BRIVO Multifamily Access Control and Home Automation

 

Previously marketed as Parakeet, Brivo’s foray into the multi-tenant video, access control, and home automation market provides a total solution for property management to wirelessly integrate surveillance with building access and smart home features. Properties can make themselves more attractive to new clients by offering a fully mobile experience for access and automation, encouraging them to pay more and stay longer.

 

Anywhere they go with an internet connection, clients will be able to use the app to:

 

  • Adjust apartment temperature or turn on lights
  • Open the lobby door, front gate or garage
  • Access the right floor on the elevator
  • Grant access to guests and take them to the pool
  • Pay rent and submit work orders
  • Save money with energy efficiency controls

 

This all takes place through the cloud, meaning there are no on-site servers to set up and maintain. So long as the location has reliable commercial-grade internet and clients have phones, the solution is seamless and elegant.

From the perspective of the property management, Brivo’s apartment solution makes easier many conventional tasks. Using a single integrated platform, management can:

  • Manage access to doors throughout the property
  • Quickly assign and revoke mobile credentials
  • Monitor common area access and use
  • Control environmental features in vacant units
  • Prevent property damage with real-time alerts
  • Customize reports with actionable data

Furthermore, as many industries look for ways to reduce in-person interaction, self-guided property tours have become an expectation for those looking at upmarket apartment homes. Brivo makes providing self-guided tours easy for both parties while maintaining the security of the complex. With Brivo, showing available units is easier, safer and more convenient.

Multiple properties across an entire portfolio can be managed in one suite of software, with clear delineation between access control features, video surveillance, and automation. Enrolled individuals can be divided into staff and clients and subdivisions thereof, with mass notifications easily sent out to just the group that needs to know. With the elimination of physical keys and fobs, security is improved by reducing the attack surface of your complex to something much more difficult to clone or hack, the personal phone.

Security Technology of South Texas is one of the area’s most experienced and professional teams in physical security, access control, and surveillance. If you would like an assessment made for your business, please contact us at

 

admin@gostst.com

 

Visit at gostst.com 

 

Or call at 210-446-4863

 

The SlimLane 950

With many municipalities pushing through ongoing restrictions and ordinances governing social distancing and COVID related guidelines, many companies are facing a difficult reality; comply or fail. Serious fines and health department shutdowns have been seen for those who fail to accommodate restrictions on people spacing and masking, and so, companies are left with little choice. For some, this may mean cameras with the ability to detect crowding and masks, but for those with a high volume through a secured area, the solution is a contactless turnstile. These turnstiles read credentials without contact and ensure compliance with remaining socially distant and out of contact with others.

The SlimLane 950 double swing door security entrance lane offers a high bidirectional throughput and uncompro-mising security. With its transparent, elegant design and minimal footprint, the SlimLane 950 is designed to integrate perfectly into any architectural style. Its wide lane ensures easy access for people with reduced mobility, wheelchairs, large carts or wide objects. Equipped with high processing capacity and an exclusive detection system, the SlimLane 950 guarantees accurate user tracking and prevents any unauthorised use.The SlimLane 950 is a modular product that can be installed as a single or a multi-lane array and can also be combined with the SlimLane 940 standard lane model.

 

Its features are designed with our new world in mind and include:

  • A handrail frame: steel beam with RoHS anti-corrosion zinc plating treatment and stainless steel posts, to include photoelectric cells for user detection and the logic control board.

  • Self-supporting kinematic steel frame with RoHS anti-corrosion zinc plating treatment. The frame contains the electromechanical drive assembly for the swinging obstacle and the electronic control boards.

  • Clear, 10 mm thick tempered monolithic glass obstacles, swinging in the direction of user passage.

  • AS1167 logic control board, equipped with ARM technology and the Linux operating system, ensuring advanced traffic management. An embedded Web server, accessible by a simple web browser, offering an interface for the configuration of functional gate parameters as well as a complete diagnostic and maintenance tool.

  • Transfer of information from XML-RPC protocol through an Ethernet or USB interface, and dry contacts: passage authorisation, passage information, reader locking, fraud, equipment failure.

  • Orientation and function pictograms indicating gate and passage status to the user.

  • Proprietary DIRAS detection system, consisting of a high-density matrix of infrared transmitter/receiver photocells beams. It follows users progression through the gate as well as ensuring their safety during opening/closing of the obstacles.

  • Finishing plate for post.

 

 

Brushed #4 AISI 304L stainless steel housing is used for the panels, housing, and frame that accesses the internal components. It uses electromechanical drive units with a controller providing progressive accelerations and decelerations of the obstacle, for smooth movement and enhanced user safety. To prevent forced entry, the geared electromagnetic brake will lock down the obstacles in place.

This turnstile is rich in features and is not like what you might see in a subway or theme park. Thick but aesthetically pleasing glass panels combine with the stainless steel for a sleek and modern look without sacrificing security. Critically, such a system should comply with COVID restrictions for years to come as it requires no person to person handing of credentials, or even person to contact point.

Security Technology of South Texas is one of the area’s most experienced and professional teams in physical security, access control, and surveillance. If you would like an assessment made for your business, please contact us at

 

admin@gostst.com

Visit at gostst.com 

Or call at 210-446-4863

The Chip: Moving from Sensors to Perceivers

Conventionally, the sensor devices at the edge of our cloud infrastructure have been pretty dumb. With limited computational resources and greater focus being on moving data to the cloud to be processed, these devices are limited in their provision of privacy as well. Moving into this next decade, the company “Perceive” aims  to become a major player in providing data-center level computation at the network edge.

    The teams working on these devices employ machine learning and neural networks to build and deploy software and tools for a chip they call “ergo”.  The “objective of [their] effort…is trying to upgrade the whole idea of the sensor into something [they] call a ‘perceiver’”. Rather than a dumb device that streams up pixels or audio, these devices will be able to perform data-center class operations on that data and show the user the results of those analytics.

    Doing this reduces the amount of power required to stream to the cloud, but critically preserves the privacy of the user through never allowing any raw data to leave the device where is is most susceptible to attack and compromise.There are a great number of articles out there detailing hacks into people’s smart home devices such as Amazon Echo and Google Home via their smartphones. In one instance, Amazon employees were sending each other videos of people inside their residences. And certainly governments domestic and foreign alike love to see lax or non-existent security as they expand the ever-growing surveillance states.

    Only recently has it become technically possible to perform these high level computations on edge devices, and the strategy for privacy used to be an afterthought. The combination of mil-spec privacy and encryption, machine learning and hardware and software are setting these devices to give the notoriously open and unprotected cloud-based systems a run for their money. The major advantage of performing computations for analytics locally is that it isolates that data and makes situations like spying or hacks much more difficult to pull off.

    The device itself is a diminutive 7X7 millimeters or about the size of a shirt button. Due to not needing external memory, the device is ideal for very small, battery operated gadgets and larger devices as well. The goal is for this technology to become so ubiquitous that anything and everything than can have a perceiver will. While this sounds a lot like the dream sold to us about 5G, the difference here is the security focus and not being web-connected. By effectively being “air-gapped”, the items containing perceivers would be un-hackable barring physical theft of the item.

    The first items the company wants to focus on are, logically, security cameras and IoT home devices. Eventually they see expansion into appliances, drones, and even clothing and food items. At this moment, there are 25 billion sensors on Earth, and it is estimated that by 2025 there will be 1 trillion. This number is over 100 times as many people as are on Earth, and it makes sense to want to protect certain things from attack by not connecting them to the cloud. However, without internet connection, services like monitoring by humans would have to be performed in-house or by machine learning algorithms. It is still to be seen what the impact of these types of security focused “perceivers” will be.

 

Please contact us through email at admin@gostst.com

Through our website form

Or via phone at  210-446-4863   24/7

Putting Access Control Myths to Rest

 

Making the switch to EAC (electronic access control) from conventional solutions involving
physical keys and security guards can be a daunting process. With technology that is constantly
changing, making the move to embrace modern security solutions is a challenge for those who
have spent years with conventional products. While most decision makers may think that they
have a grasp on the pros and cons of going with one solution over another, it is important to
have an understanding of some of the misconceptions and myths that surround the field of EAC.
Here we will take a look at what some of these access control myths are and what the reality is in today’s security landscape.

 

#1. EAC Solutions are only for doors:

While it is true that these solutions were in their earliest iterations developed for door control
through hard-wired systems, the current technology extends across a wide array of standalone
products used in a variety of applications. Electronic padlocks and lockboxes are often
connected with EAC software and used to securer fences, sheds, garages and other outdoor
equipment, as well as indoor items such as cabinets, lockers and other interior storage.
Windows are commonly protected by EAC, and these solutions may also be used to tailor
access from person to person within an organization, splitting groups of people by access level.

 

#2: EAC Solutions are too expensive:

Although out-of-pocket costs are a given when replacing or implementing electronic security, the
benefits over the short to medium term are often enough to deliver a significant return on
investment, depending upon what issues the system was put in place to address. In some
cases, a strong EAC system can actually put money back into the businesses that use them by
eliminating labour and other overhead costs associated with the upkeep of antiquated systems.

 

#3: EAC Solutions are complicated:

Rather than create additional hurdles to jump for the enterprise security staff, modern-day EAC
technology is designed to address the pain points of traditional systems specifically to make
their use easier than the alternative. An organization making use of mechanical solutions would
have to deal with delays and downtime while trying to gain authorized access to restricted areas
or materials. But using EAC, employees can self-serve access to critical materials and sites
using mobile phones or access cards with complete assurance that only the right personnel are
gaining access to sensitive locations. Security managers will benefit from both flexible access
control and the enhanced monitoring made capable by a system that keeps constant and
accurate logs of all access and access attempts.

 

#4: EAC Solutions lack durability

While some may assume EAC products to be made from vacuum-formed plastics, the truth is
that they are generally made with the same quality or better of materials as their mechanical
counterparts are. The misconception that EAC products lack durability due to them containing
more technology is mostly baseless. Bluetooth enabled locks, for example, come to market
featuring wide metal bodies and boron alloys to resist cutting and sawing attacks just like
industry standard heavy duty mechanical locks. Many EAC solutions are weatherproofed to
prevent rusting and deterioration caused by harsh outdoor conditions. Also, the lack of a
keyhole helps prevent the effects of weathering by preventing moisture and particulates from
entering into the functional mechanism.

 

#5: EAC Systems are less secure

Bluetooth is one of the most popular short-range radio communications standards in use today.
When used in EAC applications, the user’s credentials remain protected behind the security
measures of their smartphone such as a PIN or biometrics. Within the last several years, 2FA or
two-factor authorization has been used to protect further from unauthorized access. With a
conventional keyed system of access control, the theft or loss of the keys would be a major
emergency and possibly require rekeying of multiple locks. Using EAC solutions, access is
controlled centrally and does not require any physical manipulation of a locking mechanism, so
a lost key card can simply have its access privileges removed. This is a major cost and time
saving measure over time and a big reason why huge segments of multiple industries are
switching to EAC.

 

The security of data in these solutions can be protected with 256-bit AES, end-to-end mil-spec
encryption to proof against hacking or tampering efforts. This is a standard that the NSA
maintains internally to be resistant to brute force attacks and is significantly more secure than
using just the standard security on a smartphone.

As you may be able to tell, EAC is becoming the de-facto standard for security. This market is
projected to continue to expand along the increased need for both physical and data security in
residential, commercial, industrial, and government facilities. Those who have not made this
transition away from lock and key security measures risk being vulnerable to increased
long-term costs as well as security breaches, particularly those occurring internally.
With reliability, scalability, and seamless integration into legacy security, EAC has shown over
the years to be worth the investment and even more than pay for itself in a wide array of
industries. Make today the day you make the move into the future of access control for your project.

 

Contact us today:

Call us 24/7 at 210-446-4863