Showing posts with label IP. Show all posts
Showing posts with label IP. Show all posts

10.01.2013

ISONAS * IN STOCK!! * SAME DAY SHIP!!!




 RC-03-PRX POWERNET READERS AND KEYPADS READY FOR SHIP!!!!!!!!






ISONAS PowerNet™ Reader is the first, panel-free, IP reader-controller with Power Over Ethernet. The unit is shown here with the optional integrated keypad. Install an unlimited number of readers with no panels or hubs to worry about. PowerNet readers are supplied with a pigtail used for connecting auxiliary devices, electronic strikes, REX buttons etc. Pigtails are available in the standard 4' length as well as 10' and 25'. 
          
              

  PowerNet Reader Options 
Part #
Proximity
RC-03-PRX
Proximity & Keypad
RC-03-PRX-K
MultiTech
RC-03-MCT
MultiTech & Keypad
RC-03-MCT-K


(WITH OUT KEYPAD)   
RC-03-PRX                RC-03-PRX-K
  (WITH KEYPAD)
PowerNet Reader Options
Description
/X
Eternal Door Kit (EDK)
/4F
4 foot pigtail
/10F
10 foot pigtail
/25F
25 foot pigtail
/TK
Trim Kit  



POWERNET CABLES--( MULTIPLE SIZES ) 

       




ISONAS TRIM KITS

The ISONAS Trim Kit is typically used when it is desired 
to mount the PowerNet reader-controller onto a "single-gang 
electrical outlet box".
The Trim Kit can also be used for installations where the 
mounting surface is so textured, that it is difficult to attach the 
reflective sticker used to support the PowerNet’s anti-tamper 
feature.





MUCH MORE!!!!

“Kondor Security offers the full line of Isonas Security Products.  We deliver rapidly, as most readers and accessories can ship same, or following day, depending on the time of order.
Contact us for more details.  888-409-9245 or customer_service@kondorsecurity.com.”




5.31.2013

Introducing the ISONAS PowerNet IPBridge™

Introducing the ISONAS PowerNet IPBridge™

Introducing the ISONAS PowerNet IPBridge
PowerNet IPBridge
2-Door Model – PN: IPBridge-2
3-Door Model – PN: IPBridge-3

Avoid rip and replace. Easily and cost effectively expand legacy systems to seamlessly operate within an ISONAS Pure IP environment. The PowerNet IP Bridge connects the modern IP-network world and legacy Wiegand installations. Traditional and IP enabled panels can be replaced by simply unplugging existing panels and attaching Wiegand readers directly to the IP Bridge. Two and three door configurations allow you to match the exact number of doors you are taking over. The PowerNet IP Bridge connects legacy systems and new installs of PowerNet reader-controllers to operate as one system using a single credential.


Features of the IPBridge:
  • Direct IP-Network connectivity
  • Supports both Power Over Ethernet (PoE) and PoE-Plus
  • Open System -- Ethernet network appliance 
  • Supports standard door hardware, including Wiegand readers.
  • Dual port allows interconnection of multiple IP Bridges
Why use the IPBridge:
  • Eliminates the need to rip and replace existing hardware to upgrade system
  • Leverages existing IT network and legacy security infrastructure
  • Seamlessly allows migration to a Pure IP Access Control Solution
  • Creates a flexible solution to grow with future needs
  • Scale from 1 access point to 1,000s on a single server 

FORM FACTOR
ENVIRONMENTAL
Durable plastic enclosure, flame-retardant ABS, UV
stabilized
DIN rail mountable
6.28” X 3.55” X 2.26”
Ambient operating temperature -40 to 50 degrees Celsius (-40 to 120 degrees Fahrenheit) Operating humidity is 0 – 90% (non-
condensing)
POWER OPTIONS (field selectable)
STANDALONE CAPABILITY
Power Over Ethernet (PoE) (IEEE 802.3af, Class 0)
Power Over Ethernet Plus
(IEEE 802.3at, Class 0)
DC power:   <; 260mA @ 12 volts DC
< 180 mA @  24 volts DC
Each door is capable of storing 20,000 cardholders, 5000 access events and 32 time
zones which can be configured and accessed by an external host system
NETWORK COMMUNICATIONS
“Door” OUTPUTS (occurs 2 or 3 times)
·     Ethernet, TCP/IP,  standard RJ45, Interrupt driven.
·     Network-Server mode or Network-Client mode,
·     Field flashable microcode: On any IPBridge, anywhere on the network.
·    ASYNCH network communications - No network polling.
Powerful Local Mode feature set –Allows most installations to operate in Local Mode. Results in faster
and more consistent card-holder response times, less network traffic, tolerance of network latency, and reduced host system load.
·     Door Control relay (for electric lock, rated 2.0 A
@ 30 VDC, form C)
·     Powers Wiegand reader
·     Control for Wiegand reader’s two LEDs
·     Control for Wiegand reader’ buzzer
·     Two TTL outputs (configurable default state)
·     Auxiliary Power output - PoE-Plus supplies 19 watts (1.6 amps @12 VDC) for other devices,
like the electronic locks.
Regulated 10VDC output supplied for Wiegand device, regardless of input power source.
“Door” MONITOR INPUTS (occurs 2 or 3 times)
VISUAL INDICATORS
·     Three configurable sensor inputs.
·      Typically used for door sense (normally closed), request for exit (REX, normally open) and an optional input for flexibility (AUX, normally open)
·     Accepts Wiegand reader’s credential data
·     Wiegand connection supports 500ft cable length
·     IPBridge Power and network status indicator
·     Door control status indicator for each door.
PROTECTION
·     Internal power up diagnostics. AES Encryption
Supported.

For more information click here for the specification sheet [ISONAS ProductSheet IP-Bridge.pdf]

10.08.2012

Presenting the ISONAS Multi-Card Technology PowerNet IP Reader-Controller™

Newest product in the award-winning line of PowerNet IP Readers™

The first, panel-free, patented IP reader-controller with Power over Ethernet.

Advantages over legacy, old-fashioned, IP panel - based access control:
  • TCP / IP direct-connectivity to the door.
  • Open System solution built with MS Windows
  • Reads ISONAS & HID proximity cards, and ISO 14443 smart cards
  • Connector-based RJ45 & pig-tail for quick and simple installation
  • Supports Power Over Ethernet (PoE)
All ISONAS IP Door Reader-Controllers connect directly to the data network via existing LAN/WAN infrastructure. The panel-free system, featuring ISONAS Crystal Matrix Software™, places real-time control of enrollment, access, time & attendance and emergency response, in the hands of your authorized security administrator.

ISONAS PowerNet IP Readers are “true network devices” designed using IP standards and technology. Once installed, the reader-controllers use TCP/IP to open a dialogue with the ISONAS Crystal Matrix Software™ and await your specific commands and parameters. Customers find this “plug and play” configuration much easier than stringing special wiring and less time consuming than programming and connecting to legacy IP control panels. The streamlining of installation, maintenance and integration results in significant cost-savings. Endusers want to leverage the investment in their networks and this desire is driving demand for secured, networkfriendly, security devices. ISONAS’s visionary hardware and software offer these solutions today.

The ISONAS PowerNet Multi-Card Reader-controllers support a variety of credential technologies:

Smart Cards
  • MiFare
  • iClass
  • DESFire
  • PIV
Supported HID prox cards:
  • Proxcard II
  • ISOProx II
  • DuoProx II
  • Smart DuoProx II
  • iCLASS Prox
  • Proxkey III
  • MicroProx
  • DuoProx
  • PhotoProx 

6.22.2010

Looking for Vulnerabilities in All the Right Places? Experts Think you Might be Missing a Few...

Source -- DarkReading
By Keith Ferrell, Contributing Writer
DarkReading
 
The biggest vulnerabilities in the enterprise might be items we see every day -- and just don't think about.

Experts say that vulnerability assessments often overlook the everyday dangers: Network-attached devices that aren't computers. Paper documents. Passwords posted in plain view. Portable storage devices.

Most of these are technologies that would never be taken into account by a traditional vulnerability scan. Yet they could lead to data leaks just as surely as a keylogger or a data-stealing Trojan, experts say.

"Peripheral devices on the network may have capabilities the business doesn't know of," says Kevin Brown, delivery manager for custom testing at security assessment firm ICSA. "And those capabilities can create security vulnerabilities."

Printers, fax machines, and multifunction devices with persistent storage could all serve as entry points for a sophisticated hacker, Brown observes. And the presence of internal storage might not be clear at first glance, nor does it necessarily show up on traditional security audits.

"An automated vulnerability scan may not reveal which printers and other hard copy devices have hard drives," Brown observes. "As a result, the business isn't aware that digital copies of sensitive information may remain in the printer."

A thorough vulnerability assessment should include examining all hard copy devices for internal storage capability -- this could require contacting the manufacturer or even opening the machine, Brown says.

Enterprises also should take steps to ensure that digital files are wiped from these devices as soon as the hard copy is produced or the fax transmitted. This could mean purchasing and installing additional software from the manufacturer.

Other network-attached devices could also be vulnerable, Brown observes. "Any device connected to the network needs to have its security validated," he says.

He offers security cameras as an example. "For cost-saving and other reasons, companies have shifted security cameras from dedicated coaxial cable connections to TCP/IP connections, which run the risk of being vulnerable to cross-site scripting attacks and remote control takeover."

Even backup power devices might be at risk, Brown warns. "UPS devices connected to the network could enable an attacker to take control," he says.

Brown offers three bits of advice for all network-attached devices. "The biggest risk is leaving the default password in place," he says. No matter the device and its purpose, he advises, users should change its password before connecting it to the network.

"Second," Brown continues, "review all of the features that the device offers. Web printing capability may not be useful as a business function at your company, but it could be very useful to an attacker."

Finally, he points out that maintaining security readiness on peripheral devices is an ongoing process.

"Incorporate all devices into your patch cycle," he says. "We're all familiar with Microsoft and Cisco patches -- but when was the last time you upgraded the firmware on your printer? Seek out patch information on every device connected to your network, and incorporate them into your patching cycle."

Many of these office devices produce a lot of paper -- paper which, as security consultant Steve Stasiukonis of Secure Network Technologies points out, can be a vulnerability itself.

"Take a look at your copier station," Stasiukonis says, noting that many companies overlook sensitive material that might be found in unsecured places. Recycling bins or preshredder collection stations holding unshredded materials can be rich sites for information-miners, he notes.

Documents that aren't shredded could be the cause of a data breach, as a recent New Jersey incident revealed when papers containing Social Security numbers and other personal information were found in a public dumpster.

"And don't forget the amount of paper and other sensitive information on employees' desks," Stasiukonis advises.

A workplace walk-through -- even in a "clean desk" environment -- can often reveal security badges and swipe-cards laying in plain sight, ripe for the taking, Stasiukonis explains. In his physical penetration tests, Stasiukonis frequently also finds passwords and log-ins on sticky notes and keyrings hanging from thumbtacks in cubicles.

Even if you don't see anything at first glance, Stasiukonis suggests, look a little closer. "Have your employees turn over their keyboards for inspection," he suggests, noting that many users stick their passwords there for easy recall.

Stasiukonis also recommends checking devices, such as copiers, for default service tech passwords, which might remain in place even if the business has changed its own access and log-in codes.

"Check to be sure that security cameras haven't been repositioned," he adds. "Scan for infrared devices. Examine the security not only of IT administration notebooks, but also physical plant management and control notebooks. Beyond that, an examination of the contents of employees' desks can reveal treasure chests of vulnerabilities.

"But," he cautions, "before going into employees' desks, you should review your plans with your human resources department." Whatever your company's legal rights, many employees resent having their desks checked, so be sure to educate them before conducting a search, he explains.

Another vulnerability vector -- and in many ways the most common one -- is human nature.

Security professional Scott Wright's Honey Stick Project put human nature to the test by leaving specially prepared USB drives in plain sight. When one of the drives was inserted in a business device, the information was logged, revealing what the user had done.

Such behavior is typical, according to Wright. As he notes on his Streetwise Security Zone site: "Out of 54 devices dropped with specially configured -- but safe -- files on them, the Honey Stick Project has detected that at least 35 of these devices have had files opened."

Vulnerability-scanning tools are a good place to start, but they can't see the whole enterprise, the experts warn. To find all of your vulnerabilities, you'll need to look at the things your users see every day -- in a new way.

6.21.2010

The Pelco DX Series, Doing More for Less... Part 1.

For many years and countless hours of around-the-lock operation, the Pelco DX Series of DVRs has been relied upon to protect people and property in thousands of location worldwide. From basic video security systems with just a few cameras, to fully distributed network video systems, the DX Series is the perfect digital recording solution to meet most any video recording need.

The DX Series begins with the DX4100. These affordable, entry-level DVRs eliminate the need for the traditional VCR/multiplexer/matrix combination. Offering four-channel models with internal storage capacity of up to 2 tb, the DX4100 series is designed to guard your business while protecting your bottom line. The hallmark of the DX4100 series is its ease of operation. These systems feature simple installation, are ready to record right out of the box, and have an easy-to-use and intuitive user interface which makes training and support a snap.

2.11.2010

ISONAS' Crystal Matrix at a glance.

Easily Support Seasonal Schedules with ISONAS Access Control System
source: ISONAS

Are some of your clients affected by seasonal changes to their facility's schedules?

Seasonal variations are common for organizations such as:

  • Schools and Libraries
  • Park Districts
  • Amusement Parks
  • Sports Facilities
  • Churches
  • Recreation or Tourism Business

Many of these organizations will wnat to pre-plan and pre-program the upcoming schedules into their access control system, so that the schedule's transition times are seamless and worry-free. The Crystal Matrix application supports these types of requirements with the Permission Groups feature.

Crystal matrix Permission Groups for Schools

A high school might use the Permissions Group feature of Crystal matrix to schedule the full summer activity sessions before the end of the school year. Prepare the system for band camp, 2-a-days football practice, teacher development workshops, and adult education seminars. All pre-planed and pre-programmed before the school's staff begins its summer break. As the summer calendar progresses, the access control system automatically adjusts the system's business rules to allow the proper people into the school, at the proper times.


Understanding how to use Crystal Matrix Permissions

To effectively use the Crystal matrix Permission Groups feature, you shoul dhave a solid understanding of how Permissions are defined within the system. Below are links to short training videos that explain the process of setting up Permissions within the ISONAS system.


The Clash of the Titans; Physical Security and IT Security

IT departments are no strangers to turf wars, but is the one shaping up between those overseeing computer networks and those in charge of physical security about to get really ugly?

Unlike past tussles between say, voice and data communications teams, the contest between IT security and those involved in everything from fire alarms to video surveillance to door-lock access controls tends to involve people who might never have had any reason to cross each other's paths.

Converging physical and logical security: A good idea or not?

"It typically takes a C-level executive to force these organizations to work together," says Tom Flynn, director of marketing in North America for smart-card maker Gemalto. "The fact is there are different entities in a corporation for physical and logical security… We see turf wars happening."

Merging physical and logical security is seen by advocates as a cost-saving step and a natural evolution for facilities maintenance and guard operations, where door-access equipment and video cameras are increasingly IP-enabled, and a smart card-based badge could be used by employees to access both buildings and computers. But resistance to convergence runs deep among traditional physical security managers, who are wary of IT departments taking control. And even IT security experts voice concerns that it's risky, with some strongly opposed to the idea of physical security operations, such as video surveillance streams, riding on the same IP corporate network as the rest of the business.

"Physical security has been about closed systems, but with the move to IP-based systems and connecting campuses there's the need to have the IT and security department involved," says Steve Russo, director of security and privacy technology at IBM's global technology services group. He says there can be advantages in integrating physical security with logical and transactional systems to give management a better picture of what's occurring, especially in retailing. And although network capacity is a concern, it's possible to share an IP network for logical and physical security, he suggests.

"Is there a risk associated with combining it? Absolutely," Russo acknowledges. But he adds: "The logical-security people are looking at threats to the environment. And where we see the interesting spark is that they can take information about physical events and turn it into operational use."

But there's often a cultural rift existing between the physical security department for facilities management, with their isolated closed networks, and the IT department with its systems administrators and security specialists trying to keep scores of Internet-accessing computers and applications running safely.

"With IP-based access control, the 'turf wars' tend to be marginalized once the IT folks realize that a system like ISONAS' PowerNet reader is actually a network appliance," says Steve Rice, Vice President of Sales and Marketing for Colorado based ISONAS Security Systems. "It demands little in the way of network capacity, resources to install and can be supported like any other IP device. The benefits of integrated video, access control and/or other building control systems include a combination of additional detailed information available from a set of closely integrated functionalities (ex. have a picture of personnel involved in an entry event plus network confirmation of the credential information timed exactly to the video feed) as well as the simplicity of dividing what functionality to integrate on a customer by customer basis. This is due to the relative ease of integration with a true network software-based system. So the physical security requirements are met with a minimum of IT resource."

These differences in viewpoint are often heard in the physical-logical security convergence debates. But one of the most ardent advocates for convergence might be Ray O'Hara, executive vice president of international operations, consulting and investigations at Andrews International, which is in the traditional physical security business of "guns, gates and guards," as he puts it.

"The traditional security person and the cyber-security side are both hands-on and doing things for the betterment of the organization," says O'Hara, who recently became president of the board of directors of ASIS International, an organization for security professionals.

But today the physical-security technologies are evolving to the point where "the traditional people need help from the IT people," O'Hara says. There is often discord and mistrust between the physical and logical security divisions. But that needs to be overcome by possibly combining reporting structures so they can more easily collaborate or by setting up a "risk council" to have regular discussions with business managers, he suggests.

IBM's Russo says protocol issues point to the need for standardized compression techniques and transport in physical-security equipment, as well as standard XML-based definitions so that important meta-data can be shared. "Physical security is transitional right now," Russo says, pointing to both the Physical Security Interoperability Alliance and OASIS as organizations trying to further interoperability standards that would add convergence and make it worthwhile.

But to date, Flynn says he is only aware of a handful of large enterprises in the oil-and-gas industry, such as Chevron and Exxon, and pharmaceutical giants such as Pfizer, that have adopted converged smart cards for physical and logical security.

1.18.2010

Financial Security Solutions with Simons-Voss

Whether it is the system, an organization, or people, your world revolves around integrity and verified trust.
It used to be that a brass key was a powerful symbol of trust and protection, bu tin today's world most brass keys are easily duplicated and the locks that depend on them are easily fooled or bypassed. On top of that, managing these keys is expesnsive and the functionality of the keys is very low. Depending on mechanical keys to protect your responsibilities in today's world is like telling your customers that their mattress is a good place to keep their money.

Fortunately SimonsVoss has locks that are as sophisticated as today's financial instruments.
With a wide range of products for various applications you never need to modify the door or frame and yet you end up with a sophisticated electronic lock that can control access by time and day while tracking all usage. Even better, the credentials use an encrypted challenge-response wireless signal that cannot be duplicated or successfully recorded and replayed.

Important Concerns
  • High cost of frequent re-keying.
  • Keys are easily copied or duplicated.
  • No record of which key was used or when it was used.
  • No control of when keys may be used.
  • Aesthetics are important to provide a warm inviting atmosphere to customers
  • Leased facilities, temporary needs for security.
  • ATM kiosks and small remote offices.
SimonsVoss Benefits
  • Re-keying accomplished with the click of a mouse.
  • Transponders are very hard to duplicate and very secure.
  • SimonsVoss loicks provide an audit trail so you can see who used the lock and when that access was granted.
  • All SimonsVoss locks and credentials can be limited to specific times and/or days at your discretion.
  • SimonsVoss locks look like standard locks. No need to advertise your security precautions with big, ugly industrial-looking locks.
  • Remove the mechanical lock, apply the SimonsVoss solution. When the need is over replace the mechanical lock and use the SimonsVoss lock for the next need.
  • Standalone or networked, the SimonsVoss wireless solutions makes it easy to implement solutions for these applications.

The best news of all is that these locks can be deployed one at a time as standalone solutions or combined under a centrally controlled network so you are not limited by applications that are too small or large to benefit from this solution.

Digital Mortise Cylinder

  • The Digital Mortise Cylinder puts electronic access control into the mortise cylinder. Now you can remove the mechanical mortise cylinder and replace it with a digital cylinder.







Digital RIM Cylinder Exit Bar Outside Trim

  • The Digital RIM Cylinder puts electronic access control into the RIM cylinder. Now you can apply a digital lock cylinder in many applications where a RIM cylinder is required.






Digital Mortise Cylinder Aluminum Frame Door Lock

  • This gives you control over who has access, when they have access, and can track that use for later reference. You can even remove access for a user without their credential being present.






Smart Relay Mag Locks/Cabinets

  • Barriers, gates, rolling gates, automatic systems, revolving doors, elevators and alarm systems don't need to exist as separate entities.









SV1C Cylindrical Lock Office Doors
 
  • The SimonsVoss SV1C Digital Cylindrical Lock can be applied anywhere a standard commercial cylindrical lock is used without additional holes or wires. 



 

1.07.2010

Scripting and the ISONAS System.

source: ISONAS

Script Programming supports Customized Actions
  • Is there a need to have your ISONAS system initiate multiple advanced actions under certain conditions?
  • Do you or your customers wish to receive email notifications when doors are left ajar or when ex-employees are attempting to re-enter the facilities?

These types of project requirements can easily be met through the Script Programming features application suite. Select the events you wish the system to monitor, and then specify what additional actions you would like the system to take when these events occur.



Schools Locking down their Facilities
 
A common use of Scripting is to configure the ISONAS system to place the exterior doors of a school into lock-down mode, when the administrators of the school require it. Scripts can be initiated in many ways, including by the use of specified credentials, or through the activiation of emergency mushroom buttons.

Additional common usages of scripting include the activation of the building's alarm system, or unlocking all entrances to a facility when a special event is beginning.



Email Notifications

Emails can be generated by the Crystal Matrix system, throught he Scripting feature. Example uses of the email notifications would include being notified of a networking failure, or being notified of an after-hours attempt to enter the facility.

Click here for more details on this solution.

Click here to visit the Kondor Security ISONAS page.

Click here to visit ISONAS.







12.03.2009

Access Control - Then and Now


Access control systems have changed and grown exponentially since they were first introduced. In 2009, amazingly, the majority of access control systems on the market continue to utilize the same basic technologies that were introduced in the late ‘60s: a combination of simplistic card readers lacking electronic intelligence, linked by multiple wires to a centralized power supply and a central control panel. This setup makes the “allow entry” decisions for the card or other credential presented at the door. These systems are energy hogs, they’re difficult to install and –more simply put- they’re a relic of past technology.

Then – A look back in access control history

The original access control system was a simple lock and key. Still in use today, keyed locks are easy to install and affordable, yet easy to break into. The first generation of automated door access systems used what would today be referred to as primitive readers with no intelligence which passed credential information -from a magnetic or RFID-enabled card- to a central control panel, which made the “allow entry” decision. The next generation of readers made slight improvements so that the reader could be connected to the control panel with an RS-485 bus and had enough intelligence to open the lock. These second-generation “semi-intelligent” readers however still passed the credential codes to the control panel so there was no improvement in either installation cost or energy consumption cost.

Although the advent of “intelligent” readers improved memory to allow access decisions to be made at the reader, independent of the control panel, the panel was still necessary since updates to the system and event histories were uploaded to it. Though some current panels have added the ability to connect to a network, they still offer no new advances in installation time, costs or energy consumption.

As shown below, the installation of even the most modern panel-based system remains a labor and cost intensive exercise. The panel also has the disadvantage of limitations to the number of doors supported per panel – typically 4, 8 or 16 doors depending on the brand and model. This means that adding just one more door to a full panel system necessitates the addition of another panel, thus increasing the cost on both a total system and a per-door basis. The ongoing operational costs of any panel-based system are also higher than the state-of-the-art ISONAS alternative for two reasons;

Panel-based systems must be maintained by specially trained  personnel since they do not employ widely available computer standards of operations.

 They consume significantly more energy






Now – Intelligent IP reader-controllers

Alternatives exist today that take advantage of modern computing and networking technologies to provide a number of significant improvements over panel-based systems by improving the basic functionality of access control systems, improving the overall security parameters of these systems, lowering the cost of installation, lowering energy usage associated with the system’s operation and easy integration with other security and building management systems.

The ISONAS Powernet Access Control System utilizes a customer’s existing Ethernet-based Internet Protocol (IP) network to link intelligent reader-controllers via a CAT5 or CAT6 cable -the same cables that provide power to the ISONAS reader allow data communications to any inexpensive standard Windows computer running the system’s access control software – the ISONAS Crystal Matrix Software System.

“Allow entry” decisions are made at the door by the intelligent PowerNet IP reader-controller with historical event data passed, on a periodic basis, to the host software. The PowerNet reader contains a list of individuals that are allowed entry to the door (cabinet, gate, etc.) along with the times or shifts that they are allowed entry. Management of the system is easily accomplished via web-based pages from any computer with access to the internet. Individual reader-controllers can be set to stay open for specified periods or to remain locked until an authorized user’s credential is presented. Requirements such as anti-pass back, holidays and other special actions are easily accomplished through the Windows-based management software. Should the network go down, the PowerNet reader-controller continues to function in “standalone mode” and automatically updates the Crystal Matrix software when the network comes back online.

With Power over Ethernet (PoE) made possible by using the customer’s existing Ethernet network and industry standard CAT5 or CAT6 cabling, the additional power sources and wires needed for a standard panel-based system are simply unnecessary. The PowerNet reader-controller, the magnetic lock or strike and all the typical accessories, such as request to exit (REX) devices and door sensors, are powered by low voltage PoE through the PowerNet reader-controller. The on-going power usage of the system as a whole is therefore significantly more efficient than with any panel system, and installation is accomplished much faster -and is more cost effective- than is possible with a panel-based system.

The PowerNet is designed for both indoor and outdoor use and since it is not encumbered by a control panel, it can be installed in virtually any location with no limitation on the number of doors or access points. Adding new doors is as simple as adding a single CAT5 cable to the existing network facilities, attaching the PowerNet, the appropriate lock and accessories to the entry point and programming the reader-controller via the reader’s web-based pages from any computer with access to the internet.

Since the PowerNet system is managed by a software system (the ISONAS Crystal Matrix Access Control Software System) that runs on a standard Windows-based server, and is accessible through the normal IP network, integrating the PowerNet reader-controller with a web-based video system, building management system or other electronic security system is quite easily accomplished. The combination of access control and IP video into a single platform not only optimizes security and efficiency during operations but it also minimizes the costs of hardware, maintenance, and training of security personnel.

With this platform in place, it can easily be expanded to create a complete IP-based security and process monitoring system. Perimeter security devices, motion detectors, and/or additional cameras for monitoring key operations can be quickly added to the infrastructure. As illustrated below, the installation of a combination of IP-based access control and video surveillance is more efficient and cost effective than the installation of panel-based system.

Summary
Utilizing the capabilities of PoE allows access control devices to break free from the limitations of a control panel. Today one of the major advantages brought by PoE to the security marketplace is the freedom to install reader-controllers virtually anywhere. In a traditional panel-based system if the control panel fails the functionality of all the doors in the system is lost, severely impacting facility security. With an ISONAS system if the reader-controller fails it is isolated to one door.

The reason for the reduced installation costs of the ISONAS system is simple: Since the IT infrastructure already has PoE built in, no additional power infrastructure needs to be added to support the access control system. The number of wiring terminations required for an ISONAS system versus a panel based system is significantly reduced since an electrician installing a panel-based system terminates the wire at a junction box near the door and runs proprietary wiring back to the control panel where it has to be terminated again. With the CAT5 wire installation of the ISONAS system, “termination” is a single wire per reader-controller, pulled by less expensive installation personnel (no electrician required since CAT5 is low voltage) and uses the same simple plug familiar to anyone who has ever plugged a laptop into a network.

The installation labor of an ISONAS system is typically at least 30% less than a comparably sized panel-based system.

With a lower manufacturing carbon footprint and the lower voltage required from the PoE ISONAS devices, access control can now legitimately claim to have gone “green” since the power usage of an ISONAS system is significantly lower over its lifetime than with any panel system.

And since the actual hardware cost of a panel system with all its pieces and parts is more expensive than the simpler but more powerful ISONAS IP-at-the-door reader-controller, the whole system is more cost effective than any alternative available. Better security combined with more cost effectiveness – the difference between THEN and NOW.

9.08.2009

ISONAS Is A Green Technology Product

ISONAS, the World Wide leader in IP Access Control Systems, recognizes the PowerNet™ as a Green Technology Product.

Green building is as much about design strategy as about selecting eco-friendly materials.


Integrated design is thinking about how a building works as a system, and designing that system to be environmentally friendly is a key part of green building. Certain products, particularly those that deal with energy, can be used in ways that enhance the environmental performance of a building. The ISONAS PowerNet™ Access Control System can be used in any building type, and through its BACNet and OPC interfaces can integrate seamlessly with Building Automation applications.
Reduced energy usage, which also reduces carbon dioxide emissions and your energy bill, is one of the most effective green strategies for business. The PowerNet IP Reader from ISONAS uses PoE (Power over Ethernet) to power the reader and the associated door hardware. This provides the lowest possible energy cost for powering an Access Control system.
Eco-friendly materials are used in the manufacturing of ISONAS Reader-Controllers. ISONAS is certified with RoHS, a standard banning the general use of six hazardous substances including lead and mercury. ISONAS has also taken the strategy of using green materials in its packaging and shipping of its products.
The smallest manufacturing carbon footprint of any Access Control system is made possible by the panel-free nature of the PowerNet series. Combined with a single Cat 5 cable for installation versus the multitude of copper wiring required by alternative Access Control systems, the ISONAS PowerNet is the cleanest, most sustainable Access Control system in the world.
Low impact manufacturing means that ISONAS creates inventory based on consumer demand. With the ability to access and analyze real-time demand signals, ISONAS is one of a growing number of companies moving from push to pull manufacturing. By nature, this not only eliminates excess inventory, thereby reducing waste, but it also decreases carbon emissions as it relates to the creation of products and materials.
No Paper Waste is the ISONAS philosophy. As an IP product manufacturer in the electronic age of technology, marketing materials as well as technical manuals are created electronically and posted on our website available to everyone in PDF form. By making technical manuals, marketing materials and catalogs easily accessible on our web site, ISONAS does not waste paper on needlessly printing excessive paper-based documents.
Localized Manufacturing ISONAS is based in Boulder, Co, where its PowerNet Readers are manufactured for the North American market. Off-shoring models of the past are increasingly being replaced with more efficient “right-shoring” models, as the risks and costs associated with manufacturing at long distances from one’s customers continue to surface. Longer lead times, increased fuel costs, larger carbon footprints and excess inventory are causing companies to re-examine where and how much they outsource. With the ability to analyze the various factors driving costs and environmental impacts, companies can create balanced plans that are both cost-effective and environmentally friendly. ISONAS is committed to manufacturing as close to its end user base as possible.

About ISONAS Security Systems, Inc. Since 1999, ISONAS Security Systems has provided advanced, Internet Protocol (IP) Access Control solutions for customers who require the superior, real-time access control enabled by a true network appliance. ISONAS is the first and leading developer of IP-at-the-door reader-controllers. Driven by its Windows-based Crystal Matrix Software™, ISONAS products are easily integrated with other network based systems, providing the most advanced physical access security for buildings and workplaces worldwide, across a wide range of industrial applications.


Thanks for visiting Kondor Security and remember, if you can't find it at first glance, you're more than welcome to contact us.