Showing posts with label Proximity. Show all posts
Showing posts with label Proximity. Show all posts

4.01.2014

April Promotion:




            SPRING SAVINGS ALERT! 

Get Free Shipping* on all Isonas Card Reader Orders from Kondor Security, Now Through April 30th!



The industry's first panel-free IP reader controller to deliver true Power Over Ethernet, Isonas PowerNet Readers provides the freedom to secure an unlimited number of doors without the hassle of have to wire panels or hubs.


ISONAS RC-03-PRX Ethernet Enabled Reader-Controller.  Proximity (125 kHz) Reader Controller Configurations for Interior & Exterior Access Points and it supports both ISONAS & HID Proximity Credentials.

ISONAS RC-03-MCT Ethernet Enabled Reader-Controller.  Proximity (13.56 MHz & 125 kHz) Reader-Controller Configurations for Interior & Exterior Access Points.  The RC-03-MCT supports Mifare, Desfire,iClass, PIV Smart Cards and ISONAS & HID Proximity Credentials. 

Both versions available in Keypad and Non-Keypad formats. 

Be sure to check out the Kondor Security Web Store for all of your Isonas needs. 

*Please use the code “ISONAS READER” and click the Redeem Coupon button.  The offer enables free shipping on Isonas products that include at least 1 Reader/Controller.  Please note:  The offer does not include shipping when other items from separate manufacturers are included on the order. If you run into problems redeeming coupon online please contact Customer Service at 888-409-9245.
 
http://kondorsecurity.com/store/access_control.html



6.22.2010

Looking for Vulnerabilities in All the Right Places? Experts Think you Might be Missing a Few...

Source -- DarkReading
By Keith Ferrell, Contributing Writer
DarkReading
 
The biggest vulnerabilities in the enterprise might be items we see every day -- and just don't think about.

Experts say that vulnerability assessments often overlook the everyday dangers: Network-attached devices that aren't computers. Paper documents. Passwords posted in plain view. Portable storage devices.

Most of these are technologies that would never be taken into account by a traditional vulnerability scan. Yet they could lead to data leaks just as surely as a keylogger or a data-stealing Trojan, experts say.

"Peripheral devices on the network may have capabilities the business doesn't know of," says Kevin Brown, delivery manager for custom testing at security assessment firm ICSA. "And those capabilities can create security vulnerabilities."

Printers, fax machines, and multifunction devices with persistent storage could all serve as entry points for a sophisticated hacker, Brown observes. And the presence of internal storage might not be clear at first glance, nor does it necessarily show up on traditional security audits.

"An automated vulnerability scan may not reveal which printers and other hard copy devices have hard drives," Brown observes. "As a result, the business isn't aware that digital copies of sensitive information may remain in the printer."

A thorough vulnerability assessment should include examining all hard copy devices for internal storage capability -- this could require contacting the manufacturer or even opening the machine, Brown says.

Enterprises also should take steps to ensure that digital files are wiped from these devices as soon as the hard copy is produced or the fax transmitted. This could mean purchasing and installing additional software from the manufacturer.

Other network-attached devices could also be vulnerable, Brown observes. "Any device connected to the network needs to have its security validated," he says.

He offers security cameras as an example. "For cost-saving and other reasons, companies have shifted security cameras from dedicated coaxial cable connections to TCP/IP connections, which run the risk of being vulnerable to cross-site scripting attacks and remote control takeover."

Even backup power devices might be at risk, Brown warns. "UPS devices connected to the network could enable an attacker to take control," he says.

Brown offers three bits of advice for all network-attached devices. "The biggest risk is leaving the default password in place," he says. No matter the device and its purpose, he advises, users should change its password before connecting it to the network.

"Second," Brown continues, "review all of the features that the device offers. Web printing capability may not be useful as a business function at your company, but it could be very useful to an attacker."

Finally, he points out that maintaining security readiness on peripheral devices is an ongoing process.

"Incorporate all devices into your patch cycle," he says. "We're all familiar with Microsoft and Cisco patches -- but when was the last time you upgraded the firmware on your printer? Seek out patch information on every device connected to your network, and incorporate them into your patching cycle."

Many of these office devices produce a lot of paper -- paper which, as security consultant Steve Stasiukonis of Secure Network Technologies points out, can be a vulnerability itself.

"Take a look at your copier station," Stasiukonis says, noting that many companies overlook sensitive material that might be found in unsecured places. Recycling bins or preshredder collection stations holding unshredded materials can be rich sites for information-miners, he notes.

Documents that aren't shredded could be the cause of a data breach, as a recent New Jersey incident revealed when papers containing Social Security numbers and other personal information were found in a public dumpster.

"And don't forget the amount of paper and other sensitive information on employees' desks," Stasiukonis advises.

A workplace walk-through -- even in a "clean desk" environment -- can often reveal security badges and swipe-cards laying in plain sight, ripe for the taking, Stasiukonis explains. In his physical penetration tests, Stasiukonis frequently also finds passwords and log-ins on sticky notes and keyrings hanging from thumbtacks in cubicles.

Even if you don't see anything at first glance, Stasiukonis suggests, look a little closer. "Have your employees turn over their keyboards for inspection," he suggests, noting that many users stick their passwords there for easy recall.

Stasiukonis also recommends checking devices, such as copiers, for default service tech passwords, which might remain in place even if the business has changed its own access and log-in codes.

"Check to be sure that security cameras haven't been repositioned," he adds. "Scan for infrared devices. Examine the security not only of IT administration notebooks, but also physical plant management and control notebooks. Beyond that, an examination of the contents of employees' desks can reveal treasure chests of vulnerabilities.

"But," he cautions, "before going into employees' desks, you should review your plans with your human resources department." Whatever your company's legal rights, many employees resent having their desks checked, so be sure to educate them before conducting a search, he explains.

Another vulnerability vector -- and in many ways the most common one -- is human nature.

Security professional Scott Wright's Honey Stick Project put human nature to the test by leaving specially prepared USB drives in plain sight. When one of the drives was inserted in a business device, the information was logged, revealing what the user had done.

Such behavior is typical, according to Wright. As he notes on his Streetwise Security Zone site: "Out of 54 devices dropped with specially configured -- but safe -- files on them, the Honey Stick Project has detected that at least 35 of these devices have had files opened."

Vulnerability-scanning tools are a good place to start, but they can't see the whole enterprise, the experts warn. To find all of your vulnerabilities, you'll need to look at the things your users see every day -- in a new way.

4.05.2010

Introducing Plexidor Electronic Access Control for your Dog!

Access Control is evolving all the time.  Situations in which access control can evolve to are limited only by one's imagination. That said, did you know that there’s access control option for your pets?

Yes, gone are the days where one worries about the unwanted entry of stray dogs, neighborhood cats, racoons, or any such pesky varmint.  Pet owners can find relief knowing that RFID tags are available for pet collars giving access to enter or exit the house when the pet door is equipped with electronic access control.  You are able to control which pet(s) can go outside and which cannot.

Love your pet? Can you hold it for 9 hours? The next time you have to “go” in the middle of the night, think about your pet – and the Plexidor® Performance Pet Doors. Sure, pets are different from people. People have flush toilets, pets don’t. Pets just have to wait until morning.

But if you forget, or make your pet wait too long, you know what comes next: Yup, the clean-up.

So, for the last 22 years, Plexidor® has been crusading for pets’ rights to come and go as they please. It’s actually a 2-in-1 crusade because pet owners have rights too…such as the right NOT to be a 24-hour-a-day doorman, the right NOT to live with spotted carpeting, and the right NOT to have to refinish scratched doors, to name just a few.

Because of this crusade Plexidor® has been designing and manufacturing the Performance Pet Door line. The Plexidors® come in sizes ranging from cat to great dane. They work in any kind of door or wall. All Plexidors® have heavy durable aluminum frames that can be secured and locked. White and bronze frames are baked on for strength and durability. And the door panels are made of insulated high impact acrylic to help keep your home warm in the winter and cool in the summer.

Call us or visit our website and join the crusade. Order a Plexidor® pet door today. You and your pet will be happier.

  • High impact acrylic panels, also used in small aircraft windshields.
  • These colors do not run. Plexidor® pet doors are not painted, they use a baked on finish.
  • Dogs chew through plastic and bend thin aluminum frames. These are thick, heavy aluminum.
  • Magnets are not effective “keys” and are not used with Plexidor® pet doors.
  • The electronic door has 1000s of key codes.

Plexidor® Electronic Doors

Secure – Interior stainless steel locking bar, thousands of key codes. Opens only for your pets. Tough shatter resistant panel. Heavy, thick aluminum frames that won’t bend. Won’t interfere with home security system.

Energy Efficient – No gaps for air filtration, saves you money.

Pet/Child Safe – Panel won’t close when obstructed. Total control up and down. No pinched tails. No pinched fingers.

Dependable – Runs on household current. Collar key is waterproof and does not need batteries. Key fastens securely to collar and won’t fall off. Interior mounted motor won’t freeze up in cold.

Durable – Steel and hardened aluminum frame with thick acrylic closing panel. Wall units include aluminum tunnel pieces and stainless steel mounting hardware for years of service. No unsightly rust streaks on your home.

Easy to Use – One button programming to add or change collar codes quickly and simply. Collar key snaps on easily and stays on. Comes complete with pet door, exterior trim, stainless steel hardware, 2 collar keys, power supply and 15ft cord.


The key is a micro RFID chip weighing only 0.4 oz.

Plexidor® collar keys are:
  • Waterproof
  • Rugged
  • Battery free
  • Shock proof
  • Won’t fall off
  • Works with underground fencing
  • Have 1000s of key codes

How it works: Plexidor® Electronic “reads” the key code and opens only for your pet. Panel unlocks and slides up like a mini garage door. The main frame has a low profile of just 1 5/8” in thickness. Door plugs into household outlet or can be hardwired.

Order a Plexidor® today and say goodbye to…
  • Messy littler trays
  • Scratched doors
  • Wasted energy
  • Awkward, noisy, chewed flaps
  • Ruined carpets and drapes

Plexidor® Pet Doors Provide
  • Peace and quiet
  • Undisturbed sleep & TV
  • Freedom from worry about letting your pet out

Plexidors® are
  • A carpet saver
  • A money saver
  • An energy saver

2.11.2010

ISONAS' Crystal Matrix at a glance.

Easily Support Seasonal Schedules with ISONAS Access Control System
source: ISONAS

Are some of your clients affected by seasonal changes to their facility's schedules?

Seasonal variations are common for organizations such as:

  • Schools and Libraries
  • Park Districts
  • Amusement Parks
  • Sports Facilities
  • Churches
  • Recreation or Tourism Business

Many of these organizations will wnat to pre-plan and pre-program the upcoming schedules into their access control system, so that the schedule's transition times are seamless and worry-free. The Crystal Matrix application supports these types of requirements with the Permission Groups feature.

Crystal matrix Permission Groups for Schools

A high school might use the Permissions Group feature of Crystal matrix to schedule the full summer activity sessions before the end of the school year. Prepare the system for band camp, 2-a-days football practice, teacher development workshops, and adult education seminars. All pre-planed and pre-programmed before the school's staff begins its summer break. As the summer calendar progresses, the access control system automatically adjusts the system's business rules to allow the proper people into the school, at the proper times.


Understanding how to use Crystal Matrix Permissions

To effectively use the Crystal matrix Permission Groups feature, you shoul dhave a solid understanding of how Permissions are defined within the system. Below are links to short training videos that explain the process of setting up Permissions within the ISONAS system.


The Clash of the Titans; Physical Security and IT Security

IT departments are no strangers to turf wars, but is the one shaping up between those overseeing computer networks and those in charge of physical security about to get really ugly?

Unlike past tussles between say, voice and data communications teams, the contest between IT security and those involved in everything from fire alarms to video surveillance to door-lock access controls tends to involve people who might never have had any reason to cross each other's paths.

Converging physical and logical security: A good idea or not?

"It typically takes a C-level executive to force these organizations to work together," says Tom Flynn, director of marketing in North America for smart-card maker Gemalto. "The fact is there are different entities in a corporation for physical and logical security… We see turf wars happening."

Merging physical and logical security is seen by advocates as a cost-saving step and a natural evolution for facilities maintenance and guard operations, where door-access equipment and video cameras are increasingly IP-enabled, and a smart card-based badge could be used by employees to access both buildings and computers. But resistance to convergence runs deep among traditional physical security managers, who are wary of IT departments taking control. And even IT security experts voice concerns that it's risky, with some strongly opposed to the idea of physical security operations, such as video surveillance streams, riding on the same IP corporate network as the rest of the business.

"Physical security has been about closed systems, but with the move to IP-based systems and connecting campuses there's the need to have the IT and security department involved," says Steve Russo, director of security and privacy technology at IBM's global technology services group. He says there can be advantages in integrating physical security with logical and transactional systems to give management a better picture of what's occurring, especially in retailing. And although network capacity is a concern, it's possible to share an IP network for logical and physical security, he suggests.

"Is there a risk associated with combining it? Absolutely," Russo acknowledges. But he adds: "The logical-security people are looking at threats to the environment. And where we see the interesting spark is that they can take information about physical events and turn it into operational use."

But there's often a cultural rift existing between the physical security department for facilities management, with their isolated closed networks, and the IT department with its systems administrators and security specialists trying to keep scores of Internet-accessing computers and applications running safely.

"With IP-based access control, the 'turf wars' tend to be marginalized once the IT folks realize that a system like ISONAS' PowerNet reader is actually a network appliance," says Steve Rice, Vice President of Sales and Marketing for Colorado based ISONAS Security Systems. "It demands little in the way of network capacity, resources to install and can be supported like any other IP device. The benefits of integrated video, access control and/or other building control systems include a combination of additional detailed information available from a set of closely integrated functionalities (ex. have a picture of personnel involved in an entry event plus network confirmation of the credential information timed exactly to the video feed) as well as the simplicity of dividing what functionality to integrate on a customer by customer basis. This is due to the relative ease of integration with a true network software-based system. So the physical security requirements are met with a minimum of IT resource."

These differences in viewpoint are often heard in the physical-logical security convergence debates. But one of the most ardent advocates for convergence might be Ray O'Hara, executive vice president of international operations, consulting and investigations at Andrews International, which is in the traditional physical security business of "guns, gates and guards," as he puts it.

"The traditional security person and the cyber-security side are both hands-on and doing things for the betterment of the organization," says O'Hara, who recently became president of the board of directors of ASIS International, an organization for security professionals.

But today the physical-security technologies are evolving to the point where "the traditional people need help from the IT people," O'Hara says. There is often discord and mistrust between the physical and logical security divisions. But that needs to be overcome by possibly combining reporting structures so they can more easily collaborate or by setting up a "risk council" to have regular discussions with business managers, he suggests.

IBM's Russo says protocol issues point to the need for standardized compression techniques and transport in physical-security equipment, as well as standard XML-based definitions so that important meta-data can be shared. "Physical security is transitional right now," Russo says, pointing to both the Physical Security Interoperability Alliance and OASIS as organizations trying to further interoperability standards that would add convergence and make it worthwhile.

But to date, Flynn says he is only aware of a handful of large enterprises in the oil-and-gas industry, such as Chevron and Exxon, and pharmaceutical giants such as Pfizer, that have adopted converged smart cards for physical and logical security.

1.18.2010

Financial Security Solutions with Simons-Voss

Whether it is the system, an organization, or people, your world revolves around integrity and verified trust.
It used to be that a brass key was a powerful symbol of trust and protection, bu tin today's world most brass keys are easily duplicated and the locks that depend on them are easily fooled or bypassed. On top of that, managing these keys is expesnsive and the functionality of the keys is very low. Depending on mechanical keys to protect your responsibilities in today's world is like telling your customers that their mattress is a good place to keep their money.

Fortunately SimonsVoss has locks that are as sophisticated as today's financial instruments.
With a wide range of products for various applications you never need to modify the door or frame and yet you end up with a sophisticated electronic lock that can control access by time and day while tracking all usage. Even better, the credentials use an encrypted challenge-response wireless signal that cannot be duplicated or successfully recorded and replayed.

Important Concerns
  • High cost of frequent re-keying.
  • Keys are easily copied or duplicated.
  • No record of which key was used or when it was used.
  • No control of when keys may be used.
  • Aesthetics are important to provide a warm inviting atmosphere to customers
  • Leased facilities, temporary needs for security.
  • ATM kiosks and small remote offices.
SimonsVoss Benefits
  • Re-keying accomplished with the click of a mouse.
  • Transponders are very hard to duplicate and very secure.
  • SimonsVoss loicks provide an audit trail so you can see who used the lock and when that access was granted.
  • All SimonsVoss locks and credentials can be limited to specific times and/or days at your discretion.
  • SimonsVoss locks look like standard locks. No need to advertise your security precautions with big, ugly industrial-looking locks.
  • Remove the mechanical lock, apply the SimonsVoss solution. When the need is over replace the mechanical lock and use the SimonsVoss lock for the next need.
  • Standalone or networked, the SimonsVoss wireless solutions makes it easy to implement solutions for these applications.

The best news of all is that these locks can be deployed one at a time as standalone solutions or combined under a centrally controlled network so you are not limited by applications that are too small or large to benefit from this solution.

Digital Mortise Cylinder

  • The Digital Mortise Cylinder puts electronic access control into the mortise cylinder. Now you can remove the mechanical mortise cylinder and replace it with a digital cylinder.







Digital RIM Cylinder Exit Bar Outside Trim

  • The Digital RIM Cylinder puts electronic access control into the RIM cylinder. Now you can apply a digital lock cylinder in many applications where a RIM cylinder is required.






Digital Mortise Cylinder Aluminum Frame Door Lock

  • This gives you control over who has access, when they have access, and can track that use for later reference. You can even remove access for a user without their credential being present.






Smart Relay Mag Locks/Cabinets

  • Barriers, gates, rolling gates, automatic systems, revolving doors, elevators and alarm systems don't need to exist as separate entities.









SV1C Cylindrical Lock Office Doors
 
  • The SimonsVoss SV1C Digital Cylindrical Lock can be applied anywhere a standard commercial cylindrical lock is used without additional holes or wires. 



 

1.07.2010

Scripting and the ISONAS System.

source: ISONAS

Script Programming supports Customized Actions
  • Is there a need to have your ISONAS system initiate multiple advanced actions under certain conditions?
  • Do you or your customers wish to receive email notifications when doors are left ajar or when ex-employees are attempting to re-enter the facilities?

These types of project requirements can easily be met through the Script Programming features application suite. Select the events you wish the system to monitor, and then specify what additional actions you would like the system to take when these events occur.



Schools Locking down their Facilities
 
A common use of Scripting is to configure the ISONAS system to place the exterior doors of a school into lock-down mode, when the administrators of the school require it. Scripts can be initiated in many ways, including by the use of specified credentials, or through the activiation of emergency mushroom buttons.

Additional common usages of scripting include the activation of the building's alarm system, or unlocking all entrances to a facility when a special event is beginning.



Email Notifications

Emails can be generated by the Crystal Matrix system, throught he Scripting feature. Example uses of the email notifications would include being notified of a networking failure, or being notified of an after-hours attempt to enter the facility.

Click here for more details on this solution.

Click here to visit the Kondor Security ISONAS page.

Click here to visit ISONAS.







11.13.2009

What Is Lock Bumping & Should I Care?

Bumping, also referred to as "rapping" is not new. In fact, it's been around for at least half a century! When this method is used correctly it is extremely effective in over 90% cylinder type locks. As with any other lock picking technique it requires some time and patience to master. A bump key is a key in which all the cuts are at the maximum depth. Bump keys can be cut for standard pin tumbler type locks as well as "dimple" locks.

In the 1970s, locksmiths in Denmark shared a technique for knocking on a lock cylinder while applying slight pressure to the back of the lock plug. When the pins would jump inside of the cylinder, the plug would be able to slide out freely, thus enabling the locksmith to disassemble the lock quickly. The use of a bump key was not introduced until some time later and was first recognized as a potential security problem around 2002–2003 by Klaus Noch who brought it to the attention of the German media. After further examination of the procedure, a white paper was drafted in 2005 by Barry Wels & Rop Gonggrijp of The Open Organization of Lockpickers (TOOOL) detailing the method and its applicability.


A patent exists for a lock device following the same principle as the bump key from 1926–1928. The technique then attracted more popular attention in 2005 when a Dutch television show, Nova, broadcast a story about the method. After the method received further publicity from TOOOL presentations at security conference talks, members of TOOOL and a Dutch consumer group, Dutch Consumentenbond, analyzed the capability of the method on 70 different lock models and with trained and untrained users in a 2006 study.

At the same time, Marc Tobias, an American security expert, began to talk publicly in the United States about the technique and its potential security threats. In 2006, he released two further white papers regarding the technique and its potential legal ramifications.


High-quality locks may be more vulnerable to bumping unless they employ specific countermeasures. More precise manufacturing tolerances within the cylinder make bumping easier because the mechanical tolerances of the lock are smaller, which means there is less loss of force in other directions and pins move more freely and smoothly. Locks made of hardened steel are more vulnerable because they are less prone to damage during the bumping process that might cause a cheaper lock to jam.


Locks having security pins (spool or mushroom pins, etc.)—even when combined with a regular tumbler mechanism—generally make bumping somewhat more difficult but not impossible. Electronic locks, magnetic locks, and locks using rotating disks are not vulnerable to this attack.


Because a bump key must have the same blank profile as the lock it is made to open, restricted or registered key profiles are not any safer from bumping. While the correct key blanks cannot be obtained legally without permission or registration with relevant locksmith associations, regular keys can be filed down to act as bump keys.


Locks that have trap pins that engage when a pin does not support them will jam a lock's cylinder. Another countermeasure is shallow drilling, in which one or more of the pin stacks is drilled slightly shallower than the others. If an attempt were made on a lock that has shallow drilled pin stacks, the bump key will be unable to bump the shallow drilled pins because they are too high for the bump key to engage. Many bump-resistant locks are available which can not be easily opened through the lock bumping method.

Of course you can also prevent such worries with an access solution such ISONAS' PoE PowerNet IP or SimonsVoss' Digital Locking & Access Control System.



If you have any questions, please do not hesitate to contact us here.


Creating a Keyless World with Simons-Voss

SimonsVoss has taken it upon themselves to make living and working with their system more secure, easier, more convenient and more efficient. In doing so, they've revolutionized classical mechanical locking media by applying digital technology and access control features. Their idea of a digital transponder instead of keys has been globally accepted. They've successfully and consistently turned their vision into reality with a radio-controlled, wireless locking and access control system.


SimonsVoss is the undisputed technology leader in the rapidly growing marked for digital, battery-operated locking and access control systems. More than 56,000 systems have been installed all overt the world proving that their vision has already become a reality. Below, you'll find a list of some of the most frequently asked questions about their innovative access control system.

Do I need both an RF lock and a SmartRelay for a Door?
No, the two components work independently of one another and have different tasks in the system. The RF Lock operates a mechanical latch. The SmartRelay operates a solid-state relay. As a result, you need only one of these components at a time.

Can the transmission of data over the radio link be tapped and reproduced?
The radio transmission is based on a method tested by the military. It is a constantly changing code sequence (crypto codes), which is not reproducible. Even renowned test institutes such as VdS and BSI, for example, couldn’t crack the code.

How is the system protected from attack?
The components are designed to resist mechanical, electrical and magnetic attacks.

Can I add a wireless network at a later date?
Yes, the system is designed to add a wired, wireless or virtual network at any time.

Can the lock system be expanded at a later date?
Yes the modular hardware components and the flexible lock plan software allow a modification or expansion of existing systems at a time.

Which components must be programmed?
All components, transponders and locks, must be programmed.

How can the digital locking cylinder’s battery be checked?
The status  of the battery can be displayed form the host computer through the SmartCD or wireless network.

Can the lock read HID cards?
Not yet. That technology is passive and does not transmit well through metal. However, a reader interface is being developed and other technology breakthroughs are being considered.

What happens when the battery dies?
There is a three-stage process of battery management that ensures authorized access. In all the years of operation access has never been denied due to battery failure.

Is there a mechanical override?
The deadbolt on the mortise lock can function as a mechanical override for mortise locks. The SV1C cylindrical lock does not have a mechanical override.

What certifications does the lock have?
These products are certified by the FCC not to interfere with other RF-based products. The US RF Locks have all been tested to ANSI Grade 1 standards. The locks are also approved by UL to meet the 10-C standard for fire doors under positive pressure.


Do you have a lock for a glass storefront door?
Yes. The Digital Mortise Cylinder (DMC4) can be used with the most popular aluminum storefront door locks.

How many transponders are supported by each RF lock?
Each RF Lock can support up to 8.000 transponders currently and will be upgradeable to 64,000 sometime in 2010.

What is the anticipated life of the batteries?
The batteries in the locks are certified for 150,000 cycles. The batteries in the standard transponders are certified for 1,000,000 clicks.

When using the wireless network, what is the range between the Central Node (computer) and the door?
The distance between each radio span (Central Node to Router or Lock Node or between routers) is a maximum of 150 feet. The distance is based on the RF environment and can be reduced by the surrounding materials.

What is the radio range for the signal between the Lock Node and the RF Lock?
The Lock Node must be located with 12” of the RF Lock. There is an optional external antenna for the Lock Node to extend this range up to 16 feet.

What are the environmental ratings of your locks?
The operating temperature of the SimonsVoss RF Lock is rated for -4 - +140 degrees Fahrenheit at non-condensing humidity of less than 90%.

Can the lock detect the position of the door?
SimonsVoss Technologies RF locks do not include a traditional door status switch. This capability is not significant to a standalone door with no real-time communications. When the 915 MHz wireless network is used, the Lock Node can monitor up to three input points.

What is the range between the SimonsVoss Technologies transponders and locks?
The maximum measured range is 20”. This distance is based on environmental elements such as the material of the door, the walls, and other radio products in the area.

Is it possible to use the SimonsVoss Technologies locks with an existing third-party access control system?
Yes, you can do this by using a Switching Transponder (TRA.SCHALT) which has wires that are connected in parallel to the button of the transponder. These wires are then connected to the relay terminals of the third-party access control panel. When the relay closed it activated the transponder just as if the button was pushed, opening the SimonsVoss Technologies RF lock.

Can I use third-party access control cards with SimonsVoss Technologies locks?
SimonsVoss has a reader that can read Mifare cards and use that information to send the proper user ID to the lock for the access decision. Extending this reader to other card technologies is currently in development.