wireless access

Honeywell Brings Wireless Access Control to More Doors

Honeywell announced enhancements to its Pro-Watch security management system that allow integrators to cost effectively accommodate virtually any access control need through expanded support for wireless locksets and biometric readers. Pro-Watch 4.2 is now compatible with multiple biometric reader options, along with added support for several brands and types of wireless locks – including options from Allegion (AD-400 Series), Assa Abloy (Aperio Line), and Salto (Sallis and SVN) – that enable the system to protect previously hard-to-reach doors and locations.

Antaira Announces APX-5200 Outdoor Wireless Access Point

Antaira Technologies announced APX-5200 industrial outdoor IP67 Wireless AP/client/bridge/repeater. APX-5200 wireless device is a managed unit with a built-in web console that allows users to configure the unit as a wireless access point, client, bridge, or repeater. The unit also features two gigabit Ethernet ports allowing for daisy chain applications. Due to the APX-5200’s industrial IP67 waterproof design, the unit is able to offer wireless connectivity in various market applications such as video surveillance systems or any outdoor environment where a wireless connection point is needed.

Fluidmesh Solutions Make a Splash at Magic Waters Waterpark

Got WiFi? That’s a question Magic Waters WaterPark (7820 N Cherry Vale Mall Dr, Cherry Valley, IL) asked itself in response to growing consumer demand for public WiFi accessibility. The award-winning attraction, which is managed by the Rockford Park District, is always a crowd pleasing destination so its desire to provide patrons with free WiFi service was a perfect add-on to the park.

Biometrics And Wireless Pair Up Through ENTERTECH SYSTEMS And ProdataKey Alliance To Enable Mainstream Adoption Of Secure Access Control

ENTERTECH SYSTEMS, the official operating partner for Suprema in the United States, Canada, the United Kingdom, Ireland and Puerto Rico, has just announced a strategic partnership with ProdataKey, a leading wireless smart access control products innovator. ProdataKey will offer Suprema biometric products to their integration partners and through their network of national and international distribution […]

Genetec Announces Strategic Partnership With SALTO To Unify IP Access Control With Wireless Locking Technology

Genetec™, a leading provider of unified IP security solutions, announced that it has entered into a strategic partnership with SALTO, a leading developer of wireless locking solutions, as part of the company’s ongoing commitment to delivering an open approach to access control. Through this partnership, Genetec and SALTO will offer a streamlined integration between Genetec […]

Stanley Security’s EL Series Wireless Access Control Solution

Stanley Security’s EL Series Wireless Access Control Solution Product Image Indianapolis, IN – (December 10, 2013) – STANLEY Security, a leading provider of access control and integrated security solutions, introduces the EL Series Wireless Access Control Solution to the STANLEY Commercial Hardware line, a web-based solution allowing the end-user to easily and effectively manage access for both interior and exterior door openings. The solution combines the EL Series Electronic Lock with STANLEY’s new Access Control Server (ACS) with pre-installed Intelli-M software, its new Integrated Door Controller (QIC) and wireless gateway for a complete access control solution for up to 32 doors. The new Integrated Door Controller is powered over Ethernet and provides perimeter control for the facility, while the Access Control Server allows for easy management of software with the pre-installed Intelli-M access management software. The Integrated Door Controller (QIC) also offers the following enhancements to the EL Series Electronic Lock: Compact single door controller mounts at the door in a double gang box for easy installation Uses existing network infrastructure and connects to closest network switch with single Cat 5/Cat 6 cable PoE carries both data and power for controller and peripheral door hardware Peer-to-peer communication keeps data flowing, even if a server connection is interrupted Buffers up to 16,000 local events when disconnected from the host, so events are never lost Secure transmissions with end-to-end AES 128-bit encryption Embedded web software for single-door standalone applications enables browsing through controller Supports DHCP and Static IP addresses Additionally, the Access Control Server (ACS) […]

Researcher Finds Major Security Holes In IZON Surveillance Camera

October 26, 2013 — CSO — The IZON surveillance camera sold in Apple Stores and Best Buy outlets is filled with security holes that enable a hacker to easily commandeer the device, a security researcher said. Mark Stanislav, security evangelist for two-factor authentication platform vendor Duo Security, started investigating the camera after buying the Wi-Fi device for his home and discovering it was configured, so anyone could access the device if it’s on the Internet. Stanislav’s findings, presented this week at the Rochester Security Summit in Rochester, N.Y., were startling. With only an IP address for the device, a person could log into the Web interface of any IZON camera, using the default user name and password, which was “user” for both, Stanislav said. Once logged in, a person could view everything the camera sees within the home. Stanislav found the credentials hardcoded in the camera manufactured by Stem Innovation. The IZON is managed through an iPhone or iPad mobile app available for free on Apple’s App Store. Stem Innovation did not respond to requests for comment. Within the mobile app, Stanislav found the hardcoded credentials for administration privileges, which means a person could set alerts and make other configuration changes. The camera has a motion and an audio sensor that can be turned on when people are away from their homes. The purpose of the credentials stored in the app is to perform firmware updates. However, there are certainly tradeoffs in security. “This camera was (according to Stem […]