Security Technology Executive

JUL-AUG 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/557126

Contents of this Issue

Navigation

Page 28 of 39

July/August 2015 • SECURITY TECHNOLOGY EXECUTIVE 29 www.SecurityInfoWatch.com Lindley: Elevators are another prime candi- date for wireless systems. Traveling cables are routinely included at the time on installation, yet they are often ill equipped to reliably trans- port credential data from the cab to the eleva- tor controller. Elevator shafts are harsh electrical environments and are often the source of data corrupting noise that becomes induced onto the card reader data lines. This causes inconsistent performance, which often gets worse over time as cable shielding decays due to continual move- ment. Conversely, wireless solutions eliminate the need for the data lines in elevators. In fact, they thrive in this environment and provide con- sistent, reliable data transport that doesn't wear out. Wireless alternatives can save thousands of dollars per elevator. Kane: We see a lot of possibilities for other applications of wireless technology that can be integrated into access control hubs, including emergency mustering stations – that is, those areas that can gather data from users in an emer- gency situation to account for employees or visitors – visitor management systems, parking controls, inventory controls and video integra- tion through wireless cameras. These are just a few of the ways this technology can be used, but the possibilities grow every day. Ouellette: Anything to which access must be controlled can be integrated into the access con- trol system: from visitor management systems and elevator dispatch systems to cabinets, data center racks and lockers. As with the consumer market, most technologies are moving or con- sidering moving to wireless communication and cloud-based storage and services. Many custom- ers use a mix of traditional and wireless panels in order to get a device or portal onto a network system, and to facilitate multiple integrations. ■ Request information: www.SecurityInfoWatch.com/10214428 Store, manage and control keys, cards and small assets more securely and efficiently with KeyWatcher Touch. Access is limited to authorized users, and all transactions are recorded with detailed reports available. The system will even automatically email transactional information to any user – at any time. And KeyWatcher's convenient touchscreen makes removing and returning keys easier than ever. With our modular design and full scalability, it's easy to see how we keep making key management better. That's Morse Watchmans' outside the box thinking – right inside the box. morsewatchmans.com • 800.423.8256 Product door not shown in image Fingerprint reader optional The overall trend of convergence of so many technologies is likely to continue for some time. — Jennifer Stack

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2015