1.19.2010

Tough Snail Shell Could Inspire Better Body Armor

source. LiveScience

By Rachael Rettner, LiveScience Staff Writer

A snail's shell that protects it from attacks underwater could provide clues for designing improved body armor to guard human soldiers, a new study suggests.

The research involved an unusual sea snail, the so-called "scaly-foot" snail which was first reported in 2003 and makes its home in the harsh environment of a deep-sea hydrothermal vent in the Indian Ocean. Past studies of the  snail, a type of sea mollusk, revealed its foot was covered in plates of iron-sulfide minerals, and it is now the only known animal today to employ iron sulfides as a structural material.
  
Like other snails, this one also sports a shell covering its body. Although hard, a typical snail's shell will fracture if persistently squeezed by a predatory crab. Hoping to learn exactly how the scaly-foot snail's shell is designed to resist such crushing, the authors took a close look at the shell's structure, examining it on the nanoscale.
 
They saw that shell is composed of three layers: a hard outer layer that contains iron sulfides, similar to the ones identified in its foot scales; a more supple middle layer made of organic material; and a stiff inner layer with a large amount of calcium minerals. This arrangement of "rigid-compliant-rigid" layers creates a trilayer, sandwich structure unique to this snail, the researchers say.


Snail protection
After figuring out the shell's structure, the team used a computer model to simulate how the shell faired when subjected to a penetrating force, similar in strength to the pinching of a crab's claws.

"Each layer does something differently," said lead researcher Christine Ortiz, a materials science and engineering professor at the MIT.

The hard outer layer contains small, grain-like particles. When under attack, these granules help to dispel the energy of the blow, spreading it out across the outer region. Any fractures that occur will disperse along jagged lines guided by the granules, forming fissures in the top layer.

"Cracks that form travel extensively throughout the outer layers, thereby protecting the inner layers and mitigating catastrophic fracture," Ortiz said.

The softer middle layer helps protect the brittle inner layer from cracking, Ortiz explained. And the inner layer itself protects the snail's body from injury. Since this inner layer is rigid, it doesn't displace into the animal's body during an assault, which could cause blunt trauma, Ortiz said.

Put together, the three layers work to help prevent penetration of the shell and also withstand bending.

The outer and middle layers also help the snail to survive in the extreme environment characteristic of hydrothermal vents, since these layers are resistant to dissolving in the highly acidic waters.  And the middle layer protects the snail from temperature changes at the vents.

Snail-like armor and sporting gear
The shell's structure may one day inspire new and better designs for human protective equipment, from body armor to sporting gear. The three-layer arrangement and curved surface give the shell stability and penetration resistance, highly valued characteristics of materials used for armor, Ortiz said.

Automobiles painted with an iron-based, granular coating similar to the one found in the shell's outer layer could dissipate energy in the same way the shell does when undergoing a predator attack.

However, any bio-inspired design would likely not use the exact same materials found in the snail's shell, which has flaws of its own. Scientists would simply use it as a guide, and improve upon the shells shortcomings.

"Nature only uses what's available to it," said Ortiz. Engineers might use a similar design, but replace some of the components with high performance structural, or ballistic materials, she said.

The results were published online Jan. 18 in the journal Proceedings of the National Academy of Sciences.

1.18.2010

Financial Security Solutions with Simons-Voss

Whether it is the system, an organization, or people, your world revolves around integrity and verified trust.
It used to be that a brass key was a powerful symbol of trust and protection, bu tin today's world most brass keys are easily duplicated and the locks that depend on them are easily fooled or bypassed. On top of that, managing these keys is expesnsive and the functionality of the keys is very low. Depending on mechanical keys to protect your responsibilities in today's world is like telling your customers that their mattress is a good place to keep their money.

Fortunately SimonsVoss has locks that are as sophisticated as today's financial instruments.
With a wide range of products for various applications you never need to modify the door or frame and yet you end up with a sophisticated electronic lock that can control access by time and day while tracking all usage. Even better, the credentials use an encrypted challenge-response wireless signal that cannot be duplicated or successfully recorded and replayed.

Important Concerns
  • High cost of frequent re-keying.
  • Keys are easily copied or duplicated.
  • No record of which key was used or when it was used.
  • No control of when keys may be used.
  • Aesthetics are important to provide a warm inviting atmosphere to customers
  • Leased facilities, temporary needs for security.
  • ATM kiosks and small remote offices.
SimonsVoss Benefits
  • Re-keying accomplished with the click of a mouse.
  • Transponders are very hard to duplicate and very secure.
  • SimonsVoss loicks provide an audit trail so you can see who used the lock and when that access was granted.
  • All SimonsVoss locks and credentials can be limited to specific times and/or days at your discretion.
  • SimonsVoss locks look like standard locks. No need to advertise your security precautions with big, ugly industrial-looking locks.
  • Remove the mechanical lock, apply the SimonsVoss solution. When the need is over replace the mechanical lock and use the SimonsVoss lock for the next need.
  • Standalone or networked, the SimonsVoss wireless solutions makes it easy to implement solutions for these applications.

The best news of all is that these locks can be deployed one at a time as standalone solutions or combined under a centrally controlled network so you are not limited by applications that are too small or large to benefit from this solution.

Digital Mortise Cylinder

  • The Digital Mortise Cylinder puts electronic access control into the mortise cylinder. Now you can remove the mechanical mortise cylinder and replace it with a digital cylinder.







Digital RIM Cylinder Exit Bar Outside Trim

  • The Digital RIM Cylinder puts electronic access control into the RIM cylinder. Now you can apply a digital lock cylinder in many applications where a RIM cylinder is required.






Digital Mortise Cylinder Aluminum Frame Door Lock

  • This gives you control over who has access, when they have access, and can track that use for later reference. You can even remove access for a user without their credential being present.






Smart Relay Mag Locks/Cabinets

  • Barriers, gates, rolling gates, automatic systems, revolving doors, elevators and alarm systems don't need to exist as separate entities.









SV1C Cylindrical Lock Office Doors
 
  • The SimonsVoss SV1C Digital Cylindrical Lock can be applied anywhere a standard commercial cylindrical lock is used without additional holes or wires. 



 

7 Famous Security Breaches

source: NJ.com


When Rutgers doctoral student Haisong Jiang slipped under a security rope to give his girlfriend a kiss before she left on a flight out of Newark Liberty airport Jan. 3, the resulting security breach threw the airport into a lockdown, and inspired everyone from politicians to ordinary business travelers to talk about airport security. While this incident grabbed headlines worldwide, it's only the latest in a long line of high-profile breaches to hit airports, computer networks and even the White House. Take a look at our list of seven famous breaches.


7. Presidential Dinner Crashers: Washington D.C., November 24, 2009
Tareq and Michaela Salahi, a Virginia couple, slipped past security and were uninvited guests at a White House state dinner. The event was to honor Indian Prime Minister Manmohan Singh, but the well-dressed Salahis got all the headlines, mingling with guests and even getting a photograph with President Barack Obama.


Result: White House security systems are under review, two wannabes got 15 minutes of fame and may face criminal charges.


6. Man of Many Talents: Worldwide, Arrested, 1969
New York native Frank Abagnale was at different times an airline pilot, an attorney, a doctor. Actually, he was fooling security officials at airports, hospitals and other institutions. Abagnale was also famous for forging millions of dollars in checks and playing havoc with security systems long before computers.

Result:
Abagnale was arrested in 1969 in France, served jailtime and later became a security expert. His life story became the inspiration for "Catch Me if You Can," a movie starring Leonardo DiCaprio and Tom Hanks.



5. Grammy Gatecrasher: New York, Feb. 25, 1998
Picture it: Rock and roll legend Bob Dylan is jamming on stage during the Grammy Awards. Suddenly, a pasty man with no shirt is on stage next to Dylan. How did this guy get past show security? How come he's got SOY BOMB written on his chest? The man gyrates for about a minute on TV before being escorted off by security. The best part? Dylan never missed a beat.

Result:
Artist Michael "Soy Bomb" Portnoy  had been hired as one of dozens of show extras to dance in the background as Dylan performed, but he clearly went over the line. He never faced charges, but never got paid for his appearance.





4. This is Only a Drill: Slovakia, Jan. 2, 2010
Airport security workers in Bratislava, Slovakia put a bomb in an unsuspecting passenger's luggage as part of a drill. Problem was, none of the airport staff being drilled removed the explosive and it was loaded onto a plane bound for Dublin. Fortunately, the bomb didn't explode, no one was hurt and the plane landed without incident. The bomb was recovered after the plane landed, when the passenger was arrested for carrying a bomb aboard a plane.


Result: The passenger was released, but European Union officials are demanding changes in Slovakia's airport security procedures.


3. Security breach in the CIA:  Arlington, Va., arrests made Feb. 24, 1994
Some spies spill secrets for ideological reasons. Central Intelligence Agency USSR expert Aldrich Ames was in it for the money. Beginning in 1985, the FBI says Ames shuttled the Soviets classified documents and was paid nearly $2 million over several years. Because he was schooled by the CIA, Ames was able to cloak his misdeeds for years.


Result: Ames and his wife Rosario were arrested, plead guilty and sentenced to jail.


2. Retail Hacker: Miami, Arrested August 17, 2009
If you shopped at T.J. Maxx, ate at Dave & Buster's or bought books at Barnes & Noble, computer hacker Albert Gonzalez may have had access to your credit card number. The feds say Gonzalez led a group of hackers who breached computer security systems and stole 170 million payment card numbers from ordinary people just like you. Gonzalez may have been emboldened by his experiences as a one-time government informant.


Result: Gonzalez's sentencing has been delayed. He's lobbying for a lenient sentence because he has Asperger syndrome.


1. Deadly Painkillers: Chicago, 1982
A string of deaths in and around Chicago in 1982 were blamed on Extra-Strength Tylenol spiked with cyanide. At first it was feared the poison had been introduced during the production of the painkillers, but authorities later said the pills were most likely tainted after they were stocked on supermarket shelves.


Result: The incident led to changes in the way medications are packaged, but the killer or killers remain at large.


© 2010 NJ.com. All rights reserved.


1.12.2010

Mind-reading systems could change air security

source: msnbc



Technological developments can blur the line between security and civil liberties.

A would-be terrorist tries to board a plane, bent on mass murder. As he walks through a security checkpoint, fidgeting and glancing around, a network of high-tech machines analyzes his body  language and reads his mind.

Screeners pull him aside.

Tragedy is averted.

As far-fetched as that sounds, systems that aim to get inside an evildoer's head are among the proposals floated by security experts thinking beyound the X-ray machines and metal detectors used on millions of passengers and bags each year.

On Thursday, in the wake of the Christmas Day bombing attempt over Detroit, President Barack Obama called on Homeland Security and the Energy Department to develop better screening technology, warning: "In the never-ending race to protect our country, we have to stay one step ahead of a nimble adversary."

The ideas that have been offered by security experts for staying one step ahead include highly sophisticated sensors, more intensive interrogations of tevelers by screeners trained in human behavior, and a lifting of the U.S. prohibitions against profiling.

Some of the more unusual idea are already being tested. Some aren't being given any serious  consideration. Many raise troubling questions about civil liberties. All are costly.

"Regulators need to accept that the current approach is outdates," said Philip Baum, editor of the London-based magazine Aviation Security International. "It may have responded to the threats of the 1960s, but it doesn't respond to the threats of the 21st century."

Here's a look at some of the ideas that could shape the future of airline security:

Mind readers
The aim of one company that blends high technology and behavioral psychology is hinted at in its name WeCU - as in "We See you."

The system that Israeli-based WeCY Technologies has devised and it testing in Israel projects images onto airport screens, such as symbols associated with certain terrorist group of some other image only a would-be terrorist would recognize, said company CEO Ehud Givon.

The logic is that people can't help reacting, even if only subtly, to familiar images that suddenly appear in unfamiliar places. If you strolled through an airpost and saw a picture of your mother, Givon explained, you couldn't help but repsond.

The reaction could be a darting of the eyes, an increased heartbeat, a nervous twitch or faster breathing, he said.

The WeCU system would use humans to do some of the observing but would rely mostly on hidden cameras or sensors that can detect a slight rise in body temperature and heart rate. Far more sensitive devices under development that can take such measurements from a distance would be incorporated later.

If the sensors picked up a suspicious reactions, the traveler could be pulled out of line for further screening.

"One by one, you can screen out from the flow of people those with specific malicious intent," Givon said.

Some critics have expressed horror at the approach, calling it Orwellian and akin to "brain fingerprinting."

For civil libertarians, attempting to read a person's thoughts comes uncomfortably close the the future world depicted in the movie "Minority Report," where a policeman played by Tom Cruise targets people for "pre-crimes," or merely thinking about breaking the law.

Lie Detectors
One system being studied by Homeland Security is called the Future Attribute Screening Technology, or FAST, and works like a souped-up polygraph.

It would subject people pulled aside for additional screening to a battery of tests, including scans of facial movements and pupil dilation, for signs of deception. Small platforms similar to the balancing boards used [with] the Nintendo Wii would help detect fidgeting.

At a public demonstration of the system in Boston last year, project manager Robert Burns explained that people who harbor ill will display involuntary physiological reactions that others - such as those who are stressed out for ordinary reasons, such as being late for a plane - don't.

The system could be made to work passively, scanning people as they walk through a security line, according to Burns.

Field testing of the system, which will cost around $20 million to develop, could begin in 2011, The Boston Glove said in a story about the demonstration. Addressing one concern of civil libertarians, Burns said the technology would delete data after each screening.

The Israeli Model
Some say the U.S. should take a page from Israel's book on security.

At Israeli airports, widely considered the most secure in the world, travelers are subjected to probing personal questions as screeners look them straight in the eye for signs of deception. Searches are meticulous, with screeners often scrutinizing every item in a bag, unfolding socks, squeezing toothpaste and flipping through books.

"All must look to Israel and learn from them. This is not a post-911 thing for them. THey've been doing this since 1956," said Michael Goldberg, president of New York-based IDO Security Inc., which developed a device that can scan shoes while they are still on people's feet.

Israel also employs profiling: At Ben-Gurion Airport, Jewish Israelis typically pass through smoothly, while others may be taken aside for closer interrogation or even strip searches. Another digtinguishing feature of Israeli airports is that they rely on concentric security rings that start miles from terminal buildings.

Rafi Ron, the former security director at israel's famously tight Ben Gurion International Airport who now is a consultant for Boston's Logan International Airport, says U.S. airports also need to be careful not to overcommit to securing passenger entry points at airports forgetting about the rest of the field.

"Don't invest all your efforts on the front door and leave the back door open," said Ron.

While many experts agree the United Stated could adopt some Israeli methods, few believe the overall model would work here, in part because of the sheer number of U.S. airports - more than 400, versus half a dozen in Israel.

Also, the painstaking searches and interrogations would create delays that could bring U.S. air traffic to a standstill. And many Americans would find the often intrusive and intimidating Israeli approach repugnant.

Profiling
Some argue that policies against profiling undermine security.

Baum, who is also managing director of Green Light Limited, a London-based aviation security company, agrees profiling based on race and religion is counterproductive and should be avoided. But he argues that a reluctance to distinguish travelers on other grounds - such as their general appearance or their mannerisms - is not only foolhardy but dangerous.

"When you see a typical family - dressed like a family, acts like a family, interacts with each other like a family ... when their passport details match - then let's get them through," he said. "Stop wasting time that would be much better spent screening the people that we've got more concerns about."

U.S. authorities prohibit profiling of passengers based on ethnicity, religion or national origin. Current procedures call for travelers to be randomly pulled out of line for further screening.

Scrutinizing 80-year-old grandmothers or students because they might be carrying school scissors can defy common sense, Baum said.

"We need to use the human brain - which is the best technology of them all," he said.

But any move to relax prohibitions against profiling in the U.S. would surely trigger fierce resistance including legal challenges by privacy advocates.

Privatization
What if security were left to somebody other than the federal government?

Jim Harper, director of information policy studies at the Washington-based Cato Institute, a free-market-oriented think tank, says airlines should be allowed to take charge of security at airports.

Especially since 9/11, the trend has been toward standardizing security procedures to ensure all airports follow the best practices. But Harper argues that decentralizing the responsibility would result in a mix of approaches - thereby making it harder for terrorists to use a single template in planning attacks.

"Passengers, too, prefer a uniform experience," he said. "But that's not necessarily the best security. It's better if sometimes we take your laptop out, sometimes we'll pat you down. Those are things that will really drive a terrorist batty - as if they're not batty already."

Harper concedes that privatizing airport security is probably wishful thinking, and the idea has not gotten any traction. He acknowledges it would be difficult to allay fears of gaping security holes if it were left to each airline or airport owner to decide its own approach.

1.07.2010

Scripting and the ISONAS System.

source: ISONAS

Script Programming supports Customized Actions
  • Is there a need to have your ISONAS system initiate multiple advanced actions under certain conditions?
  • Do you or your customers wish to receive email notifications when doors are left ajar or when ex-employees are attempting to re-enter the facilities?

These types of project requirements can easily be met through the Script Programming features application suite. Select the events you wish the system to monitor, and then specify what additional actions you would like the system to take when these events occur.



Schools Locking down their Facilities
 
A common use of Scripting is to configure the ISONAS system to place the exterior doors of a school into lock-down mode, when the administrators of the school require it. Scripts can be initiated in many ways, including by the use of specified credentials, or through the activiation of emergency mushroom buttons.

Additional common usages of scripting include the activation of the building's alarm system, or unlocking all entrances to a facility when a special event is beginning.



Email Notifications

Emails can be generated by the Crystal Matrix system, throught he Scripting feature. Example uses of the email notifications would include being notified of a networking failure, or being notified of an after-hours attempt to enter the facility.

Click here for more details on this solution.

Click here to visit the Kondor Security ISONAS page.

Click here to visit ISONAS.







12.14.2009

Digital locking cylinder - Network Inside

We already have the unique WaveNet, which wirelessly networks the components in the Digital Locking and
Access Control System 3060. Until now, this process has required a separate wireless LockNode at each door in addition to the Digital Locking Cylinder 3061.


Now, with the help of miniaturisation, this LockNode has been so dramatically scaled down it can be integrated in the knob of the new “Digital Locking Cylinder 3061 - Network Inside”.


But not only that: At the same time additional functions have been implemented, so that the Network Inside cylinder can for example also be used as a “gateway” in the virtual network, transferring information
via the transponder. The transponder sends and receives information through the “gateway”; this information can for example be transmitted to other doors or made available to the system administrator. The following tasks should be particularly noted:
  • time correction in the system
  • tasks and access authorisations can be linked to dates and appointments
  • forwarding of a cylinder battery warning as part of system status monitoring
  • reading the access lists
In new buildings, the System 3060 can be networked wirelessly in a few minutes by installing a compact
special cylinder. In existing locking and access control systems from SimonsVoss, the wireless WaveNet network can be upgraded quickly and cost-effectively at any time by replacing the knob cap on the cylinder,
without having to change the door or door frame.
_

PRODUCT VERSIONS.
  • Version „network inside“ for direct wireless networking
  • With integrated Lock Node
  • Available with each profil and in all versions
  • G2 locking cylinder with advanced functionality refer to G2 locking systems
_
TECHNICAL DATA.
  • Available as cylinder with Euro-profile according to DIN 18252/EN 1303, with Scandinavian Oval, British Oval or Swiss Round profile
  • Battery lifespan: up to 150.000 lockings or up to five years stand by
  • 3,000 operations can be recorded
  • 5+1 time zone groups (G2: 100)
  • Up to 8,000 transponders can be managed per cylinder (G2: 64,000)
  • Up to 48,000 lockings can be managed per transponder (G2: 304,000)
  • Various duration / opening modi (office function)
  • Upgradeable firmware
  • Additional technical specifications refer to profil and versions of the suitable cylinder
_
Technical data of the network knob.
  • Network knob as retrofit knob for networking of a TN4 cylinder
  • Dimensions of the knob: length 26 mm, diameter 30 mm
  • Power supply: 3V DC battery in the TN4 cylinder
  • Power consumption with no data traffic: approx. 8µA
  • Battery life: up to 5 years on standby or up to 150,000 activations
  • Max. transmission power: approx 1 mW
  • Sensitivity: -95 dBm
  • Range from central / router node: up to 30 m, depending on building structure
  • Only suitable for indoor use (down to 0°C)

12.03.2009

Access Control - Then and Now


Access control systems have changed and grown exponentially since they were first introduced. In 2009, amazingly, the majority of access control systems on the market continue to utilize the same basic technologies that were introduced in the late ‘60s: a combination of simplistic card readers lacking electronic intelligence, linked by multiple wires to a centralized power supply and a central control panel. This setup makes the “allow entry” decisions for the card or other credential presented at the door. These systems are energy hogs, they’re difficult to install and –more simply put- they’re a relic of past technology.

Then – A look back in access control history

The original access control system was a simple lock and key. Still in use today, keyed locks are easy to install and affordable, yet easy to break into. The first generation of automated door access systems used what would today be referred to as primitive readers with no intelligence which passed credential information -from a magnetic or RFID-enabled card- to a central control panel, which made the “allow entry” decision. The next generation of readers made slight improvements so that the reader could be connected to the control panel with an RS-485 bus and had enough intelligence to open the lock. These second-generation “semi-intelligent” readers however still passed the credential codes to the control panel so there was no improvement in either installation cost or energy consumption cost.

Although the advent of “intelligent” readers improved memory to allow access decisions to be made at the reader, independent of the control panel, the panel was still necessary since updates to the system and event histories were uploaded to it. Though some current panels have added the ability to connect to a network, they still offer no new advances in installation time, costs or energy consumption.

As shown below, the installation of even the most modern panel-based system remains a labor and cost intensive exercise. The panel also has the disadvantage of limitations to the number of doors supported per panel – typically 4, 8 or 16 doors depending on the brand and model. This means that adding just one more door to a full panel system necessitates the addition of another panel, thus increasing the cost on both a total system and a per-door basis. The ongoing operational costs of any panel-based system are also higher than the state-of-the-art ISONAS alternative for two reasons;

Panel-based systems must be maintained by specially trained  personnel since they do not employ widely available computer standards of operations.

 They consume significantly more energy






Now – Intelligent IP reader-controllers

Alternatives exist today that take advantage of modern computing and networking technologies to provide a number of significant improvements over panel-based systems by improving the basic functionality of access control systems, improving the overall security parameters of these systems, lowering the cost of installation, lowering energy usage associated with the system’s operation and easy integration with other security and building management systems.

The ISONAS Powernet Access Control System utilizes a customer’s existing Ethernet-based Internet Protocol (IP) network to link intelligent reader-controllers via a CAT5 or CAT6 cable -the same cables that provide power to the ISONAS reader allow data communications to any inexpensive standard Windows computer running the system’s access control software – the ISONAS Crystal Matrix Software System.

“Allow entry” decisions are made at the door by the intelligent PowerNet IP reader-controller with historical event data passed, on a periodic basis, to the host software. The PowerNet reader contains a list of individuals that are allowed entry to the door (cabinet, gate, etc.) along with the times or shifts that they are allowed entry. Management of the system is easily accomplished via web-based pages from any computer with access to the internet. Individual reader-controllers can be set to stay open for specified periods or to remain locked until an authorized user’s credential is presented. Requirements such as anti-pass back, holidays and other special actions are easily accomplished through the Windows-based management software. Should the network go down, the PowerNet reader-controller continues to function in “standalone mode” and automatically updates the Crystal Matrix software when the network comes back online.

With Power over Ethernet (PoE) made possible by using the customer’s existing Ethernet network and industry standard CAT5 or CAT6 cabling, the additional power sources and wires needed for a standard panel-based system are simply unnecessary. The PowerNet reader-controller, the magnetic lock or strike and all the typical accessories, such as request to exit (REX) devices and door sensors, are powered by low voltage PoE through the PowerNet reader-controller. The on-going power usage of the system as a whole is therefore significantly more efficient than with any panel system, and installation is accomplished much faster -and is more cost effective- than is possible with a panel-based system.

The PowerNet is designed for both indoor and outdoor use and since it is not encumbered by a control panel, it can be installed in virtually any location with no limitation on the number of doors or access points. Adding new doors is as simple as adding a single CAT5 cable to the existing network facilities, attaching the PowerNet, the appropriate lock and accessories to the entry point and programming the reader-controller via the reader’s web-based pages from any computer with access to the internet.

Since the PowerNet system is managed by a software system (the ISONAS Crystal Matrix Access Control Software System) that runs on a standard Windows-based server, and is accessible through the normal IP network, integrating the PowerNet reader-controller with a web-based video system, building management system or other electronic security system is quite easily accomplished. The combination of access control and IP video into a single platform not only optimizes security and efficiency during operations but it also minimizes the costs of hardware, maintenance, and training of security personnel.

With this platform in place, it can easily be expanded to create a complete IP-based security and process monitoring system. Perimeter security devices, motion detectors, and/or additional cameras for monitoring key operations can be quickly added to the infrastructure. As illustrated below, the installation of a combination of IP-based access control and video surveillance is more efficient and cost effective than the installation of panel-based system.

Summary
Utilizing the capabilities of PoE allows access control devices to break free from the limitations of a control panel. Today one of the major advantages brought by PoE to the security marketplace is the freedom to install reader-controllers virtually anywhere. In a traditional panel-based system if the control panel fails the functionality of all the doors in the system is lost, severely impacting facility security. With an ISONAS system if the reader-controller fails it is isolated to one door.

The reason for the reduced installation costs of the ISONAS system is simple: Since the IT infrastructure already has PoE built in, no additional power infrastructure needs to be added to support the access control system. The number of wiring terminations required for an ISONAS system versus a panel based system is significantly reduced since an electrician installing a panel-based system terminates the wire at a junction box near the door and runs proprietary wiring back to the control panel where it has to be terminated again. With the CAT5 wire installation of the ISONAS system, “termination” is a single wire per reader-controller, pulled by less expensive installation personnel (no electrician required since CAT5 is low voltage) and uses the same simple plug familiar to anyone who has ever plugged a laptop into a network.

The installation labor of an ISONAS system is typically at least 30% less than a comparably sized panel-based system.

With a lower manufacturing carbon footprint and the lower voltage required from the PoE ISONAS devices, access control can now legitimately claim to have gone “green” since the power usage of an ISONAS system is significantly lower over its lifetime than with any panel system.

And since the actual hardware cost of a panel system with all its pieces and parts is more expensive than the simpler but more powerful ISONAS IP-at-the-door reader-controller, the whole system is more cost effective than any alternative available. Better security combined with more cost effectiveness – the difference between THEN and NOW.