News Briefs, Dec, 2015

Dec. 1, 2015

Flake Launches Quarterly Catalog

H. L. Flake, based in Houston, Texas, announces the availability of 28,000 stocked items for locksmiths and the release of its new “Quarterly” security hardware catalog.  Products include access control, security hardware and automotive products.

Customers should have received the blue catalog in their mailbox last month. Locksmiths can request a free copy by registration online at www.hlflake.com or by phone: 800-231-4105. The new catalog can also be downloaded from the website.

The new catalog is larger than ever; it features a new 16-page new product section including the following stocked items: Falcon® Grade 1 and 2 Lever sets as well as exit devices and trim, Glynn Johnson ® overhead door stops; KABA® E-Plex Embedded access control products; an increased offering of HATA® keys and the company is now stocking Master Lock® Grade 3 door combo packs and replacement cylinders. 

The offering of CCL® products has expanded to include their new series of resettable combo padlocks and rekeyable padlocks as well as CCL’s full line of SFIC Furniture Lock.

“As always, we are committed to offering our locksmith customers the widest and deepest stocking levels --whether that be Master Lock keyed-alike numbers, key machines or panic bars.  As a dedicated full-line distributor of security hardware, access control and automotive-related products, we also strive to create the best buying experience for the locksmith.  We respect the locksmith and put him/her first in everything we do: same-day shipping, printed catalogs, large inventory stocking levels, easy ordering by phone and Internet, free freight programs, courteous customer service, new product introductions, frequent opportunities to save and most importantly, staff that has product knowledge and industry experience.  Our people help our customers succeed by being a reliable partner every day,” comments Dan Floeck, C.E.O.

More Info: www.hlflake.com

Ilco Cloning Tool Trade-In Program Ends Dec. 11

Rocky Mount, NC - Kaba Ilco Corp. has launched an impressive trade in program on cloning tools that can save you up to 65 percent. 

From October 12 through December 11, 2015 Ilco will exchange a selection of cloning tools for the RW4 Plus AND this offer also includes a clonable key kit. This bonus key kit includes modular, Flip and Look Alike ® keys. 

The RW4 Plus is a standalone, easy to update Cloning Tool that requires no app or internet connection to clone keys. 

Owners who wish to “trade-Up” should contact their Ilco distributors for additional details on this limited time offer.

University Deploys Boon Edam Turnstiles to Stop Tailgating

Lillington, NC ‑ Utah Valley University, in Orem, Utah, has installed three Boon Edam Swinglane 900 optical turnstiles in its state-of-art student life center to maintain firm control on who enters 193,000 square-foot facility.

DaSheek Akwenye, Associate Director of the Student Life & Wellness Center, explained that the Boon Edam entrances were specified during the design and construction phase of the four-floor, $40 million building. All students must enter the facility through the main entrance and choose one of the three staggered turnstiles, using either their university ID or their handprint to scan in.

 “If students forget their ID, it takes just seconds to register a handprint for future use with the integrated biometric readers,” said Akwenye, “it’s very convenient.” The swinging gates operate both ways for entering users, as well as those exiting the facility. “The gates and the access control operate together in such a way that it takes approximately six seconds to enter through the entrance, and only one person can enter during that period. No sneaking in before or after means we have excellent control to prevent tailgating into the center,” Akwenye said “We really love the Boon Edam entrances so far, they’re great.”

Utah Valley University has an enrollment of more than 33,000 students—the largest university in Utah. Daily traffic into the student center runs from 1,200-1,500 users.

After installation, Boon Edam’s National Sales Manager Glen Tracy visited the campus to educate staff on the use of the turnstiles and to help in the process of getting users acclimated to what was a new entrance scheme at the University. “It took a short while to get used to them, but once users got the hang of it, things have gone very smoothly,” recalled Akwenye.

He continued, “Students like the high-tech feel of the entrances. These turnstiles bring a very nice, vibrant feel to our entrance lobby, and they have an attractive design.” Freshman and new students receive orientation to the building and the entrance protocols during an orientation tour. At that time, each student registers to use the facility, including the biometric registration. The whole process takes no more than two minutes.

When someone enters the facility, registration staff get a visual record of who has entered, to ensure that person belongs to the ID used. “It’s been really smooth, even if we have a large group, like a basketball team, then we have manual controls at the reception desk and can open the gates and shut them automatically. We’ve never had any long lines or backlog,” said Akwenye.

More Info: www.boonedam.us

How to Protect the Wiegand Protocol from Attack

Sunnyvale, Calif. – Since Wiegand is no longer considered inherently secure due to its obscure and non-standard nature, users, integrators and manufacturers need to be on-guard. Farpointe Data President Scott Lindley outlines what users, integrators and manufacturers can do to  deter hacking of wiegand systems. This was a major discussion topic at ISC East last month.

Wiegand is the industry standard protocol commonly used to communicate credential data from a card reader to an electronic access controller. In these attacks, a credential's identifier is cloned, or captured, and is then re-transmitted via a small electronic device to grant unauthorized access to an office or other facility.

"Instead of skimming, eavesdropping and relay attacks on the card itself, more sophisticated hackers are attacking the Wiegand system," explains Lindley. "For those that consider this a problem - and many should - the good news is that there are a series of remedies that can be taken by users themselves, integrators and manufacturers of access control systems."

According to Lindley, card holders should avoid presenting access control credentials to any access readers that appear to have been tampered with. Secondly, these same card holders should be encouraged to quickly report any suspicions of access control system tampering, including instances involving either the access control readers or access credentials to the facility's security and management teams.

Among a series of antidotes, integrators should install only readers that are fully potted - and immediately suggest an upgrade to those that are not - to stop any access to the internal electronics from the unsecured side of the building. Mounting screws should be hidden from normal view. Security screws should be considered. Using a continuous overall foil shield tied to a solid earth ground will help block signals. Perhaps the easiest solution is to deploy access control readers with an output alternative to the industry-standard Wiegand output, provided they are supported by the electronic access control system. Alternatives can include ABA Track II, OSDP, RS485 and TCP/IP.

Access control system manufacturers can provide credentials other than those formatted in the open, industry standard 26-bit Wiegand. Not only is the 26-bit Wiegand format available for open use but many of the codes have been duplicated multiple times. They can also offer a custom format with controls in-place to govern duplication and avoid multi-technology readers as duplication risks increase. Credentials that include anti-tamper technology, such as Valid ID, indicate to the system when it detects tampering. Credentials with an anti-playback routine, such as transmitters as used in Farpointe's Ranger Series instead of cards also provide additional safety. Among still other remedies, they can also provide a smart card solution that employs sophisticated cryptographic security techniques. An example is a MIFARE® DESFire™ EV1 card making use of AES 128-bit encryption.

STANLEY Security Launches Veteran Recruiting Program

INDIANAPOLIS, IN –STANLEY Security  announces the launch of a nationwide veteran recruiting program by entering into partnerships with the Wounded Warrior Project® (WWP) Warriors to Work® veteran employment program and Bradley-Morris, Inc., the largest military recruiting firm in the U.S.

“Service members are highly valuable for their exceptional leadership qualities, diverse skillsets and dedication to teamwork – all pillars of our corporate culture at STANLEY Security,” said Tony Buffum, VP Human Resources, STANLEY Security. “Our employees are our best assets, and these are qualities we strive for in all of our new hires. We view this program and these partnerships as an opportunity to give back to the service men and women who have already given so much to us as citizens of this country.”

As an extension of its ongoing partnership with WWP – initiated in 2013 – STANLEY’s support of the Warriors to Work program will help the organization in providing career guidance and support services to WWP Alumni interested in transition to the civilian workforce.

 “Warriors to Work offers former service men and women the opportunity to translate their talents into professional, civilian careers,” said Peter Gaytan, executive vice president of Economic Empowerment at WWP. “We are incredibly grateful to STANLEY Security for continuing their unyielding support of our organization and communities of returning veterans nationwide.”

Armed with expansive resources, the newly established partnership with Bradley-Morris will assist STANLEY in hiring military personnel into a variety of roles within Stanley Black & Decker including management, engineering, sales, operations, technician and maintenance positions.

 “We provide companies with the opportunity to be matched with only the very best candidates in their fields for civilian positions nationwide,” said CEO Tim Best of Bradley-Morris. “We’re thrilled to announce our partnership with STANLEY Security and their dedication to employing the most intelligent, disciplined and capable military-experienced individuals this country has to offer.”

To learn more about the STANLEY’s veteran recruiting program and for a list of current openings, visit www.stanleycss.com. For more information on the WWP Warriors to Work program and services offered by Bradley-Morris, visit www.woundedwarriorproject.org and www.Bradley-Morris.com.