual network at any time.

Can the lock system be expanded at a later date?
Yes the modular hardware components and the flexible lock plan software allow a modification or expansion of existing systems at a time.

Which components must be programmed?
All components, transponders and locks, must be programmed.

How can the digital locking cylinder’s battery be checked?
The status  of the battery can be displayed form the host computer through the SmartCD or wireless network.

Can the lock read HID cards?
Not yet. That technology is passive and does not transmit well through metal. However, a reader interface is being developed and other technology breakthroughs are being considered.

What happens when the battery dies?
There is a three-stage process of battery management that ensures authorized access. In all the years of operation access has never been denied due to battery failure.

Is there a mechanical override?
The deadbolt on the mortise lock can function as a mechanical override for mortise locks. The SV1C cylindrical lock does not have a mechanical override.

What certifications does the lock have?
These products are certified by the FCC not to interfere with other RF-based products. The US RF Locks have all been tested to ANSI Grade 1 standards. The locks are also approved by UL to meet the 10-C standard for fire doors under positive pressure.


Do you have a lock for a glass storefront door?
Yes. The Digital Mortise Cylinder (DMC4) can be used with the most popular aluminum storefront door locks.

How many transponders are supported by each RF lock?
Each RF Lock can support up to 8.000 transponders currently and will be upgradeable to 64,000 sometime in 2010.

What is the anticipated life of the batteries?
The batteries in the locks are certified for 150,000 cycles. The batteries in the standard transponders are certified for 1,000,000 clicks.

When using the wireless network, what is the range between the Central Node (computer) and the door?
The distance between each radio span (Central Node to Router or Lock Node or between routers) is a maximum of 150 feet. The distance is based on the RF environment and can be reduced by the surrounding materials.

What is the radio range for the signal between the Lock Node and the RF Lock?
The Lock Node must be located with 12” of the RF Lock. There is an optional external antenna for the Lock Node to extend this range up to 16 feet.

What are the environmental ratings of your locks?
The operating temperature of the SimonsVoss RF Lock is rated for -4 - +140 degrees Fahrenheit at non-condensing humidity of less than 90%.

Can the lock detect the position of the door?
SimonsVoss Technologies RF locks do not include a traditional door status switch. This capability is not significant to a standalone door with no real-time communications. When the 915 MHz wireless network is used, the Lock Node can monitor up to three input points.

What is the range between the SimonsVoss Technologies transponders and locks?
The maximum measured range is 20”. This distance is based on environmental elements such as the material of the door, the walls, and other radio products in the area.

Is it possible to use the SimonsVoss Technologies locks with an existing third-party access control system?
Yes, you can do this by using a Switching Transponder (TRA.SCHALT) which has wires that are connected in parallel to the button of the transponder. These wires are then connected to the relay terminals of the third-party access control panel. When the relay closed it activated the transponder just as if the button was pushed, opening the SimonsVoss Technologies RF lock.

Can I use third-party access control cards with SimonsVoss Technologies locks?
SimonsVoss has a reader that can read Mifare cards and use that information to send the proper user ID to the lock for the access decision. Extending this reader to other card technologies is currently in development.

11.11.2009

Company responsible for 1/3 of the world's junk email shut down.


A botnet that was once responsible for an estimated third of the world's spam has been knocked out of commission thanks to researchers from security firm FireEye.

After carefully analyzing the machinations of the massive botnet, alternately known as Mega-D and Ozdok, the FireEye employees last week launched a coordinated blitz on dozens of its command and control channels. The channels were used to send new spamming instructions to the legions of zombie machines that make up the network.

Almost immediately, the spam stopped, according to M86 Security blog. Last year, the email security firm estimated the botnet was the leading source of spam until some of its servers were disabled.

The body blow is good news to ISPs that are forced to choke on the torrent of spam sent out by the pesky botnet. But because many email servers already deployed blacklists that filtered emails sent from IP addresses known to be used by Ozdok, end users may not notice much of a change, said Jamie Tomasello, an abuse operations manager at antispam firm Cloudmark.

The takedown effort is significant because it shows that a relatively small company can defeat a for-profit network that took extraordinary measures to ensure it remained operational. Not only did Ozdok reserve a long list of domain names as command and control channels, it also used hard-coded DNS servers. When all else failed, its software was able to dynamically generate new domain names on the fly.

With head chopped off of Ozdok, more than 264,000 IP addresses were found reporting to sinkholes under FireEye's control, an indication of the massive number of zombies believed to have belonged to the botnet. FireEye researchers plan to work with the ISPs to identify the owners of the orphaned bots so their owners can clean up the mess.

FireEye researchers said the key to dismantling the giant ring was a coordinated effort that worked in multiple directions all at once so that bot herders didn't have a chance to counteract. "As it turns out, no matter how many fallback mechanisms are in place, if they aren't all implemented properly, the botnet is vulnerable," they wrote.

10.28.2009

New 3061 digital locking cylinder from SimonsVoss:

Up to 300 000 activations without a battery change

SimonsVoss, a market and technology leader in the field of battery-operated electronic locking and access control systems, is presenting the latest generation of its digital locking cylinder 3061.

One of the main features of the new cylinder is that it is powered by a battery with a significantly longer service life. SimonsVoss guarantees that the cylinder can be activated up to 150 000 times with standard button cell batteries, while the special variant can even be activated up to 300 000 times. With the 3061 digital locking cylinder, frequently used central doors can be operated for years without the battery having to be replaced.

With the introduction of this new generation of digital locking cylinders, SimonsVoss Technologies AG is setting new standards for the future of locking and organisational technologies. SimonsVoss transponders and cylinders far outstrip any other comparable locking technologies on the market in terms of battery life.

With respect to its aesthetic design, the cylinder features small, elegant symmetrical knobs. The inside of the cylinder has been completely revolutionised, because the 3061 digital locking cylinder can now be updated using a network or programming device, allowing users to simply ‘download’ new software-based features.

The new generation of digital locking cylinders can also store 3000 access authorisations as well as administering 64 000 transponders per cylinder and 320 000 cylinders per transponder within a single locking system.

And of course, the system also features various convenient ‘permanently open’ functions and a full range of remote diagnosis options.

The new generation of digital locking cylinders from SimonsVoss, like its predecessor, allows for wireless networking and is available in all variants: for example half-cylinder, anti-panic cylinder, VdS-approved, free-rotating, pushbutton control, multi-ratchet version or waterproof versions. We are also developing a version that can be addressed using high-frequency radio signals from standard radio routers (as defined in IEE 802.xx).


SimonsVoss presents new battery-operated and network-compatible Q3008 biometric wall reader


The Q3008 integrates seamlessly into existing SimonsVoss locking systems, because the ID assigned to each fingerprint can also be used for all other SimonsVoss locking components. This allows digital locking cylinders, Smart Relays, furniture locks, half cylinders, lever cylinders, shunt locks and cabinet handles to be activated by fingerprint recognition.

And the fingerprint reader is just as easily integrated in SimonsVoss networks, which means that IDs assigned to a fingerprint can be transferred to other fingerprint readers without having to physically walk to each biometric reader. The data can even be transferred to other locations, so that a fingerprint scanned in Munich will even work in Singapore, for example. The reader can store up to 50 different fingerprints and can be mounted on a plaster wall without the need for cables. Up to 80 000 operations are possible using a single battery.

The new Q3008 biometric reader complements the current Q3007 portable biometric solution from SimonsVoss, which combines the convenience of a transponder with the added security of biometric fingerprinting.

The ‘master finger’ function allows all SimonsVoss biometric readers to ‘learn’ new fingerprints quickly and easily.

You decide which door opens when and for whom.
And with just the press of a button.


With the digital Locking System 3060 from SimonsVoss, you can implement locking systems of varying sizes and complexity. You can make modifications, expand the system, block transponders – in short, handle all individual access authorizations – easily by pressing a button. At the same time, you can allocate up to three mutually independent locking systems to any given transponder. Thus, for example, you need only a single key to open the doors to the office, the private home or to the club facilities.

You can assign and activate each lock and transponder conveniently, quickly and reliably by using either a programming transponder or a combination of PC and PDA with the SmartCD programming device. Furthermore, you can connect the components with one another over the cablefree network – even some time down the road. This allows you to administer the entire System 3060 conveniently from a PC.

Programming in Small Systems

The Programming Transponder 3067 allows the quick and economical programming of the digital Locking Cylinder 3061 and the Transponder 3064. Without a PC or special system software, you issue or change access authorizations in small systems with the simple press of a button, for example, if a key is lost or if there are changes in the locking plan.

The Configuration of Extensive Locking Systems


You can set up extensive locking plans by checking off entries in an easy to view lock-user matrix on a PC or laptop. You can make modifications, expand the system, block transponders – in short, handle all individual access authorizations – by mouse click in a graphic user interface under Windows. You can also transfer the prepared locking plans from the PC to a PDA. Then the handy PDA, with the wireless SimonsVoss SmartCD, takes over the programming of the locking components and transponders for you.

Cablefree Network


In large locking systems, actions such as monitoring individual doors, reprogramming or reading out the access logging is usually time-consuming and therefore cost-intensive. The convenient Network 3065 offers online programming of the entire locking system or selected doors from one or more PCs. The network node, installed in a flush socket device, takes over the cablefree radio communication to the locking components and to the PC . This does away with the need for expensive, time-consuming installations on the door and doorframe.

Control done over the network nodes offers real-time monitoring and, optionally, makes it possible to drive integrated external systems and to switch on lights or heating systems automatically when doors are used. Using the radio-based network, you can even monitor buildings from a distance, for example, by modem or Internet.

The Event Manager in the Networked Locking System


The Event Manager allows you to define the most varied events in the locking system, along with any number of reactions. For example, if a door has been opened but no regular entry has been determined, an alarm can be triggered. Other potential reactions would be to send an E-mail to an alarm control center or an SMS alarm message to the cell phone of the locking system administrator. We save on the keyhole. And we save you a lot of money.

Low life-cycle costs, minimum administration and maintenance efforts and a useful life that is pleasantly long offset the investment in a digital locking system. Incidentally, you can also save on the investments in additional access control systems, because this function has already been integrated into the digital Locking and Organization System 3060 from SimonsVoss. Especially friendly to the budget: The modular construction allows the system to be expanded step by step. If you then also include the enormous timesavings for the planning, administration and documentation of a digital locking system, it all adds up to a good investment after only a few years.

10.22.2009

October is National Cybersecurity Awareness Month!


DID YOU KNOW:  October is National Cybersecurity Awareness Month!
Sponsored by the Department of Homeland Security, this year’s theme is “Our Shared Responsibility” stressing that all computer users need to practice good “cyber hygiene” and protect themselves and their families at home, at work and at school. 

Learn how you can keep yourself safe online.

PROTECT YOUR BUSINESS! You have invested time and money to bring your business to life. You buy insurance to protect you and put locks on the doors and install fire alarms to protect your premises. Have you made cyber security the same priority?

Perhaps the most critical foundational asset for successful businesses is trust.  Employees need to trust that their employer is focused on securing both their physical person and their critical personal information such as Social Security Number or other important information. Customers need to trust that companies they do business with are keeping their personal and financial information out of the hands of unauthorized users.

A cyber security breach would hit at the heart of the trust that your employees and customers have in your business.  Cyber security practices are about more than protecting your network, they are about protecting your business.  Fortifying your company against cyber threats represents a critical and fundamental step you must take as a business owner to protect your valuable financial or other important information from falling into the wrong hands.  Just as you would never leave the front door to your business unlocked when you are not there, you must make sure the same precautions are taken with your computer system to make sure it is safely protected.  Protecting your business is fairly simple and all it takes is for you to educate yourself and your employees about safe cyber security practices.

Protecting your business starts with three critical tasks:
  • Assess Risks
  • Monitor Threats to Business
  • Draft Cyber Plan 
More information can be found at the Department of Homeland Security's website here.

10.21.2009

Simons-Voss Technologies. Creating a Keyless World.

SimonsVoss Technologies.  Creating a Keyless World.

SimonsVoss Technologies design access control for facilities that is as easy to install as mechanical locks, while providing the features and flexibility of electronic access control.

They’ve taken classical mechanical locking media and applied digital technology and access control features creating more efficient, convenient and secure systems that are very easy to use.

The idea of a digital transponder instead of keys has been globally accepted, and SimonsVoss has successfully turned their vision of a “Keyless World” into reality with a radio-controlled, wireless locking and access control system.

As a leader in the rapidly growing market for digital, battery-operated locking and access control systems, SimonsVoss has developed and installed more than 5,000 systems all over the world.  Clients utilizing these systems include; TCF Bank, The Drake Hotel in Chicago, the University of Texas-Dallas, St. Catherine’s School of Racine (Wisconsin), and Volkswagen.

Almost a million SimonsVoss transponders are already activated worldwide:  quietly, energetically, carefully, and quickly.  The digital locking system guarantees reliable security and cost-effective access and building management everywhere.

SYSTEM 3060.  No Keys, No wires. No Limits.


Mechanical locking systems quickly reach their limits and become a costly security risk if keys are lost or copied. SimonsVoss Digital Locking and Access Control System, or simply System 3060 offers a secure and efficient alternative.  It is comprised of locks, credentials, software and an optional communication network which are controlled solely by radio frequency, without cables.  Just press a button and the door is unlocked. Every access is logged for later examination.  Benefits of System 3060 include quick wireless installation, easy adaptability, seamless security, central control, and it’s highly economical.

Formed in 1995, SimonsVoss Technologies, a German-based company, set out to develop user-friendly locking system applications.  Their main focus was on the development of extremely low-energy electronic boards for use in system components (without external cabling as far as possible), innovative mechanical functions and active transponder technology as the core for operating all system components.  In 1998, SimonsVoss reached a breakthrough with the world’s first digital locking cylinder without external cabling.  By 2005, the company expanded with regional sales offices in Singapore, the United Kingdom, Austria, Dubai, the Netherlands, and France.  Currently the company employs a staff of 225 at the headquarters in Munich, Germany, and maintains a manufacturing facility in Petersberg, Germany along with several international sales offices.

9.08.2009

Network Cameras, Analog Cameras... what does it all mean?

IP cameras, or network cameras, are the latest trend in surveillance technology and are rapidly surpassing the older analog cameras used in most surveillance systems. Simply put, IP cameras use digital imaging and network communications to send video footage straight to your computer from any location. This means you can set up cameras anywhere you please -anywhere in the world- and monitor the camera or cameras from the comfort of your own computer.

How do IP Camera’s Work?
An IP camera is basically a computer that takes pictures. Each camera has its own Ethernet connection chip, CPU, memory, and input/output interfaces, so it’s essentially a fully functional part of the network.

Once the network camera captures an image, it converts the image to digital format and sends it via Ethernet to a remote network computer, where authorized users can view, store and manage the video footage. The camera’s CPU and I/O interfaces make it programmable and bi-directional, so you can send commands and information as well as receive images.

Benefits and Features
As an integrated security system, IP cameras are cost-effective and convenient. Because network cameras come with most of the necessary equipment built in they cost less to install, run and maintain -no expensive cabling, no complex infrastructure and -if you’ve already got a communications network- you just need to configure it to your existing system.

Network cameras also have many advanced security features. You can opt for motion sensors, integrated audio, and on day/night cameras, removable infrared filters for sharper colors by day and clear black-and-white footage by night. Encrypted signals allow for secure communication and I/O ports enabled you to directly control the camera’s pan/tilt/zoom capabilities, monitor alarms or even speak through the camera intercom-style. You can also program the camera to operate selectively, telling it when to turn on, which information to send and to whom.

Network Cameras vs. Analog Cameras
Network cameras have several advantages over analog cameras. First of all, as mentioned before, they require less equipment and excess wiring -especially if you want to include audio- and are therefore more convenient and less expensive to install and maintain. Second, because they connect via Ethernet, they draw less power and cost less to run. Performance-wise they’re more versatile and offer more features than uni-directional analog cameras. They also provide higher-resolution images that are better suited to computer viewing. While the network camera itself may be more expensive than an analog camera you save more on energy, maintenance and peripheral equipment in the long run.

Of course, you can find cameras of all types on our site. Network/IP cameras, Pelco's Sarix technology equipped cameras, standard box cameras, PTZ (pan, tilt, zoom), even lower priced cameras from Midcam.

ISONAS Is A Green Technology Product

ISONAS, the World Wide leader in IP Access Control Systems, recognizes the PowerNet™ as a Green Technology Product.

Green building is as much about design strategy as about selecting eco-friendly materials.


Integrated design is thinking about how a building works as a system, and designing that system to be environmentally friendly is a key part of green building. Certain products, particularly those that deal with energy, can be used in ways that enhance the environmental performance of a building. The ISONAS PowerNet™ Access Control System can be used in any building type, and through its BACNet and OPC interfaces can integrate seamlessly with Building Automation applications.
Reduced energy usage, which also reduces carbon dioxide emissions and your energy bill, is one of the most effective green strategies for business. The PowerNet IP Reader from ISONAS uses PoE (Power over Ethernet) to power the reader and the associated door hardware. This provides the lowest possible energy cost for powering an Access Control system.
Eco-friendly materials are used in the manufacturing of ISONAS Reader-Controllers. ISONAS is certified with RoHS, a standard banning the general use of six hazardous substances including lead and mercury. ISONAS has also taken the strategy of using green materials in its packaging and shipping of its products.
The smallest manufacturing carbon footprint of any Access Control system is made possible by the panel-free nature of the PowerNet series. Combined with a single Cat 5 cable for installation versus the multitude of copper wiring required by alternative Access Control systems, the ISONAS PowerNet is the cleanest, most sustainable Access Control system in the world.
Low impact manufacturing means that ISONAS creates inventory based on consumer demand. With the ability to access and analyze real-time demand signals, ISONAS is one of a growing number of companies moving from push to pull manufacturing. By nature, this not only eliminates excess inventory, thereby reducing waste, but it also decreases carbon emissions as it relates to the creation of products and materials.
No Paper Waste is the ISONAS philosophy. As an IP product manufacturer in the electronic age of technology, marketing materials as well as technical manuals are created electronically and posted on our website available to everyone in PDF form. By making technical manuals, marketing materials and catalogs easily accessible on our web site, ISONAS does not waste paper on needlessly printing excessive paper-based documents.
Localized Manufacturing ISONAS is based in Boulder, Co, where its PowerNet Readers are manufactured for the North American market. Off-shoring models of the past are increasingly being replaced with more efficient “right-shoring” models, as the risks and costs associated with manufacturing at long distances from one’s customers continue to surface. Longer lead times, increased fuel costs, larger carbon footprints and excess inventory are causing companies to re-examine where and how much they outsource. With the ability to analyze the various factors driving costs and environmental impacts, companies can create balanced plans that are both cost-effective and environmentally friendly. ISONAS is committed to manufacturing as close to its end user base as possible.

About ISONAS Security Systems, Inc. Since 1999, ISONAS Security Systems has provided advanced, Internet Protocol (IP) Access Control solutions for customers who require the superior, real-time access control enabled by a true network appliance. ISONAS is the first and leading developer of IP-at-the-door reader-controllers. Driven by its Windows-based Crystal Matrix Software™, ISONAS products are easily integrated with other network based systems, providing the most advanced physical access security for buildings and workplaces worldwide, across a wide range of industrial applications.


Thanks for visiting Kondor Security and remember, if you can't find it at first glance, you're more than welcome to contact us.

7.31.2009

Application Notes: Using the ISONAS TTL Leads

The ISONAS reader-controller supports two TTL output leads. These leads provide logic level signals that can be used to communicate with external systems such as alarm sounders or lights.

These TTL leads are normally held at +5V DC, and when activated, drop to 0V DC. The ISONAS driver circuits for these TTL signal leads can source or sink 24 milliamps. This means that the external system must not draw more than 245mA from the TTL output when it is at +5 VDC nor source more than 24mA when the TTL output is at 0 VDC.

Some external systems (example: alarm systems) will directly accept these logic signals. For other usages, these leads can drive external relay boards, which are capable of controlling larger power draws.

An great example application would be a DOTL (Door Open Too Long) alert in a factory or industrial setting. You would use a relay module, such as the Altronix RBSNTTL, with your ISONAS system to trigger an alarm sounder, such as the ATW Terrier, to notifiy you if a door has been held open too long.

For more information, check out the knowledge base article by clicking here. (PDF)

Big Brother in Amish Country?

source: latimes.com

Lancaster, PA: Some 165 closed-circuit TV cameras soon will provide live, round-the-clock scrutiny of nearly every street, park and other public space used by the 55,000 residents and the town's many tourists. That's more outdoor cameras than are used by many major cities, including San Francisco and Boston.

Unlike anywhere else, cash-strapped Lancaster outsourced its surveillance to a private nonprofit group that hires civilians to tilt, pan and zoom the cameras -- and to call police if they spot suspicious activity. No government agency is directly involved.

Perhaps most surprising, the near-saturation surveillance of a community that saw four murders last year has sparked little public debate about whether the benefits for law enforcement outweigh the loss of privacy.

"Years ago, there's no way we could do this," said Keith Sadler, Lancaster's police chief. "It brings to mind Big Brother, George Orwell and '1984.' It's just funny how Americans have softened on these issues."

"No one talks about it," agreed Scott Martin, a Lancaster County commissioner who wants to expand the program. "Because people feel safer. Those who are law-abiding citizens, they don't have anything to worry about."

A few dozen people attended four community meetings held last spring to discuss what sponsors called "this exciting public safety initiative." But opposition has grown since big red bulbs, which shield the video cameras, began appearing on corner after corner.

Mary Pat Donnellon, head of Mission Research, a local software company, vowed to move if she finds one on her block. "I don't want to live like that," she said. "I'm not afraid. And I don't need to be under surveillance."

"No one has the right to know who goes in and out my front door," agreed David Mowrer, a laborer for a company that supplies quarry pits. "That's my business. That's not what America is about."

Hundreds of municipalities -- including Los Angeles and at least 36 other California cities -- have built or expanded camera networks since the attacks of Sept. 11, 2001. In most cases, Department of Homeland Security grants helped cover the cost.

In the most ambitious project, New York City police announced plans several years ago to link 3,000 public and private security cameras across Lower Manhattan designed to help deter, track and detect terrorists. The network is not yet complete.

How they affect crime is open to debate. In the largest U.S. study, researchers at UC Berkeley evaluated 71 cameras that San Francisco put in high-crime areas starting in 2005. Their final report, released in December, found "no evidence" of a drop in violent crime but "substantial declines" in property crime near the cameras.

Only a few communities have said no. In February, the city council in Cambridge, Mass., voted not to use eight cameras already purchased with federal funds for fear police would improperly spy on residents. Officials in nearby Brookline are considering switching off a dozen cameras for the same reason.

Lancaster is different, and not just because it sits amid the rolling hills and rich farms of Pennsylvania Dutch country.

Laid out in 1730, the whole town is 4 square miles around a central square. Amish families still sell quilts in the nation's oldest public market, and the Wal-Mart provides a hitching post to park a horse and buggy. Tourists flock to art galleries and Colonial-era churches near a glitzy new convention center.

But poverty is double the state's average, and public school records list more than 900 children as homeless. Police blame most of last year's 3,638 felony crimes, chiefly thefts, on gangs that use Lancaster as a way station to move cocaine, heroin and other illegal drugs along the Eastern Seaboard.

"It's not like we're making headlines as the worst crime-ridden city in the country," said Craig Stedman, the county's district attorney. "We have an average amount of crime for our size."

In 2001, a local crime commission concluded that cameras might make the city safer. Business owners, civic boosters and city officials formed the Lancaster Community Safety Coalition, and the nonprofit organization installed its first camera downtown in 2004.

Raising money from private donors and foundations, the coalition had set up 70 cameras by last year. And the crime rate rose.

Officials explained the increase by saying cameras caught lesser offenses, such as prostitution and drunkenness, that otherwise often escape prosecution. The cameras also helped police capture and convict a murderer, and solve several other violent crimes.

Another local crime meeting last year urged an expansion of the video network, and the city and county governments agreed to share the $3-million cost with the coalition. Work crews are trying to connect 95 additional high-resolution cameras by mid-July.

"Per capita, we're the most watched city in the state, if not the entire United States," said Joseph Morales, a city councilman who is executive director of the coalition. "There are very few public streets that are not visible to our cameras."

The digital video is transmitted to a bank of flat-screen TVs at coalition headquarters, several dingy offices beside a gas company depot. A small sign hangs outside.

On a recent afternoon, camera operator Doug Winglewich sat at a console and watched several dozen incoming video feeds plus a computer linked to the county 911 dispatcher. The cameras have no audio, so he works in silence.

Each time police logged a new 911 call, he punched up the camera closest to the address, and pushed a joystick to maneuver in for a closer look.

A license plate could be read a block away, and a face even farther could be identified. After four years in the job, Winglewich said, he "can pretty much tell right away if someone's up to no good."

He called up another feed and focused on a woman sitting on the curb. "You get to know people's faces," he said. "She's been arrested for prostitution."

Moments later, he called police when he spotted a man drinking beer in trouble-prone Farnum Park. Two police officers soon appeared on the screen, and as the camera watched, issued the man a ticket for violating a local ordinance.

"Lots of times, the police find outstanding warrants and the guy winds up in jail," said Winglewich, 49, who works from a wheelchair on account of a spinal injury.

If a camera records a crime in progress, the video is given to police and prosecutors, and may be subpoenaed by defense lawyers in a criminal case. More than 300 tapes were handed over last year, records show.

Morales says he refuses all other requests. "The divorce lawyer who wants video of a husband coming out of a bar with his mistress, we won't do it," he said.

No state or federal law governs use of public cameras, so Morales is drafting ethical guidelines for the coalition's 10 staffers and dozen volunteers. Training has been "informal" until now, he said, but will be stiffened.

Morales said he tries to weed out voyeurs and anyone who might use the tapes for blackmail or other illegal activity.

"We are not directly responsible to law enforcement or government at this point," he said. "So we have to be above suspicion ourselves."

Morales, 45, has a master's degree in public administration. Born in Brooklyn, N.Y., he grew up mostly on Army bases. He was accepted to the U.S. Naval Academy, he said, but turned it down. "I made a lot of bad choices," he said. "Substance abuse was part of that."

Mary Catherine Roper, staff attorney for the American Civil Liberties Union of Pennsylvania, says the coalition's role as a self-appointed, self-policed gatekeeper for blanket surveillance of an entire city is unique.

"This is the first time, the only time, I've heard of it anywhere," she said. "It is such a phenomenally bad idea that it is stunning to me."

She said the coalition structure provides no public oversight or accountability, and may be exempt from state laws governing release of public records.

"When I hear people off the street can come in and apply to watch the camera on my street, now I'm terrified," she added. "That could be my nosy neighbor, or my stalker ex-boyfriend, or a burglar stalking my home."

J. Richard Gray, Lancaster's mayor since 2005, backs the program but worries about such abuses. He is a former defense attorney, a self-described civil libertarian, and a free-spirited figure who owns 12 motorcycles.

"I keep telling [the coalition] you're on a short leash with me," Gray said. "It's one strike and you're out as far as I'm concerned."

His campaign treasurer, Larry Hinnenkamp, a tax attorney and certified public accountant, took a stronger view. He "responded with righteous indignation" when a camera was installed without prior notice by his home.

"I used to give it the finger when I walked by," Hinnenkamp said.

But Jack Bauer, owner of the city's largest beer and soft drink distributor, calls the network "a great thing." His store hasn't been robbed, he said, since four cameras went up nearby.

"There's nothing wrong with instilling fear," he said.

7.09.2009

Authorized ISONAS Reseller

Authorized ISONAS Reseller

We are proud to announce that we are a member of the new ISONAS Authorized Reseller program. More information coming soon.




For more information of ISONAS product, click here and browse our catalog. If you are looking to obtain a quote or cannot find what your are looking for, please contact us.

7.08.2009

Cable & Wire Testing Tools


We have now uploaded a complete line of Wire & Cable and other testing devices from Fluke, Gardner, Greenlee, Hi-Tech, Ideal, Klein, Metro-Tel, Milwaukee, Rack-A-Tiers, Ridgis, Santronics & More. For more information, click here and browse our catalog.

If you are looking to obtain a quote or cannot find what your are looking for, please contact us.

6.25.2009

Pelco DX4004 & DX4500/46000 DVR Camera Kits

Selecting a quality video security solution is now easier than ever with our new Pelco video security system packages. Each package includes a user friendly DX4004, DX4500 or DX4600 Series DVR, Pelco's high resolution cameras, a Pelco monitor and a power supply.

As you can see, these packages have everything you need!

For more information, click here and browse our catalog or if you are looking to obtain a quote or cannot find what your are looking for, you are more than welcome to contact us.

ISONAS Reader-controllers and Proximity Credentials from HID

ISONAS reader-controllers can be optionally enabled to read HID’s Proximity credentials. HID’s Proximity credentials have many formats available. Each format specifies the amount and contents of the information recorded on the credential.

Basic Guidelines for ISONAS’s HID-Enabled reader-controllers:

  • All formats of HID Proximity Cards (125KZ) can be read.
  • Indala cards and the ProxPass cards are not supported.




The data on the card is converted into an ISONAS equivalent credential number.

ISONAS Reader-controllers and Proximity Credentials from HID

For more information, click here and browse our catalog or if you are looking to obtain a quote or cannot find what your are looking for, you are more than welcome to contact us.

6.23.2009

Trigon Electronics

We have now uploaded the entire catalog of Trigon Electronics Emergency Stations, Telephone Entry Systems, Access Control, Gate Access and Elevator Emergency systems.

Trigon Electronics has been in the "access control" market since 1976. It was started out of necessity as the founding owner wanted a device to allow access to his apartment building, thus a company was born. Numerous new products have been developed over the past two years, including expanding into the emergency tower market. Their Emergency Telephones & Towers have been installed at major universities, hospitals and many other facilities across the U.S. Because of the sheer volume, you may not find what you're looking for at first glance, that's when we encourage you to contact us with your questions. We're here to help!


For more information, click here and browse our catalog or if you are looking to obtain a quote or cannot find what your are looking for, you are more than welcome to contact us.

ISONAS history

Founded in 1999, ISONAS Security Systems provides advanced, IP Access Control solutions for customers who require the superior, real-time door control only possible with a true network appliance. The company’s management and R&D teams include hardware engineers possessing advanced know-how in RFID, proximity cards and reader technologies, and software engineers expert in programming for IP security solutions. ISONAS’s PowerNet™ IP Reader-Controllers with Power over Ethernet, connect directly to a company’s data network without a control panel. This unique connectivity shifts real-time control of enrollment, access control, time and attendance and emergency response from high maintenance hardware to the flexible, easy-to-install software located on the network. ISONAS’s products are driven by proprietary, WINDOWs-based software which facilitates integration of the IP Readers with other network-based access control devices and systems. Headquartered in Boulder, Colorado, USA , the Company is privately owned and backed by a private investment group.

ISONAS PowerNet IP Reader-Controllers™ bundled with Crystal Matrix Software™ and Crystal EasyWeb Access Control™ enable authorized security administrators to shift control of enrollment, identification, access control, time and attendance and emergency response from high maintenance panel hardware to flexible, easy-to-use software on the network. In dynamic environments where personnel and events can change quickly, having the real-time control that ISONAS provides means better security.

Old-fashioned access control is dependent on coaxial cable. In fact, the expense of scaling up most access control systems, is based on the cost of running cable. If a company's security requirements include running cable to different floors or between separate buildings, the installation alone can become laborious and prohibitive. Since IP access control runs over the Ethernet - the same path as your data network - cabling is minimized while the information flow increases. In fact, with ISONAS' IP system the doors in facilities in different cities, states or countries can be monitored from one central location utilizing Crystal Matrix Software ™ and the company network. The problem of scalability is a problem no more.

6.11.2009

All About The ISONAS Trim Kit

About the ISONAS Mullion

Trim Kit

Trim Kit Features:

The ISONAS Trim Kit is typically used when it is desired to mount the PowerNet reader-controller onto a "single-gang electrical outlet box".

To purchase, simple order an ISONAS reader with the Trim Kit package, such as the ISONAS RC-02-HLF-IP-M/X/4F/TK. (The /TK in the part number denotes the addition of the Trim Kit)

In some jurisdictions, the local building codes require that an outlet box be used. The use of an electrical outlet box can also localize and simplify the reader-controller’s wiring process.

Since the opening of a standard outlet box is wider than the width of the PowerNet reader-controller, the Trim Kit is used to completely cover the outlet box, giving the installation a sleek, finished look.

Threaded brass-inserts reinforce the attachment points for the PowerNet reader-controller.

The Trim Kit can also be used for installations where the mounting surface is so textured, that it is difficult to attach the reflective sticker used to support the PowerNet’s anti-tamper feature.



Dimensions (inches):

2 3/4" wide x 7 3/4" tall x 3/16" thick

Attachment screws are included

See the Trim Kit Spec Sheet

5.27.2009

Myths about PoE

source: midspans.com

Power-over-Ethernet (PoE) technology integrates power and data across standard Cat5/5e/6 network cabling and provides more flexibility in today’s workplace. PoE enables power to be supplied to network devices, such as IP phones, network cameras, and wireless access points through a single, most often existing, network cable. When combined with an uninterruptable power supply (UPS) a PoE network delivers continuous operation and minimizes business downtime by eliminating most power interruptions. With the ability to install endpoints in any location PoE technology provides a scalable and flexible networking infrastructure geared for growth and efficiency.


Myth #1: PoE Switches can provide all the power I need or will need.

Today most switches are merely PoE-enabled. This means the majority rely on power management to share available power across the switch ports. The switches are designed with a smaller power supply that is typically capable of powering the switch itself and providing the required 15.4 watts of power over a limited number of ports.

For example: A 24-port PoE Switch with power management typically has a 195-watt power supply. After the 40 watts needed to power the switch, you have approximately 155 watts remaining. If 12 of the 24 ports are used to connect end devices using 11.5 watts each, you would only have 17 watts remaining to provide power on the last 12 ports. The math doesn’t match the ports: 195W – 40W (switch) – 138 (12 devices @ 11.5W/ea) = 17W left for power on 12 ports

Myth Busted: A PoE Switch is often not the best and most cost effective solution.

-------------------------------------------------------------------------------------------------

Myth #2: A midspan and a PoE switch are the same.

A PoE Midspan is not a switch. A Midspan is an additional PoE power source that can be used to offer full power to all endpoint devices. PoE Midspans (Power Hub or Power Injector) pass data from a switch and ‘inject’ safe power acting as a patch panel of sorts. Midspans are commonly used with either a non-PoE switch, an existing PoE switch, or a new PoE switch in a network. In addition to offering full power across all available ports, midspans costs substantially less per port and overall than a new PoE enabled switch.

Myth Busted: Midspans do not switch – they make use of existing best-in-class switches. They inject safe power across all ports and cost less than PoE switches.

-------------------------------------------------------------------------------------------------

Myth #3: Only a switch that has PoE built in should be used to power devices like IP Phones, Access Points, and IP Security Cameras.

Switches were designed to, well, switch. PoE Switches are designed with power management and have to distribute different power as required to ports but there is often not enough power for all devices plus the power required to complete the primary task - switching. Networks that have multiple devices like IP phones, IP cameras, wireless access points quickly go beyond the limited capacity of managed power PoE switches. As more PoE devices continue to grow in capabilities and market share this managed power limitation will become more and more evident. Midspans, in contrast to switches, were designed to provide full power on every port and deliver safe and reliable power based on the industry standards (IEEE802.3af/at).

Myth Busted: Rather than relying on power management in a switch use a midspan that can deliver full power (15.4W) to every port for all PoE-enabled devices now and in the future.

-------------------------------------------------------------------------------------------------

Myth #4: Ethernet devices not PoE-enabled (non 802.3af/at compliant) cannot be powered using PoE technology.

Many devices do not directly accept Power-over-Ethernet but can still use PoE technology. If the device uses less than 12.5 watts (802.3af) or less than 50 watts (802.3at+) and connects to an IP Ethernet network you can use a PoE splitter. PoE splitters enable you to accept PoE power from any IEEE 802.3af/at compliant switch or midspan then separates the data and power on to two seprate cables. The data is connected to the end device through a standard RJ45 plug while the power is connected using a standard 5.5 x 2.1 x 12mm Adapter Plug. Splitters can also convert the input voltage to the required voltage for a non-PoE device. Splitters are traditionally used with older network products which only accept power through their (DC) jack and data through their RJ-45 jack.

Myth Busted: PoE splitters can be used in conjunction with PoE midspans and switches to provide both the data connectivity and power required by most endpoint devices.

-------------------------------------------------------------------------------------------------

Myth #5: I need/will need additional PoE switch ports to power my IP cameras and high-power pan, tilt, and zoom (PTZ) cameras.

Today, many devices have evolved into more advanced solutions with higher power requirements. The traditional approach was to endure a “forklift upgrade”. This meant buying new PoE switches at considerable cost and physically swapping out the existing switches to meet higher power requirements or add more powered ports. There is an easy and more cost-effective way – separate the data and power in the wiring closet (IBF). It is more efficient and costs less to separate your data and power allowing you to keep your best-in-class business switch for your IP needs and supplement it where required with best-in-class midspan technology to power the endpoints.

Myth Busted: A PoE Switch is often not the best and most cost effective solution.

-------------------------------------------------------------------------------------------------

Myth #6: All midspans are created equal . . . they are all the same.

Always select a best-in-class midspan. If you wanted to enhance your switched network wouldn’t use a best-in-class network switch? Of course you would. A midspan designed and manufactured by a leading power supply company that understands power, power requirements, and one that delivers enterprise-level solutions.

Select a midspan manufacturer that has multiple members on the IEEE (PoE) committee helping to define safe, new PoE standards. This ensures that every midspan is designed to meet current and future IEEE specifications for Power-over-Ethernet.

Select a midspan manufacturer that designs, manufactures, and tests its own product rather than outsourcing these tasks across the globe to cut costs.

Select a midspan that has a high-speed, common interface to access the management console. A USB port is not as cheap as a serial port (RS-232) but is faster, more user-friendly, and more common on high quality midspans.

Myth Busted: Although there are many midspan manufacturers out there, few have the power supply experience, quality controls, and manufacturing capability to produce best-in-class midspans. All midspans are NOT created equal.

-------------------------------------------------------------------------------------------------

Kondor Security carries a full range of PoE products and midspans from PowerDsine. We're still uploading their product alongside our constant expansion, so if you're interested in midspans or anything else security related, feel free to contact us.


Technorati Profile