farpointe data

Secure Access Control Specialist TDSi to Join Protech USA at ISC West 2022 in Las Vegas

Integrated security manufacturer TDSi to announce its forthcoming appearance at ISC West (International Security Conference & Exposition), which takes place at the Venetian Expo, Las Vegas, USA from 22nd-25th March 2022. TDSi will be joining its fellow VITAPROTECH Group sister company, perimeter intrusion detection systems manufacturer Protech USA, on Stand 8050 at the event to showcase its latest products, including the powerful, secure, and highly flexible GARDiS integrated access control software and hardware ecosystem, along with OSDP and SSCP Readers with TDSi partners Farpointe Data and STid.

Farpointe Data Demonstrating OSDP Flexibilities at PSA TEC Conference

Farpointe Data will exhibit how the Security Industry Association’s (SIA) Open Supervised Device Protocol (OSDP) helps system integrators improve interoperability among mobile access control and security products at PSA TEC in Denver, May 3-6. The standard also applies to peripheral devices such as card readers and other devices at secured access doors/gates and their control panels. OSDP importantly offers the option of secured, encrypted communications between reader and controller.

Don’t Let Hackers Steal Your Personal Identify

Your personal identity (PI) is any identification, presented in numbers, icons or letters, that is used to describe you and only you. Your phone number, email address, Social Security number, and a host of other identifiers distinguish you from your neighbor, a fellow in Sri Lanka or your sister. Using any of the above should help differentiate you from others. Since too many people can have the same name, birth date, password or other descriptors, the above should further discern that it’s you, not somebody else with your PI.

Farpointe Data’s Auto-Unlock Delivers Flexible Credential Read Timetables

Farpointe Data announced that the new Auto-Unlock enhancement on its Conekt Wallet App for Apple iOS and iPhones can replace the current 10-second timing of the “Tap Here to Unlock” button with a 30 second or 1-, 2-, 3-, 4- or 5-minute response from a drop-down menu. These additional times are available when the Auto-Unlock feature is activated with a selected mobile access control credential designated with a star.

Farpointe Releases Latest Wallet App for Conekt Mobile Access Credentials

Farpointe Data announced that its Conekt mobile smartphone access control identification solution now integrates advantages that Apple iOS 12 delivers, such as 3-D touch, Widget, and Auto-Unlock, into the Conekt Wallet App, version 1.1.0. All new improvements create increased user convenience. For instance, the newly improved Widget lets the user make up to three mobile access control credentials as widgets. This saves time by allowing quicker access to credentials.

Sielox Showcases New Conekt Mobile Credential Solution From Farpointe

Sielox LLC is showcasing mobility in their booth (#7103), here at ISC West with the demonstration of Conekt mobile credentials and readers from Farpointe Data. The mobile reader will work with Sielox’s AnyWare and Pinnacle software platforms connecting to their 1700 Controller. Users Benefit from Convenience and Security of Free Credential App. Integrated with Sielox’s 1700 Controller and the AnyWare and Pinnacle software platforms, Conekt uses Bluetooth to enable communication between smartphones and readers.

Farpointe Introduces New Conekt Mobile Credentials/Readers At ISC West

Farpointe Data announced that access control system manufacturers, integrators and dealers will be able to provide their customers with a mobile, smart phone application and hardware that provides free download, user’s choice of smart phone or smart card, and distribution via existing or independent access control software. Multiple Conekt credentials can fit into a single smart phone wallet app. Installer adjustable read ranges can be more than 15 feet (4.5 m).

First Cybersecurity Rule When Implementing Card-Based Systems: Encrypt!

It used to be that the most important aspect of implementing an electronic access control system was the simple control of who went where when. Today, the requirements of these sophisticated systems goes beyond. Indeed, one of the security challenges frequently heard surrounds denying hackers, cyber-punks and associated bad actors from utilizing the access system as a gateway to an organization’s sensitive IT network.