Real Time Networks has acquired Real Time Location, Ltd., a leading supplier of people and asset tracking solutions in the UK. Real Time Location was established in 2012 with headquarters located in Barnsley, England., and boast a number of Fortune 1000 clients.
Every product seems to have ‘smart’ slapped on the front of its name lately. It may not come as a surprise that many of them aren’t smart at all. But believe it or not, there is an actual definition for a ‘smart’ technology. And they’re very effective at what they do.
Business everywhere may be going digital, but physical keys will be part of security plans for a long time to come. And for good reason. Lock and key security provides an excellent level of security and access control, and it’s affordable for businesses of all sizes.
The opioid crisis continues to worsen across North America. And as it does, hospitals and EMS agencies continue to struggle with drug diversion.
Probably one of the most complicated and unpredictable components of business security is managing the human element. In business security, people are both an asset and a liability. And they have a way of ruining even the best security plans.
Lessons from a Correctional Facility Going Paperless
Real Time Networks has helped law enforcement agencies deploy AssetTracer smart lockers for a variety of different reasons. Some facilities are interested in securing firearms and equipment when they’re not in use. Others care about managing chain of custody for their evidence kits or inmate belongings.
Real Time Networks recently announced its new partnership with VIZpin. We’re really excited to offer VIZpin’s mobile credential access control technology as an authentication option in our KeyTracer and AssetTracer management systems!
Real Time Results — A Series of Confidential Case Studies
This case study is part of an ongoing series that gives readers a behind-the-scenes look at some of the most challenging and sensitive business problems that Real Time Networks has helped solve. The clients are confidential. The results are real.
The GSX 2019 conference is almost here. Running September 8th-12th at McCormick Place in Chicago, this could be the largest GSX yet. And this year Real Time Networks is proud to debut a range of upgraded features for our key, asset, and people management solutions. Here are some highlights, but make sure to come see them for yourself at Booth 2153!
What is Content Surveillance? When should you use it, and when shouldn’t you use it?
The real power of the business and physical security solutions that we develop lies in how they integrate together. Possibly the best example of this is the content surveillance system available in our AssetTracer smart lockers for asset tracking. It connects physical asset lockers with centralized management software and our other real-time security systems. Whole new workflows are possible when these tools are integrated together.
Real Time Results — A Series of Confidential Case Studies
This case study is part of a new ongoing series that gives readers a behind-the-scenes look at some of the most challenging and sensitive business problems Real Time Networks has helped solve. The clients are confidential. The results are real.
It seems like two or three new wireless technologies are announced every year. And most are touted as the perfect tool to run a Real Time Location System (RTLS).
When It Comes to Emergency Mustering, Keep It Simple
Emergencies can’t be predicted, they can only be planned for. But if your plan is so complicated that it’s distracting during evacuations, you might as well have no plan at all. The best plans are both thorough in the range of events they cover and clear to follow.
It may seem obvious put this way, but if physical keys give access to your organization’s spaces, assets, and people, than they should get as much protection as those spaces, assets, and people. There are very real financial and operational risks if you don’t know who is going where with your keys.
Identifying the best security tools that actually align with your hotel’s needs can be challenging. Even just researching new systems can feel like wading through a sea of buzzwords. RFID, analytics, IoT. It’s frustrating trying to figure out what’s actually relevant for your particular facility.
Historic Buildings, Modern Problems
Aloft Liverpool located in city center Liverpool, England had a lot going for it. In just five short years it had established itself as a boutique destination hotel in an up and coming corner of the City Center district. Within walking distance of museums, concert halls, Liverpool’s Conference Center, and the scenic River Mersey, Aloft had turned the deteriorating Royal Insurance Building and surrounding area into an attractive mixture of “history and modernity,” as they liked to say.
IoT’ stands for Internet of Things, and it looks to remain a popular topic in both the consumer and enterprise tech spheres through 2018. It is of particular interest to security experts as the IoT holds both massive potential to aid their efforts and represents a massive threat.
With 2018 drawing to a close, and a holiday season quickly approaching, we wanted to take this time to thank you for your continued business, loyalty and support. We strive every day to exceed expectations and, thanks to your continued feedback, we have introduced some brand new features and products to better help and serve you. Our priority is to offer the absolute best experience when it comes to Key and Asset Management.
Let's use this opportunity to kick-back and take a look at a few of the things that made 2018 special.
Every organization worries about insider threats and insider attacks, and with good reason. Enterprise security surveys over the last decade have consistently shown between 50% and 60% of reported thefts and other losses annually have originating internally.
Allowing staff to bring and use their own devices such as laptops, tablets, and smartphones has been adopted by some businesses and is often referred to as a BYOD, “bring your own device”, policy. It’s a trend in today’s business climate as apps, social media, and remote workforces expand. Should you consider adopting a BYOD policy? Here are a few pros, cons, and a device management solution that we think allows for the best of both worlds: BYOD Lockers.
By its very nature, the service industry is in a constant search for ways to improve and optimize the customer experience. Quicker sign in, improved staff workflow, and offering a personalized experience for each customer are all ways hotels aim to set themselves apart in an increasingly competitive industry. As a result, they’re turning to new methods and technologies to give themselves a competitive edge; the most recent trend we’re seeing in hotels and hospitality is the usage of handheld tablets, phones and iPods to staff members, concierges, and directly into rooms for customer use. The initiative has been put in place to enable staff to better serve customers and to help remain engaged in their day-to-day work. So you can expect a bit more than a mint on your pillow next time when you check into your hotel room for your next trip.
The goal of any security system is to permit only the movement that you actually want of people, assets, or data within your facility. That principle remains the same whether it’s officers and inmates in a corrections facility, mobile devices with sensitive data at a power plant, or forklifts in a warehouse.
A proper Enterprise Security Strategy requires end-to-end execution, relying on a wide range of different access control and security systems integrated together. The challenge is cover any possible breaches, while being flexible as trends change. Rather than using brute force or expensive tactics, you should focus on carefully integrating all parts of your system so that there is no opportunities for malicious activity to take place. A carefully planned, fully secure system will save you more money in the future in the event you have a knee-jerk reaction to correct a problem when it's already too late.
Police and Law Enforcement Officers rely on a wide range of equipment to complete their every day job. Aside from relying on firearms and safety equipment, they deal with evidence, seized narcotics, and many objects that have unique storage requirements. Law Offices need to ensure the security, safety, accountability and reliability of every weapon, communication device, and items of interest that comes through the front door. As theft continues to increase, law officials are turning to tools that help them better manage dangerous assets, and to maintain proper chain of custody for evidence.
Police require control over a large number of varied items, and strict requirements on managing and tracking who has possession over them. Lockers are necessary to keep Firearms, Equipment, Pepper Spray, Evidence or hazardous items locked up and out of the wrong hands. They ensure the control and tracking of Assets and Equipment needed every day on the job, and assist with the tagging and filing of evidence. But many Law Enforcement Offices are now taking things a step further and implementing Electronic Smart Lockers, for higher security, more precise access control, better accountability, and additional tracking.
What is an Electronic Asset Locker (or Smart Locker)?
As we all know, theft and asset loss are an unfortunate part of running a business. According to recent studies, 25% of employees have lost important assets relating to their job, and shoplifting combined with Employee Fraud and Theft cost retailers nearly $50 billion last year. While there are many tools to mitigate this loss, human error will always be present among even the most careful employees.
Join us at Security Canada Central, the largest and most important security show in Canada this year at the Toronto Congress Centre. We wanted to personally invite our valued customers and followers to come visit us at the show. You can find us at Booth #333.
Key Management Systems are designed to keep your keys safe and secured. However, the main issue with many keys on the market is that they rely on metal contact. These attract rust, grime dust... and after hours of daily use... I'm sure you can imagine how well they work.
Say "Hello" to Real Time Networks
You may have noticed that recent communications with us have been from Real Time Networks. We're very excited and happy to announce that KeyTracer has undergone a corporate rebranding, and is now part of the Real Time Networks family of products. You can continue to purchase the industry-leading RFID KeyTracer Key Control and Management Systems, but KeyTracer is now part of a larger suite of integrated security solutions.
The International Association of Chiefs of Police Conference is quickly approaching. We wanted to take this time to personally invite our valued customers and followers to come visit us at the show. You can find us at Booth 1470. There will be lots of exciting things to see, as well as several ground-breaking new products.
Global Security Exchange (GSX 2018) is quickly approaching, and we wanted to take this time to personally invite our valued customers and followers to come visit us at the show. You can find us at Booth 2143. There will be lots of exciting things to see, as well as several ground-breaking new products.
It's not if, but when your organization will suffer a security breach. Whether they’re large or small, or protecting from internal or external attacks, every organization must remain vigilant. Even the NSA, arguably the most secure US federal intelligence agency, failed to stop Edward Snowden from releasing an estimated 1.7 million sensitive records
Enterprise security threats continue to evolve, and it seems like it’s happening at an ever-increasing pace. Enterprise security solutions seem to be changing faster too. So we’re doing a mid-year update of our Access Control trends piece now that we’ve had a chance to see how 2018 is progressing.
The utilities industry has the rare challenge of being accountable both for its own security and for the public’s. The penalties for even a small lapse in compliance are severe, let alone an actual breach. And as recent announcements by NERC make clear we can only expect Critical Infrastructure Protection (CIP) standards to get more rigorous over time.
To help businesses as they head into budget planning, Real Time Networks has produced a new guide for getting maximum value from new physical security capital purchases.
Over the last decade, the pharmaceutical industry has seen overall growth, unexpected breakthroughs, sudden mergers, and just as sudden contractions. In such a turbulent market businesses are looking to create reliability wherever they can.
2018 looks poised to be a breakout year for artificial intelligence (AI) in the security field. And it’s likely just the tip of the iceberg. Gartner Research anticipates the widespread adoption of AI technologies in core business areas across all sectors over the next 2-5 years.
As your vehicle fleet grows, so does its management overhead. Mundane tasks like updating maintenance logs, tracking vehicle availability, or even just knowing where all your keys at a given time can get quite complex.
Fleet managers shoulder the responsibility for high value, potentially dangerous equipment. Not only are they tasked with maximizing the life of the fleet, they must also keep a close eye on security and liability concerns. And because most government, municipal and corporate fleet vehicles display the name and seal of their community, their operation and condition carries a strong public relations message.
A wide range of key management systems are available today. It can be a challenge to decide exactly which one is right for your needs. This decision is critical, as not every key control system will work for every organization. Purchasing the wrong one can have serious financial repercussions.
Access control cards may all look the same, but ‘under the hood’ the technologies driving them vary considerably. Different card systems have very different strengths, weaknesses, and price tags.
Choosing the card technology that best fits your business was already going to be challenging. But gone are the days when buying a security system meant that you only had to think about that one system. In our era of universal connectivity it’s essential to consider how a card system integrates with the rest of your security environment.
In this article we’ll take a look at the leading card technologies on the market today. We’ll also highlight some of the access control platforms that Real Time Networks products can integrate with. Our RTNHub management software was designed from the ground up to work smoothly with all of them, and other major business and security platforms, like Verizon Connect fleet management, Windows Active Directory, C-Cure, and S2 Security.
We’ll start with the more simple systems better suited for lower security environments, and then move up to more advanced RFID card systems.
Think scanning items at the grocery store. For access control, barcodes on access cards contain user credentials, which are scanned by card readers at control points. While cards and readers are inexpensive, they’re not very secure. They literally can be duplicated in 10 seconds at the office photocopier. They’re only applicable in very low risk security environments.
These cards use the same technology as credit cards. The magnetic stripe holds credentials as a simple binary code that’s read when the card is swiped. The bad news is that magstripe card copying equipment is readily available online. So this is also best treated as an ‘entry level’ access control method for low risk settings.
Our technology partner Lenel sells magstripe systems for such a need, compatible with their Lenel OnGuard platform, in addition to their wider range of RFID card systems (More on those, below).
This technology exploits a quirk in the behavior of magnetic fields around twisted metal wire to encode information. In access control, ‘Wiegand wires’ are embedded in plastic cards and magnetically encoded with unique credentials. These cards became popular in the 80s as a more secure upgrade to barcode and magstripe cards. Since credentials are encoded at manufacture, Wiegand cards cannot be reprogrammed or erased, and they’re harder to duplicate. While they’re still in use today, generally they’ve been made obsolete by more modern technology, namely…
Radio Frequency Identification (RFID) Cards
RFID cards transmit their credentials via binary computer code over the air. A card does not need to make physical contact with a reader to communicate. They contain small computer chips programmed to hold credentials to specific facilities. Cards receive wireless power when they’re in close proximity to readers. Credentials can also be encrypted in some versions, greatly enhancing security and making the cards much harder to duplicate.
RFID cards are currently the most common access control card type on the market. Two types dominate, each with different advantages.
Low Frequency RFID ‘Prox’ Cards
This is the most common RFID format. Prox is short for ‘proximity.’ These cards send credential information one way: from the card to the reader. The 26-bit version is an open format used by many manufacturers. Blank cards in that format are readily available and inexpensive.
You may have already guessed that this makes illicit duplicating easier. Which it does. Duplicating tools, and even online services, are very easy to come by. And the duplicates are difficult to identify and trace. That said, proximity cards are quite popular at low-to-mid levels of enterprise security. Especially in stable security environments, where needs don’t change year to year. They’re require no contact, which is good for usability and—we’ve found—means less maintenance.
Both AMAG Technologies and Lenel offer a variety of prox card options. Real Time Networks products easily integrate with both of their management platforms.
High Frequency RFID ‘Smart’ Cards
Smart cards were developed with the express purpose of being difficult to duplicate. Equipped with on-board processors, they’re essentially single-function computers, which—thanks to advanced encryption— authenticate the carrier with a unique code generated new for each individual transaction. Because they use two-way communication to authenticate, smart cards are much harder to duplicate. There’s also potential for connecting them to card payment systems and other personal identity-based tools.
AMAG, Lenel, and Genetec are all major carriers of smart card access control systems.
So How Do You Choose?
As with most security technology decisions there’s no one one-size-fits-all answer. Identifying the correct access control card system for you requires consideration of budget, desired security level, and future business directions. Smart cards are highly secure and adaptable if needs change, but are more expensive. They may not be the right fit if your goal for the next 10 years is just to regulate access to one university lecture hall, for example. On the other hand, if your university were investigating chip payment cards that might be able to run on the same standard, then it might make sense.
One specific question we hear a lot is what to do if you have a large install base of older cards. Replacing hundreds or even thousands of access cards in one fell swoop is going to be expensive, not to mention a logistical challenge. In this instance, we generally recommend first replacing legacy card readers with newer, multi-format readers that can accommodate both your legacy system and the new one. Then cards can be replaced simply through attrition. As new cards need to be issued, or old cards replaced, the newer proximity or smart cards are issued instead.
Hopefully now you’re in a good place to start the conversation with your business’s leadership and security providers about the best access control option for your needs. But if you’re looking for further help selecting the right integrated security systems, feel free to contact Real Time Networks today for help.
Editor's Note: This post was originally published on August 28, 2017, and has been updated for accuracy and comprehensiveness.
Ameristar Gains in Efficiency and Ensures That Stringent State Regulations are MetPinnacle Entertainment properties are not strangers to automated key control and key management best practices, having implemented these many years ago. However, over the years, their initial experience with key control had shed light on opportunities for improvement, which were recently put into practice at the Ameristar Casino Hotel in Iowa.
The Need for More Reliable Key Control
The organization’s first key cabinets relied on metal-to-metal contact for key tags to be accurately read by the system. Chris Hamblin, Director of Security and Facilities at Ameristar adds: “The reality is that metal-contact key tags get dirty and corroded over time, which affects the system’s ability to make contact, and its reliability. It’s labor intensive to keep them clean, and that often falls under the responsibility of Security.”
Plenty of folks have had the experience of being "buzzed" through a door. It happens like this: After checking your ID or recognizing your face, a receptionist presses a button. You hear a buzzing sound indicating that the door is now open. (And by the way, if you’ve never seen the old “door buzzer” skit with Carol Burnett and Tim Conway, open a new tab and Google it. Now. It will add a whole new layer to your understanding of access control). The “door buzzer” experience illustrates the inner workings of an Electronic Access Control (EAC) system. In its simplest form, an EAC system consists of an electronic door lock, a reader (such as a card reader or keypad), and some form of controller. In our example, the receptionist's eyes are the reader that allows her to recognize you. Her brain is the controller. If her brain is convinced that you belong inside, it will send a signal to her finger, ordering it to press a button and release the lock.
Except for the more garish super villains, criminals avoid the spotlight. Most prefer to operate in theaters where they can remain in the shadows and maintain a level of control. Enter Crime Prevention Through Environmental Design (CPTED). CPTED is not a new sensor or camera. Rather, CPTED is a set of design principles intended to take the sense of anonymity and control away from the bad guys; and by doing so, make your facility a harder target. CPTED principles, when properly applied, allow you to anticipate the thought process of potential offenders and reduce the opportunity for crime.
The pin tumbler lock has been around for about 6,000 years. The Egyptians developed a lock and wooden key (about 2 feet long!) using the same basic principles as your front door deadbolt. With so much attention paid to the high-tech layers of a security program – intrusion detection, video analytics, electronic access control – it’s easy to forget just how critical a well-designed lock is; and just how vulnerable an inexpensive metal key can make you.
Many organizations design their security program from the perspective that it’s just another cost of doing business. Money you have to spend so the rest of the business can do its work in peace.
Many people see asset management systems only as ways to protect their company’s electronics and hardware from theft. But current security technology collecting real-time, location-based data is also effective at protecting your company against a range of insider threats.
Managing electronic assets at your business is difficult enough without having to worry about your staff’s personal devices. But this has become a common problem with the advent of Bring Your Own Device (BYOD) expectations at many companies. Sometimes the expectation is pushed by employees, but sometimes it’s driven by employers themselves.
The best way to protect your business against emergencies is with preparation. Emergency situations can happen unexpectedly and at any time. Your staff—especially your emergency response team—needs to divide its attention among a large number of equally important tasks, like first aid, emergency shutdown procedures, and even basic roll call of evacuees.
AMAG Technology, the security management system manufacturer, has announced Real Time Networks as the newest certified partner within the Symmetry Preferred Partner Program. As a certified partner, Real Time Networks' KeyTracer Key Management System integrates with AMAG’s latest Symmetry Access Control software. AMAG Technology and KeyTracer cooperatively tested and certified this integration.
What’s Your Protection Profile?
You protect physical assets from security threats. The type and strength of protection you implement is driven by the kind of business or organization, and the type and severity of the threats you face. That new hospital wing—major security is demanded. The dirt lot next to it that you haven’t yet developed: a chain link fence will do. One organization might make the largest investment in protecting keys; others in protecting people; still others in protecting trucks and equipment. Every business touches multiple threat categories, but they’ve each got their focus. Of course, educational institutions have their own set of unique security threats.
In a few short years ‘convergence’ has gone from just a buzzword, to a supposed fad, to now the new normal way of operating. This rapid shift in thinking has come about mainly because technological convergence is no longer a trend specific to the security industry, it now reflects a larger change in our society.
The goal of any physical security system is to permit only the movement that you actually want of people, assets, or data within your facility. That principle remains the same whether it’s officers and inmates in a corrections facility, mobile devices with sensitive data at a power plant, or forklifts in a warehouse.
Internet of Things (IoT) technology continues to disrupt both the consumer and enterprise sectors, and as each powerful new use is found its adoption is only expected to grow. But many IoT security risks remain.
Key management systems have become essential parts of commercial security protocols. They open new levels of security that were previously inaccessible to many business owners. These systems make it possible to organize access levels to a plethora of things which include, but are not limited to, warehouses, restricted facilities, and equipment.
Determining the correct amount of protection to give your assets and facilities can be difficult. Ensuring you use only the most cost-effective security solutions requires you to first have a good understanding of your unique security threats and operational needs.
Editor's Note: Originally published February 15, 2017. Updated in January 2019 for accuracy and comprehensiveness.
It's a new year, and what better time to look at some of the changes over the past year that lead to new trends in 2019. For access control, those trends are moving steadily toward more devices, more points of access and definitely more data.
Your business or institution may not be as safe or secure as you imagine. Here are a half dozen signs that your security isn’t as strong, smooth or efficient as you might think.
There are many key management systems available on the market, and many competing providers make similar claims. To help guide your planning and purchasing process and make wise choices, Key Tracer has tapped its 10+ years of industry experience with the questions that we get asked every day to create a best practices guide. If you’re considering buying a key control system for the first time, or looking to upgrade your existing system, there are principles that you want to keep in mind. We've summarized some of the key points from this guide below.
It wasn’t that long ago that fleet management was more of a guessing game, with labor-intensive manual logs. What's more, key-cut businesses were racking in the dough cutting multiple keys for local businesses with fleets. When a key went missing, a runner was sent to get a new one cut.
We always like to remind people that Real Time Networks tracks more than key control—eliminating the cost and risk of managing keys for companies, campuses, correction facilities and more. We’re also committed to protecting all your secured assets—from weapons to electronic devices to two-way radios.
Think for a moment about all the steps and all the people involved with doing something that seems so simple; issuing, tracking and returning keys. Guards or other personnel are appointed to the key management process—often more than one and often 24 hours a day. There are supervisors monitoring those guards. There are sign in/out sheets and logs maintained and regular reporting that has to be done. And that’s if things go smoothly. If physical keys are lost or stolen, more people get involved, more forms are filled out, and sometimes outside vendors brought into to re-key locks.
Countless Hours Spent Tracking Keys and Firearms Resolved by Automating with Key Control and Firearm Lockers
When Syracuse University implemented electronic key cabinets and asset lockers, they immediately found that the automated system increased efficiency and significantly reduced labor costs associated with key control and asset management.
Paper Logs Result in Errors, Lost Keys, and Time Wasted
Key Control Challenges
Prior to automating key control, the Montreal Olympic Park had been using a handwritten registry to track the issue and return of approximately 2,500 keys. Each day, someone was responsible for manually recording which key sets were being checked out and by whom, on which day and time, and recording the return of the keys.
Walla Walla University prides itself on a student-based employment program that encourages students to earn money while they attend school. Because of this, security can be an issue when multiple students are provided access to different areas of the school and there’s no way of tracking the keys.
Real Time Networks opens new offices overseas to support increasing demand for key control systems in the UK.
Shopping for Key Management Solutions? - Ask about RFID
Those metal tags you use to manage and monitor your keys are costing you a lot of time and a lot of money—without delivering a lot of value.
Security is a huge concern in the modern world. Threats arise both big and small that can be costly and time consuming to businesses. Not only do businesses contain valuable equipment and cash inside their premises, there can also be client information and other types of data that is confidential, as well as exclusive ideas and inventions.
Manage and monitor the security of premises using a guard tour system
It proves beneficial to the patrolling guards and improves their efficiency as well. Moreover, this system keeps a complete audit trail of your guards' tours and checkpoints. Among several benefits that it offers, the top 3 advantages of RFID-based guard tour systems are discussed below.