Skip to main content

Access Control

The next Generation Access Control Credentials

Secure technology, easy management and lean processes to transition from old credentials.

Countering evolving security threats is now easy

Security threats continue to evolve. Technology has also matured and counters this increased risk. Yet most organizations continue to use legacy access control credentialing technologies. This presents increased vulnerabilities and the threat requires modern technology solutions that meets this dynamic threat now and in the future. Existing credentials, readers and controllers must be integrated, since replacing everything is logistics and cost prohibitive. 

How do you transition Casi-Rusco, AWID or HID prox to a modern secure reading technology?  You need a supplier that has the know-how and expertise to analyze your existing access control credentialing system and create solutions to manage the required transition.

Move your access control system to the next Era, choose deister to help you create and manage the transition to an optimally secure credentialing system.


What would you like to do?

New

Start from scratch and select the best technology for your requirements

Click here

Integrate

Keep and integrate your existing credentials and readers with new credential technology

Click here

Transition

Replace your credential system while keeping your daily operation going

Click here


Next Generation Access Control Credentialing Systems

Easy and secure Management of your Access Control System

With deister engage futureproof security; best-in-class product quality made in Germany; and fully integrated management of your system and its security. We adhere to best practices for secure encryption, to widely reviewed open standards and data protection,  and provide a new level of user convenience to employees and administrators. See benefits on the right side.

Our system design is a unique layered security approach using stringent best practices for data protection. deister uses only the current best open global standard technologies to offer the highest level of data and privacy protection such as Mifare DESFire EV1/2 (embodying AES) credentials and compliant readers; and OSDP2 as the protocol between reader and controller. Different options including smartframe, deBus and/or transparent reader mode offer additional security.

  • Secure Key Management of your system’s encryption keys, giving you complete control over the system while enabling easy management of readers and credentials
  • Mutual Authentification between the reader and the credential, providing best-in-class message integrity protection
  • Open global standards that are regularly reviewed, checked and verified by official authorities (including NIST) to offer you the most effective level of security possible
  • Proper implementation of technology and encryption embodied in a cohesive process design to avoid security breaches in the operation and management of your access control system

Smartframe® is a cryptographically protected data model for the secure storage of your user ID and further identity data. It is a portable ID that can be programmed on any credential, from ID cards, fobs or mobile credentials on your smartphone.

Readers are, by necessity, placed in unsecure areas and offer an opportunity to break into the system. Take out all sensitive information and data from the reader; embed those functions into another device which is connected via an encrypted channel to the reader but located in a secure area, that is the cipher box®. The reader then works in transparent mode, it only channels through the credential’s encrypted data to the cipher box®, which decrypts the credential data and forwards the plain data to the controller. The reader no longer creates a vulnerability.

With deister you have the flexibility to select communication protocols and present a consistent interface to the access control reader. deBus is similar but a more secure option to OSDP and also works on a RS485 interface.

Your own Cipher Card, uniquely yours

The Cipher CardTM is a unique security concept that makes management of your Access Control System easy while maintaining the highest level of security. A simple card, the Cipher Card™, replaces unstable passwords or other cumbersome security measures.

The Cipher Card™ holds your system’s unique security data and enables authorization of readers and creation of identification media or smartcards. With your very own unique Cipher Card™ you remain independent of any supplier – even from us (what other technology supplier 

The Cipher Card™ holds your system’s unique security data and enables authorization of readers and creation of identification media or smartcards. With your very own unique Cipher Card™ you remain independent of any supplier – even from us (what other technology supplier 

The choice is yours

Your Cipher Card™ will be individually created for you, and you have the following options.

You receive and manage your own Cipher Card™ yourself to enjoy maximum independence and control over your system.

deister securely keeps your Cipher Card™ for you and conveniently manages the production of ID cards and the provisioning of readers.

Project Management and Consulting

We can support you and simplify your next step in a project like defining an employee card, choosing the best secure technology, do a technical review (Hardware, Software) or evaluate new business cases and opportunities.

deister’s long-standing expertise lowers your project risks significantly, no matter if you are a system operator, system supplier or enduser of a system.

Get in touch

Migrate and Integrate your existing system

The Legacy Connect Service by deister

Your Credential technology should ensure that your cards and readers are not the weakest link in the security chain. Unfortunately, decades-old credential technology is still in use in many organizations. But, contrary to popular opinion the transition to a modern technology does not have to be difficult nor impose a huge cost. We are true experts in RFID, having invented or co-invented many of today’s popular RFID standards and protocols such as Mifare, OSDP, Casi-Rusco, OSS and many more. That helps us to help you migrate from old technologies to a modern secure and cost-effective technology.

With our Legacy Connect Service we help you find the best cost-effective way to upgrade your access control system from where it is now to where you want it to be:

Cards

We consult with you to choose the best secure credential technology for your security profile and show you how to implement the processes of credential management and credential production properly to avoid security breaches.

Our Triple Technology™ readers support a seamless transition to a new credential technology where old credentials can either be updated on the go through our readers or exchanged during normal operation of your organization while old credentials are still being used in parallel.

Mobile Credentials

The future is now. Integrate Mobile phones and use our trusted cloud services to make your access control system future proof. All our current reader and wireless readers offer Bluetooth connectivity and we offer retrofit adapters to enable existing readers to communicate via Bluetooth as well. 

Download PDF

Readers

Our Infinity Readers™ are Triple Technology™ readers which can read up to 3 different reading technologies. Thus both card credentials and mobile credentials can be used with the same reader. Also Triple Technology™ supports the seamless transition from old to new technology without interrupting your daily operation. Infinity Readers™ may be the last readers you’ll ever need.

Download PDF

deister Cloud

deisterCloud serves new mobile services like sharing economy, mobile access, system as a service or remote management. It’s a new generation of services that enables smartphones or smartwatches to become anything: a door opener, a management tool for smart storage, your credential to get access to an asset, a gate opener and much more.

Mobile credentials which contain the user’s access rights are securely generated in the deisterCloud and can be brought onto smart devices – at the touch of a button.

Part of deisterCloud is the deisterTrustcenter, which is a trusted cloud service for the secure creation and instant deployment of

mobile credentials onto smart devices. It is a security enabler for any of those mobile services and addresses their current and future need for security against hacker attacks or cybercrime.

All the rights of a contactless card or any other kind credential can be brought onto mobile devices in one smart app: deisterWallet. This is the central app for all mobile credentials, hosting all of the user’s access rights to services, doors or other devices.

deisterWallet features secure connection to the deisterCloud and the devices, also supporting offline mode in case connection to the network is interrupted.

Infinity Readers™

Our Infinity Reader™ series are Triple Technology™ readers, that can read 125kHz, 13.56MHz and provide an extra interface for a third reading technology of choice, e.g. Bluetooth. 

All Infinity Readers™ support remote firmware updates. Furthermore, also new sets of custom encryption keys and interface configurations can also be remotely uploaded to the reader – even when the reader is already installed and in operation.

Since technology is advancing rapidly it is vital to have a flexible reader that provides interfaces and options to remain futureproof. The Infinity Reader™ series with its support for various parallel reading technologies and an open interface to connect a third (future) technology enable your access control system to stay future proof, it may be the last reader you will ever need.
 

Learn More Download Flyer


Wireless readers

Strong mechanical designs, very long battery life of up to 5 years and a modular technology concept that allows adaptation of future reading technologies make our wireless readers the best choice for reliable operation and quick return on invest.

The large portfolio of different formats makes it easy to choose the best solution for any door. The portfolio covers everything from handles, locks, cylinders, server rack handles to wireless reader modules. Different operating modes such as deister Cardnet (data stored on card) or deister Local Data (data stored in wireless reader) allow to integrate the wireless readers to best suit your requirements.

 

Learn More Download Brochure


One Standard - OSS

As one of the founding members we support and help to develop the strong open standard for wireless access control. From our software, ID cards, wireless locks to online readers we are fully compliant with OSS.

If you have multiple sites, maybe even in several countries and want one standard to manage it all even across several suppliers? Then OSS might be the right choice for you. 

With deister and OSS youhave the best of both worlds: deister‘s renown product quality and the independence of an open standard.

 

More about OSS

References

Hoffnungsgemeinde Barsinghausen

Hoffnungsgemeinde Barsinghausen

To improve the effectiveness, transparency and security, the Hoffnungsgemeinde Community Centre in Barsinghausen has opted for modern key management and intelligent access control.

Intelligent tailor-made building security

Intelligent tailor-made building security

The Hafven – Hanover’s innovative, combined co-working space with its Maker Area – relies on an intelligent and comprehensive single source security solution from deister electronic. 

Community housing Vienna

Community housing Vienna

Together with GemiTeam and ACONDA Systems, a complete electronic access control solution with scheduling for all laundry rooms of the Viennese housing association was realized.

Project Inquiry

Project Inquiry (EN)

Project Inquiry (EN)