Showing posts with label HID. Show all posts
Showing posts with label HID. Show all posts

4.01.2014

April Promotion:




            SPRING SAVINGS ALERT! 

Get Free Shipping* on all Isonas Card Reader Orders from Kondor Security, Now Through April 30th!



The industry's first panel-free IP reader controller to deliver true Power Over Ethernet, Isonas PowerNet Readers provides the freedom to secure an unlimited number of doors without the hassle of have to wire panels or hubs.


ISONAS RC-03-PRX Ethernet Enabled Reader-Controller.  Proximity (125 kHz) Reader Controller Configurations for Interior & Exterior Access Points and it supports both ISONAS & HID Proximity Credentials.

ISONAS RC-03-MCT Ethernet Enabled Reader-Controller.  Proximity (13.56 MHz & 125 kHz) Reader-Controller Configurations for Interior & Exterior Access Points.  The RC-03-MCT supports Mifare, Desfire,iClass, PIV Smart Cards and ISONAS & HID Proximity Credentials. 

Both versions available in Keypad and Non-Keypad formats. 

Be sure to check out the Kondor Security Web Store for all of your Isonas needs. 

*Please use the code “ISONAS READER” and click the Redeem Coupon button.  The offer enables free shipping on Isonas products that include at least 1 Reader/Controller.  Please note:  The offer does not include shipping when other items from separate manufacturers are included on the order. If you run into problems redeeming coupon online please contact Customer Service at 888-409-9245.
 
http://kondorsecurity.com/store/access_control.html



10.08.2012

Presenting the ISONAS Multi-Card Technology PowerNet IP Reader-Controller™

Newest product in the award-winning line of PowerNet IP Readers™

The first, panel-free, patented IP reader-controller with Power over Ethernet.

Advantages over legacy, old-fashioned, IP panel - based access control:
  • TCP / IP direct-connectivity to the door.
  • Open System solution built with MS Windows
  • Reads ISONAS & HID proximity cards, and ISO 14443 smart cards
  • Connector-based RJ45 & pig-tail for quick and simple installation
  • Supports Power Over Ethernet (PoE)
All ISONAS IP Door Reader-Controllers connect directly to the data network via existing LAN/WAN infrastructure. The panel-free system, featuring ISONAS Crystal Matrix Software™, places real-time control of enrollment, access, time & attendance and emergency response, in the hands of your authorized security administrator.

ISONAS PowerNet IP Readers are “true network devices” designed using IP standards and technology. Once installed, the reader-controllers use TCP/IP to open a dialogue with the ISONAS Crystal Matrix Software™ and await your specific commands and parameters. Customers find this “plug and play” configuration much easier than stringing special wiring and less time consuming than programming and connecting to legacy IP control panels. The streamlining of installation, maintenance and integration results in significant cost-savings. Endusers want to leverage the investment in their networks and this desire is driving demand for secured, networkfriendly, security devices. ISONAS’s visionary hardware and software offer these solutions today.

The ISONAS PowerNet Multi-Card Reader-controllers support a variety of credential technologies:

Smart Cards
  • MiFare
  • iClass
  • DESFire
  • PIV
Supported HID prox cards:
  • Proxcard II
  • ISOProx II
  • DuoProx II
  • Smart DuoProx II
  • iCLASS Prox
  • Proxkey III
  • MicroProx
  • DuoProx
  • PhotoProx 

2.11.2010

ISONAS' Crystal Matrix at a glance.

Easily Support Seasonal Schedules with ISONAS Access Control System
source: ISONAS

Are some of your clients affected by seasonal changes to their facility's schedules?

Seasonal variations are common for organizations such as:

  • Schools and Libraries
  • Park Districts
  • Amusement Parks
  • Sports Facilities
  • Churches
  • Recreation or Tourism Business

Many of these organizations will wnat to pre-plan and pre-program the upcoming schedules into their access control system, so that the schedule's transition times are seamless and worry-free. The Crystal Matrix application supports these types of requirements with the Permission Groups feature.

Crystal matrix Permission Groups for Schools

A high school might use the Permissions Group feature of Crystal matrix to schedule the full summer activity sessions before the end of the school year. Prepare the system for band camp, 2-a-days football practice, teacher development workshops, and adult education seminars. All pre-planed and pre-programmed before the school's staff begins its summer break. As the summer calendar progresses, the access control system automatically adjusts the system's business rules to allow the proper people into the school, at the proper times.


Understanding how to use Crystal Matrix Permissions

To effectively use the Crystal matrix Permission Groups feature, you shoul dhave a solid understanding of how Permissions are defined within the system. Below are links to short training videos that explain the process of setting up Permissions within the ISONAS system.


The Clash of the Titans; Physical Security and IT Security

IT departments are no strangers to turf wars, but is the one shaping up between those overseeing computer networks and those in charge of physical security about to get really ugly?

Unlike past tussles between say, voice and data communications teams, the contest between IT security and those involved in everything from fire alarms to video surveillance to door-lock access controls tends to involve people who might never have had any reason to cross each other's paths.

Converging physical and logical security: A good idea or not?

"It typically takes a C-level executive to force these organizations to work together," says Tom Flynn, director of marketing in North America for smart-card maker Gemalto. "The fact is there are different entities in a corporation for physical and logical security… We see turf wars happening."

Merging physical and logical security is seen by advocates as a cost-saving step and a natural evolution for facilities maintenance and guard operations, where door-access equipment and video cameras are increasingly IP-enabled, and a smart card-based badge could be used by employees to access both buildings and computers. But resistance to convergence runs deep among traditional physical security managers, who are wary of IT departments taking control. And even IT security experts voice concerns that it's risky, with some strongly opposed to the idea of physical security operations, such as video surveillance streams, riding on the same IP corporate network as the rest of the business.

"Physical security has been about closed systems, but with the move to IP-based systems and connecting campuses there's the need to have the IT and security department involved," says Steve Russo, director of security and privacy technology at IBM's global technology services group. He says there can be advantages in integrating physical security with logical and transactional systems to give management a better picture of what's occurring, especially in retailing. And although network capacity is a concern, it's possible to share an IP network for logical and physical security, he suggests.

"Is there a risk associated with combining it? Absolutely," Russo acknowledges. But he adds: "The logical-security people are looking at threats to the environment. And where we see the interesting spark is that they can take information about physical events and turn it into operational use."

But there's often a cultural rift existing between the physical security department for facilities management, with their isolated closed networks, and the IT department with its systems administrators and security specialists trying to keep scores of Internet-accessing computers and applications running safely.

"With IP-based access control, the 'turf wars' tend to be marginalized once the IT folks realize that a system like ISONAS' PowerNet reader is actually a network appliance," says Steve Rice, Vice President of Sales and Marketing for Colorado based ISONAS Security Systems. "It demands little in the way of network capacity, resources to install and can be supported like any other IP device. The benefits of integrated video, access control and/or other building control systems include a combination of additional detailed information available from a set of closely integrated functionalities (ex. have a picture of personnel involved in an entry event plus network confirmation of the credential information timed exactly to the video feed) as well as the simplicity of dividing what functionality to integrate on a customer by customer basis. This is due to the relative ease of integration with a true network software-based system. So the physical security requirements are met with a minimum of IT resource."

These differences in viewpoint are often heard in the physical-logical security convergence debates. But one of the most ardent advocates for convergence might be Ray O'Hara, executive vice president of international operations, consulting and investigations at Andrews International, which is in the traditional physical security business of "guns, gates and guards," as he puts it.

"The traditional security person and the cyber-security side are both hands-on and doing things for the betterment of the organization," says O'Hara, who recently became president of the board of directors of ASIS International, an organization for security professionals.

But today the physical-security technologies are evolving to the point where "the traditional people need help from the IT people," O'Hara says. There is often discord and mistrust between the physical and logical security divisions. But that needs to be overcome by possibly combining reporting structures so they can more easily collaborate or by setting up a "risk council" to have regular discussions with business managers, he suggests.

IBM's Russo says protocol issues point to the need for standardized compression techniques and transport in physical-security equipment, as well as standard XML-based definitions so that important meta-data can be shared. "Physical security is transitional right now," Russo says, pointing to both the Physical Security Interoperability Alliance and OASIS as organizations trying to further interoperability standards that would add convergence and make it worthwhile.

But to date, Flynn says he is only aware of a handful of large enterprises in the oil-and-gas industry, such as Chevron and Exxon, and pharmaceutical giants such as Pfizer, that have adopted converged smart cards for physical and logical security.

1.07.2010

Scripting and the ISONAS System.

source: ISONAS

Script Programming supports Customized Actions
  • Is there a need to have your ISONAS system initiate multiple advanced actions under certain conditions?
  • Do you or your customers wish to receive email notifications when doors are left ajar or when ex-employees are attempting to re-enter the facilities?

These types of project requirements can easily be met through the Script Programming features application suite. Select the events you wish the system to monitor, and then specify what additional actions you would like the system to take when these events occur.



Schools Locking down their Facilities
 
A common use of Scripting is to configure the ISONAS system to place the exterior doors of a school into lock-down mode, when the administrators of the school require it. Scripts can be initiated in many ways, including by the use of specified credentials, or through the activiation of emergency mushroom buttons.

Additional common usages of scripting include the activation of the building's alarm system, or unlocking all entrances to a facility when a special event is beginning.



Email Notifications

Emails can be generated by the Crystal Matrix system, throught he Scripting feature. Example uses of the email notifications would include being notified of a networking failure, or being notified of an after-hours attempt to enter the facility.

Click here for more details on this solution.

Click here to visit the Kondor Security ISONAS page.

Click here to visit ISONAS.







6.25.2009

ISONAS Reader-controllers and Proximity Credentials from HID

ISONAS reader-controllers can be optionally enabled to read HID’s Proximity credentials. HID’s Proximity credentials have many formats available. Each format specifies the amount and contents of the information recorded on the credential.

Basic Guidelines for ISONAS’s HID-Enabled reader-controllers:

  • All formats of HID Proximity Cards (125KZ) can be read.
  • Indala cards and the ProxPass cards are not supported.




The data on the card is converted into an ISONAS equivalent credential number.

ISONAS Reader-controllers and Proximity Credentials from HID

For more information, click here and browse our catalog or if you are looking to obtain a quote or cannot find what your are looking for, you are more than welcome to contact us.