Mobile Access Trends

What’s new with biometrics?
What’s new with biometrics?

Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?

Which standards have had the greatest positive impact on physical security?
Which standards have had the greatest positive impact on physical security?

In the complex world of physical security systems, standards can enable disparate systems to be combined to function together as a cohesive whole. Standards help to ensure that all the “pieces” fit together to create a clear, unified picture. More broadly speaking, standards also play a role in ensuring best practices are deployed in a range of security-related situations. We asked this week’s Expert Panel Roundtable: Which standards have had the greatest positive impact on physical security?

How mobile technology is redefining duty of care in organisations by Mark Niblett
How mobile technology is redefining duty of care in organisations by Mark Niblett

When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are.  Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them.   Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team.  For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.

Is “frictionless access control” a reality or an empty promise?
Is “frictionless access control” a reality or an empty promise?

Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a credential or otherwise engaging, and with the system recognising who you are and allowing you to pass. In true frictionless access, everything works seamlessly, with unauthorised people obviously barred. But how close are we to realising frictionless access control? We asked this week’s Expert Panel Roundtable: Is frictionless access control a reality or an empty promise?

Latest Access control news

CX-ED0010 cabinet lock by Camden door controls
CX-ED0010 cabinet lock by Camden door controls

Camden Door Controls is pleased to introduce to the market the CX-ED0010 Electromechanical Cabinet Lock. Representative of the impressive technological evolution in secure locking systems, it is designed for a variety of enclosures that use swinging doors, drawers, and sliding doors. This lock introduces the flexibility of operating in either field selectable fail-safe or fail-secure modes and supports both 12V and 24V power supplies. Functionality of the CX-ED0010 This flexible and affordable cabinet lock is ideal for a wide range of access control applications, including securing computer cabinets, lockers, retail display counters, and medical and cannabis dispensaries. It features front mounting for use with office drawers, display cabinets, etc. and the strike plate easily adjusts to door alignment. Door and lock status sensors provide real-time security status, further enhancing the functionality of the CX-ED0010.

D-Fend EnforceAir2 24.04.2: Enhanced C-UAS capabilities
D-Fend EnforceAir2 24.04.2: Enhanced C-UAS capabilities

D-Fend Solutions, the pioneer in field-proven radio frequency (RF), cyber-based, non-kinetic, non-jamming, counter-drone takeover technology, announced the release of EnforceAir2 version 24.04.2, which includes all upgrades to the system released since the launch of the product last year. This new software version comprises major upgrades to its award-winning capabilities and builds upon its proven C-UAS power, performance, portability, and range. Version 24.04.2 of EnforceAir2 includes a range of refined improvements that have been rolled out so far this year, including new user interface (UI) features, expanded detection and mitigation coverage, and enhanced capabilities for deployment on naval vessels. UI Enhancements: EnforceAir2's user interface now offers: An AI-based mitigation engine that recommends appropriate drone mitigation options for each individual drone to simplify mission-critical decisions by the operator in real time. Direct UI integration linking drone tickets with map representation of drone location to enhance situational awareness when dealing with drone swarms. New graphic representation of the threat level and the possible intentions of the pilot. Improved quick, single-click access to detailed drone information to enable operators to dive into specific characteristics to assess a drone's threat level. Upgraded API: Application Programming Interface (API) upgrades include: Strengthened support for the exchange of information with external command and control (C2) systems in real time. Additional feeds into EnforceAir2 SDR to facilitate tagging of large numbers of authorised drones for the control airspaces that may contain thousands of drones operating as a baseline. Enhanced Naval Vessel Deployment Capabilities: Updates for EnforceAir2 naval deployments include: Support for multiple sensors deployed on a moving platform utilising D-Fend's MSC2 technology. Enhanced mobile C-UAS plans. Dynamic updating of warship operational area map. Disrupted GNSS Mode: The system now provides: Operational support in zones with disrupted GNSS environments through advanced logic that optimises the system in such scenarios. In addition to these software enhancements, D-Fend Solutions has significantly expanded EnforceAir2's detection and mitigation drone coverage with the inclusion of many additional drone models. Advanced counter UAS capabilities "Given the rapid advances in drone and UAS technology we see across the globe, it's important that EnforceAir2 equips our customers with the most advanced counter UAS capabilities possible while maintaining the simplicity of operation," said Yaniv Benbenisti, President and Chief Product Officer at D-Fend Solutions. "Breakthrough innovations, such as the AI-based mitigation engine and disrupted GNSS environment mode, bring significant advantages to safely protect against the threats posed by maliciously or irresponsibly piloted commercially available drones and custom-built drones."

HID & Inner Range expand mobile access with SIFER credentials
HID & Inner Range expand mobile access with SIFER credentials

HID®, a pioneer in trusted identity solutions announced an extended partnership with its trusted partner Inner Range, a global provider of integrated access control systems and solutions, to offer Inner Range customers a new range of SIFER credentials compatible with wallet-enabled readers, based on HID’s signature line of access control readers, HID Signo®. Mobile access “The sheer opportunity to further deepen collaboration with our partners excites us,” says Steve Katanas, Regional Head for HID Physical Access Control Solutions, ANZ. "Mobile access is rapidly becoming a dominant force in reshaping the physical access security industry and we are glad to be able to extend the mobile access in wallet solution to Inner Range to solidify its position as an integrated access control solutions provider globally." Sustainable, and future-proof identity solutions Katanas adds, “Inner Range customers will get all the benefits of adding mobile credentials in Apple or Google Wallet (and other OEM wallets shortly), designed for the future of the workplace." "I’m excited by the potential of this technology partnership, as we continue to collaborate on future projects, enabled by HID’s secured, sustainable, and future-proof identity solutions.” Encryption and security protocols  The in-wallet solution powered by HID Mobile Access provides a pioneering user experience  Leveraging HID’s wallet-enabled readers, Inner Range enriches its reader product portfolio, providing its customers an additional choice of adding HID mobile credentials to their wallet, giving employees, tenants, and visitors secure and easy access to office spaces, meeting rooms, printers, lockers and other facilities with a tap of their smartphone or smartwatch near the Inner Range SIFER- enabled readers, powered by HID Signo.  The in-wallet solution powered by HID Mobile Access provides a pioneering user experience while employing advanced encryption and security protocols to ensure that access to facilities is both safe and secure. Seamless user experience “We are delighted with the success of our recent collaboration with HID. At Inner Range, providing our customers with a seamless user experience is a core objective for our security solutions,” says Gabriel Daher, VP and GM of Inner Range. "Adding SIFER credential support to the HID Signo reader achieves this perfectly and provides a significant opportunity for Inner Range and our channel by offering future-proof solutions that incorporate both our technologies." Cutting-edge technology Daher adds, “This strategic partnership is a significant milestone that underscores our commitment to leveraging cutting-edge technology to deliver exceptional value to our customers." "We are excited to share this groundbreaking news with our current and prospective clients, confident that it will exceed their expectations. As we continue to strengthen our alliance with HID, we are eager to embark on future projects that promise to harness the full potential of HID technology, with details to be revealed in due course.”

Progress enhances LoadMaster 360 for better app security
Progress enhances LoadMaster 360 for better app security

Progress, the trusted provider of AI-powered infrastructure software, announced new and powerful enhancements in the latest release of Progress® LoadMaster® 360, its cloud-based unified application delivery platform. These enhancements help organisations protect their web applications against increasingly sophisticated cyberattacks and provide customers with an optimal application experience. With the release, Progress provides customers with an enhanced Web Application Firewall (WAF) offering that delivers improved security insights, minimises the time required for WAF configuration and tuning and easily identifies false positives for legitimate application traffic. With its intelligent false positive identification and smart rule tuning, LoadMaster 360 empowers customers to more easily secure their applications. Precise WAF configuration Enabling all OWASP-based WAF filters can inadvertently block legitimate users Web applications present attractive targets for malicious actors seeking to exploit vulnerabilities and gain unauthorised access to sensitive information. Enabling all Open Worldwide Application Security Project (OWASP)-based WAF filters can inadvertently block legitimate users and impact application performance, but disabling the same filters without careful consideration can make applications vulnerable to attacks.  LoadMaster 360 helps customers find the right balance between the two extremes by providing precise WAF configuration and tuning based on smart traffic analysis. Application security capabilities “To address the complexity of today’s evolving web-based threats, infrastructure teams need intelligent and advanced technology that can precisely filter, monitor and block malicious traffic without impacting operations,” said Sundar Subramanian, EVP & General Manager, Infrastructure Management, Progress. “With today’s release of LoadMaster 360, we are giving our customers powerful technology, which, when combined with other application security capabilities such as single sign-on and pre-authentication, can help them combat cyberthreats and maintain their application performance.”  LoadMaster WAF technology LoadMaster 360 users can take rule of their application delivery and help deliver an optimal application Identifying attacks from false positives is a challenging and time-consuming effort, especially for non-security experts. With access to detailed data in LoadMaster 360, they can more easily configure and customise the LoadMaster WAF technology and quickly identify a potential security issue only when it occurs.  Through a powerful combination of load balancing, WAF protection, monitoring and tuning, LoadMaster 360 users can take control of their application delivery and help deliver an optimal application performance experience for end users. LoadMaster workloads LoadMaster 360 provides organisations of all sizes with the controls and insights necessary to maintain optimised application performance and deliver the best possible application experience for users. As a cloud service, LoadMaster 360 provides a single interface to manage application delivery performance, security and configuration in relation to LoadMaster workloads.

Access control applications

ZeroEyes AI gun detection deployed in 200+ Utah schools
ZeroEyes AI gun detection deployed in 200+ Utah schools

ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, and Aegix Global, a Utah-based provider of industry-pioneering safety and personal protection resources technology, announced that they have successfully deployed ZeroEyes’ AI gun detection and situational awareness software in more than 200 Utah schools. ZeroEyes’ software has been integrated into the Aegix AIM active incident management platform since spring 2023. Schools and districts that have deployed the combined solution include American Leadership Academy, American Preparatory Academy, and the school districts of Cache County, Carbon, Grand, Juab, Layton City, North Summit, South Summit, Provo, Wasatch, and Waterford School Districts, among others. Aegix AIM platform Aegix AIM platform cuts via chaos to clear guesswork and delays, saving special time in a crisis The Aegix AIM (Active Incident Management) platform cuts through chaos to remove guesswork and delays, saving precious time in an emergency. The system allows individuals in schools, businesses, and other organisations to notify first responders and colleagues about a crisis with the touch of a button. In a worst-case scenario, such as an active shooter, teachers simply push a button in the app to let administrators and first responders know if they are “safe” or “unsafe.” Aegix AIM can be operated from a desktop, laptop or smartphone. “Incorporating ZeroEyes into our AIM solution to mitigate gun-related violence in Utah schools has provided an additional layer of protection for students and staff statewide,” said Chet Linton, CEO of Aegix. “We look forward to the continued success of our partnership.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational grasp software layers onto living digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans.  If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and RTC staff as quickly as 3 to 5 seconds from detection. Partnership with Aegix “Amidst the national rise in gun violence, schools shouldn't have to compromise on safety due to financial constraints,” said Mike Lahiff, CEO of ZeroEyes.  “We are extremely proud of our partnership with Aegix, which has enabled schools throughout Utah to afford our life-saving gun detection and situational awareness solution."

Heathrow Airport transforms security with Genetec solutions
Heathrow Airport transforms security with Genetec solutions

Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations to secure people and assets, bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. Deployed Genetec Security Centre Heathrow deployed Genetec Security Centre to bring all of its IP security systems onto one unified forum London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tons of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Heathrow initially deployed Genetec Security Centre to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic licence plate recognition (ALPR), and more. Genetec solutions Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km (93 miles) of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Software and firmware updates Genetec Security Centre supports 90 other stakeholder groups working across 110 control rooms Genetec Security Centre now supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customised dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security lines grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates.  New requirements “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”

Custom Consoles SteelBase desks chosen by Arana Security
Custom Consoles SteelBase desks chosen by Arana Security

Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops  Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture.  Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops  Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens  Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall.  Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.

AMPELMANN GmbH enhances security with ASSA ABLOY eCLIQ solution
AMPELMANN GmbH enhances security with ASSA ABLOY eCLIQ solution

The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours.  AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation.  This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably.  Easy administration, maximum security  Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access.  Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs.  AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload.  eCLIQ ensures branch security  Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY.  Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN."  Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software.  Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards.  Convincing solution  "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it."  eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.