5.31.2013

Introducing the ISONAS PowerNet IPBridge™

Introducing the ISONAS PowerNet IPBridge™

Introducing the ISONAS PowerNet IPBridge
PowerNet IPBridge
2-Door Model – PN: IPBridge-2
3-Door Model – PN: IPBridge-3

Avoid rip and replace. Easily and cost effectively expand legacy systems to seamlessly operate within an ISONAS Pure IP environment. The PowerNet IP Bridge connects the modern IP-network world and legacy Wiegand installations. Traditional and IP enabled panels can be replaced by simply unplugging existing panels and attaching Wiegand readers directly to the IP Bridge. Two and three door configurations allow you to match the exact number of doors you are taking over. The PowerNet IP Bridge connects legacy systems and new installs of PowerNet reader-controllers to operate as one system using a single credential.


Features of the IPBridge:
  • Direct IP-Network connectivity
  • Supports both Power Over Ethernet (PoE) and PoE-Plus
  • Open System -- Ethernet network appliance 
  • Supports standard door hardware, including Wiegand readers.
  • Dual port allows interconnection of multiple IP Bridges
Why use the IPBridge:
  • Eliminates the need to rip and replace existing hardware to upgrade system
  • Leverages existing IT network and legacy security infrastructure
  • Seamlessly allows migration to a Pure IP Access Control Solution
  • Creates a flexible solution to grow with future needs
  • Scale from 1 access point to 1,000s on a single server 

FORM FACTOR
ENVIRONMENTAL
Durable plastic enclosure, flame-retardant ABS, UV
stabilized
DIN rail mountable
6.28” X 3.55” X 2.26”
Ambient operating temperature -40 to 50 degrees Celsius (-40 to 120 degrees Fahrenheit) Operating humidity is 0 – 90% (non-
condensing)
POWER OPTIONS (field selectable)
STANDALONE CAPABILITY
Power Over Ethernet (PoE) (IEEE 802.3af, Class 0)
Power Over Ethernet Plus
(IEEE 802.3at, Class 0)
DC power:   <; 260mA @ 12 volts DC
< 180 mA @  24 volts DC
Each door is capable of storing 20,000 cardholders, 5000 access events and 32 time
zones which can be configured and accessed by an external host system
NETWORK COMMUNICATIONS
“Door” OUTPUTS (occurs 2 or 3 times)
·     Ethernet, TCP/IP,  standard RJ45, Interrupt driven.
·     Network-Server mode or Network-Client mode,
·     Field flashable microcode: On any IPBridge, anywhere on the network.
·    ASYNCH network communications - No network polling.
Powerful Local Mode feature set –Allows most installations to operate in Local Mode. Results in faster
and more consistent card-holder response times, less network traffic, tolerance of network latency, and reduced host system load.
·     Door Control relay (for electric lock, rated 2.0 A
@ 30 VDC, form C)
·     Powers Wiegand reader
·     Control for Wiegand reader’s two LEDs
·     Control for Wiegand reader’ buzzer
·     Two TTL outputs (configurable default state)
·     Auxiliary Power output - PoE-Plus supplies 19 watts (1.6 amps @12 VDC) for other devices,
like the electronic locks.
Regulated 10VDC output supplied for Wiegand device, regardless of input power source.
“Door” MONITOR INPUTS (occurs 2 or 3 times)
VISUAL INDICATORS
·     Three configurable sensor inputs.
·      Typically used for door sense (normally closed), request for exit (REX, normally open) and an optional input for flexibility (AUX, normally open)
·     Accepts Wiegand reader’s credential data
·     Wiegand connection supports 500ft cable length
·     IPBridge Power and network status indicator
·     Door control status indicator for each door.
PROTECTION
·     Internal power up diagnostics. AES Encryption
Supported.

For more information click here for the specification sheet [ISONAS ProductSheet IP-Bridge.pdf]

10.08.2012

Presenting the ISONAS Multi-Card Technology PowerNet IP Reader-Controller™

Newest product in the award-winning line of PowerNet IP Readers™

The first, panel-free, patented IP reader-controller with Power over Ethernet.

Advantages over legacy, old-fashioned, IP panel - based access control:
  • TCP / IP direct-connectivity to the door.
  • Open System solution built with MS Windows
  • Reads ISONAS & HID proximity cards, and ISO 14443 smart cards
  • Connector-based RJ45 & pig-tail for quick and simple installation
  • Supports Power Over Ethernet (PoE)
All ISONAS IP Door Reader-Controllers connect directly to the data network via existing LAN/WAN infrastructure. The panel-free system, featuring ISONAS Crystal Matrix Software™, places real-time control of enrollment, access, time & attendance and emergency response, in the hands of your authorized security administrator.

ISONAS PowerNet IP Readers are “true network devices” designed using IP standards and technology. Once installed, the reader-controllers use TCP/IP to open a dialogue with the ISONAS Crystal Matrix Software™ and await your specific commands and parameters. Customers find this “plug and play” configuration much easier than stringing special wiring and less time consuming than programming and connecting to legacy IP control panels. The streamlining of installation, maintenance and integration results in significant cost-savings. Endusers want to leverage the investment in their networks and this desire is driving demand for secured, networkfriendly, security devices. ISONAS’s visionary hardware and software offer these solutions today.

The ISONAS PowerNet Multi-Card Reader-controllers support a variety of credential technologies:

Smart Cards
  • MiFare
  • iClass
  • DESFire
  • PIV
Supported HID prox cards:
  • Proxcard II
  • ISOProx II
  • DuoProx II
  • Smart DuoProx II
  • iCLASS Prox
  • Proxkey III
  • MicroProx
  • DuoProx
  • PhotoProx 

8.30.2012

EH Series Magnetic Door Holder & Releasing Device





SDCEH Series magnetic door holders are built to open and release the door by remote switch or by the fire life safety command button located in the center.  These locks hold and release fire rated doors that are required to serve as a barrier for fire and smoke or offer the convenience of closing the door by remote control.  The locks come your choice of 25, 30, 35, or 40lbs holding force and require very little power consumption.  There are no wire nuts or pigtails required, keeping the wiring simple and neat.

Product Datasheet

7.14.2010

Plexidor Electronic Dog Door - Access Control for your Dog!

Home :: Plexidor Electronic Dog Doors

Plexidor Electronic Dog Doors


We offer electronic pet access control doors from Plexidor® Pet Doors.


The Plexidor® electronic door only opens for your pet while keeping other animals out. The collar key is an electronic RFID (radio frequency identification) that is attached to your pet's collar. The door reads the key code as your dog approaches and if it recognizes the code, it slides up like a mini garage door, allowing access for your pet. You can program the key to accept just one of thousands of possible key codes, so it is very secure. The rugged electronic collar keys do not require batteries, are water and shock proof, and also work with underground fencing and household security systems.

We have models for both door mounting and wall mounting to suite dogs up to roughly 125 lbs in size. The main frame has a low profile of just 1 5/8" in thickness. Door plugs into household outlet or can be hardwired. Both models are available in 2 colors: white or brown.


All models come complete with pet door, exterior trim, stainless steel hardware, 2 collar keys, power supply and 15ft cord, and are backed by our industry leading 90-day satisfaction guarantee and 5-year no-hassle warranty!





Plexidor® Electronic Advantage

Secure - Interior stainless steel locking bar, thousands of key codes. Opens only for your pet. Tough shatter resistant panel. Heavy, thick aluminum frames that won't bend. Won't interfere with home security systems.

Energy Efficient - No Gaps for air infiltration, saves you money.

Pet and Child Safe - Panel won't close when obstructed. Total control up and down. No pinched tails. No pinched fingers. Panel will not free fall with power failure.

Dependable - Runs on household current. Collar key is waterproof and does not need batteries. Key fastens securely to collar. Interior mounted motor will not freeze up in cold.

Durable - Steel and hardened aluminum frame with thick acrylic closing panel. Wall units include aluminum tunnel pieces and stainless steel mounting hardware for years of service. No unsightly rust streaks on your home.

Easy to Use - One button programming to add or change collar codes quickly and simply. Collar key snaps on easily and stays on. Comes complete with pet door, exterior trim, stainless steel hardware, 2 collar keys and power supply with 15ft cord.

Available Colors - White and bronze baked on finish. (Click picture for larger view)


WhiteBronze

Optional Wall Unit - Made of all aluminum and stainless steel for years of service. (Click picture for larger view)


White

Product Documents:

Suggested Installation Tools

Common Plexidor Questions
Info Quicksheet
Plexidor Electronic Dog Door Owner's Manual


6.22.2010

Looking for Vulnerabilities in All the Right Places? Experts Think you Might be Missing a Few...

Source -- DarkReading
By Keith Ferrell, Contributing Writer
DarkReading
 
The biggest vulnerabilities in the enterprise might be items we see every day -- and just don't think about.

Experts say that vulnerability assessments often overlook the everyday dangers: Network-attached devices that aren't computers. Paper documents. Passwords posted in plain view. Portable storage devices.

Most of these are technologies that would never be taken into account by a traditional vulnerability scan. Yet they could lead to data leaks just as surely as a keylogger or a data-stealing Trojan, experts say.

"Peripheral devices on the network may have capabilities the business doesn't know of," says Kevin Brown, delivery manager for custom testing at security assessment firm ICSA. "And those capabilities can create security vulnerabilities."

Printers, fax machines, and multifunction devices with persistent storage could all serve as entry points for a sophisticated hacker, Brown observes. And the presence of internal storage might not be clear at first glance, nor does it necessarily show up on traditional security audits.

"An automated vulnerability scan may not reveal which printers and other hard copy devices have hard drives," Brown observes. "As a result, the business isn't aware that digital copies of sensitive information may remain in the printer."

A thorough vulnerability assessment should include examining all hard copy devices for internal storage capability -- this could require contacting the manufacturer or even opening the machine, Brown says.

Enterprises also should take steps to ensure that digital files are wiped from these devices as soon as the hard copy is produced or the fax transmitted. This could mean purchasing and installing additional software from the manufacturer.

Other network-attached devices could also be vulnerable, Brown observes. "Any device connected to the network needs to have its security validated," he says.

He offers security cameras as an example. "For cost-saving and other reasons, companies have shifted security cameras from dedicated coaxial cable connections to TCP/IP connections, which run the risk of being vulnerable to cross-site scripting attacks and remote control takeover."

Even backup power devices might be at risk, Brown warns. "UPS devices connected to the network could enable an attacker to take control," he says.

Brown offers three bits of advice for all network-attached devices. "The biggest risk is leaving the default password in place," he says. No matter the device and its purpose, he advises, users should change its password before connecting it to the network.

"Second," Brown continues, "review all of the features that the device offers. Web printing capability may not be useful as a business function at your company, but it could be very useful to an attacker."

Finally, he points out that maintaining security readiness on peripheral devices is an ongoing process.

"Incorporate all devices into your patch cycle," he says. "We're all familiar with Microsoft and Cisco patches -- but when was the last time you upgraded the firmware on your printer? Seek out patch information on every device connected to your network, and incorporate them into your patching cycle."

Many of these office devices produce a lot of paper -- paper which, as security consultant Steve Stasiukonis of Secure Network Technologies points out, can be a vulnerability itself.

"Take a look at your copier station," Stasiukonis says, noting that many companies overlook sensitive material that might be found in unsecured places. Recycling bins or preshredder collection stations holding unshredded materials can be rich sites for information-miners, he notes.

Documents that aren't shredded could be the cause of a data breach, as a recent New Jersey incident revealed when papers containing Social Security numbers and other personal information were found in a public dumpster.

"And don't forget the amount of paper and other sensitive information on employees' desks," Stasiukonis advises.

A workplace walk-through -- even in a "clean desk" environment -- can often reveal security badges and swipe-cards laying in plain sight, ripe for the taking, Stasiukonis explains. In his physical penetration tests, Stasiukonis frequently also finds passwords and log-ins on sticky notes and keyrings hanging from thumbtacks in cubicles.

Even if you don't see anything at first glance, Stasiukonis suggests, look a little closer. "Have your employees turn over their keyboards for inspection," he suggests, noting that many users stick their passwords there for easy recall.

Stasiukonis also recommends checking devices, such as copiers, for default service tech passwords, which might remain in place even if the business has changed its own access and log-in codes.

"Check to be sure that security cameras haven't been repositioned," he adds. "Scan for infrared devices. Examine the security not only of IT administration notebooks, but also physical plant management and control notebooks. Beyond that, an examination of the contents of employees' desks can reveal treasure chests of vulnerabilities.

"But," he cautions, "before going into employees' desks, you should review your plans with your human resources department." Whatever your company's legal rights, many employees resent having their desks checked, so be sure to educate them before conducting a search, he explains.

Another vulnerability vector -- and in many ways the most common one -- is human nature.

Security professional Scott Wright's Honey Stick Project put human nature to the test by leaving specially prepared USB drives in plain sight. When one of the drives was inserted in a business device, the information was logged, revealing what the user had done.

Such behavior is typical, according to Wright. As he notes on his Streetwise Security Zone site: "Out of 54 devices dropped with specially configured -- but safe -- files on them, the Honey Stick Project has detected that at least 35 of these devices have had files opened."

Vulnerability-scanning tools are a good place to start, but they can't see the whole enterprise, the experts warn. To find all of your vulnerabilities, you'll need to look at the things your users see every day -- in a new way.

6.21.2010

The Pelco DX Series, Doing More for Less... Part 1.

For many years and countless hours of around-the-lock operation, the Pelco DX Series of DVRs has been relied upon to protect people and property in thousands of location worldwide. From basic video security systems with just a few cameras, to fully distributed network video systems, the DX Series is the perfect digital recording solution to meet most any video recording need.

The DX Series begins with the DX4100. These affordable, entry-level DVRs eliminate the need for the traditional VCR/multiplexer/matrix combination. Offering four-channel models with internal storage capacity of up to 2 tb, the DX4100 series is designed to guard your business while protecting your bottom line. The hallmark of the DX4100 series is its ease of operation. These systems feature simple installation, are ready to record right out of the box, and have an easy-to-use and intuitive user interface which makes training and support a snap.