search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
SECURITY AND ACCESS CONTROL


l Multi Date Check: Providing an extra layer of safety and security, this feature can be used to introduce additional criteria to check that a healthcare worker or contractor be allowed to continue to access specific areas. Using the CEM AC2000 interface, it is very straightforward to produce detailed reports to identify if a person’s training is up to date, or whether any certificates are close to their expiry dates. An appropriate message can also be displayed on an emerald reader’s screen to remind the person of what they need to do. Alternatively, and depending on the circumstances, the emerald terminal might refuse access, and advise the cardholder of what action they need to take to comply.


Time and attendance


For payroll purposes, the AC2000 Time Hub module provides an efficient way for administrators to efficiently capture data on the hours worked by doctors, nurses, and temporary staff, which is proving to be particularly important in a world where colleagues are increasingly having to work ad-hoc shifts. In T&A (Time and Attendance) mode, the emerald intelligent access terminals allow users to select ‘IN’ or ‘OUT’ options before swiping their card. The recorded data can then be used to generate reports via the AC2000 Time Hub reporting tools, or be automatically sent to a payroll system. In addition, although not directly relevant to security, emerald readers can be used by mental healthcare facilities for a variety of other practical purposes – including controlling use of machines, e.g. photocopiers, remotely accessing and managing meeting room bookings, and displaying visitor information.


‘Market-leading technology’ By employing software and hardware development engineers of the highest calibre, and delivering the complete security solution, CEM has maintained a track record since the 1980s of more often than not being the first to introduce significant advances in access control technology. These have included the following: l Handheld portable card readers. l Card readers with an internal database which continue to fully operate even when offline.


l POE+-enabled door controllers. l Touchscreen card readers able to run edge-based applications, in a similar way to adding ‘apps’ to a smartphone, which provide functionality that goes beyond security, e.g. Time & Attendance, Health and Safety, and a room booking system.


CEM Systems was also among the first to introduce smartcard technology in the 1990s. We intend to maintain a market- leading position by continuing to introduce new ground-breaking features which truly


30


add value. Our ongoing success will also be achieved by being vertically focused, and by integrating with the best products from the industry, as well as the wider family of Johnson Controls, to provide the right solution. Our engagement with stakeholders in each of our target market sectors, such as healthcare, is enabling us to fully understand and respond to the evolving requirements of existing and potential clients. As a result, you can expect to see a steady stream of exciting new features and functions announced over the coming months.


A proactive approach to cyber security


Regardless of the size or complexity of an access control system, the need to keep confidential data secure has never been greater. At Johnson Controls, we believe the prime responsibility for combating the efforts of opportunistic hackers or organised criminal gangs lies squarely with the manufacturers of hardware and software solutions. In this respect, the potential breach of confidentiality, and the consequential loss to our end-user clients, have fully justified the significant efforts made by design and development engineers to ensure that CEM Systems’ solutions are cyber secure.


Our Cyber Solutions Product Security Programme is designed to provide clients with peace of mind in knowing that CEM Systems has minimised the possibility of introducing vulnerabilities into access control solutions by taking a holistic approach to cyber security for physical security products. It has been developed


Philip Verner


Philip Verner is the Regional Sales director, EMEA, for CEM Systems, which is part of the security products division of Johnson Controls, ‘the global leader for smart, healthy, and sustainable buildings’. He has worked within the electronic security industry for over 20 years. Having joined CEM Systems in the late 1990s as its Sales & Marketing manager, he has led the CEM team to success in winning major access control projects throughout the EMEA region, ‘in healthcare and other mission-critical installations where security matters’.


JANUARY 2022 | THE NETWORK


with the benefit of our experience of providing many decades of high security and mission-critical solutions to government and multinational customers. It also takes on board feedback from IT, security professional, and cyber security experts to combine best practice during the product development, testing, and evaluation process, as well as configuration guidelines for compliance to protect our physical security products from attack, damage, disruption, unauthorised access, or misuse.


Independent testing


An access control device can be the weakest link in any security system, as it offers the opportunity for hackers to find a way onto an organisation’s network with the possibility of gaining access to company confidential data, disabling systems, and disrupting operations. With this in mind, in addition to the testing conducted by our Cyber Protection team, we arrange for independent testing to be conducted annually on our products, to ensure that any new firmware or software updates do not open the ‘back door’. CEM Systems, and our parent company, Johnson Controls, fully understand that a system secured today may become insecure tomorrow with the announcement of a new vulnerability. The Cyber Protection team is constantly monitoring a variety of sources, from the US National Vulnerability Database, to various media and professional sources, to identify new vulnerabilities which may impact on the cyber security credentials of our products and solutions.


The S3050 is a lightweight hand-held portable card reader for use with the CEM Systems AC2000 access control system. It can be used for ID card validation at temporary entrances or remote sites which have no power, and as a mobile device for random checks within pre-defined zones.


n


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32