Mercury Open Access Hardware Examined

By: Brian Rhodes, Published on Jul 15, 2013

Everyone wants an "open" access platform, yet no one delivers... or do they? One of the biggest names in access control is one most end-users rarely hear mentioned but widely used. Mercury Security's entire portfolio is composed of open hardware, and in theory, can be reused when changing between platforms. In this note, we look at Mercury's openness and interoperability in the access market, and identify where the issue gets cloudy: Just how far does "openness" go?   

Mercury's Fit

A sizeable swath of EAC vendors purchase hardware from, or design systems to work with, Mercury hardware. The company does not sell it's own brand to end users, rather instead focusing on OEMing equipment for vendors who use  Mercury's API to customize software interfaces to the equipment. The standard hardware offering to OEMs includes a handful of products, notably the EP2500 and EP150x controllers, and the MR5e single door interface panel:

Other Mercury SKUs exist, including other interface panels and the M5 Casi-Rusco "Bridge" controller board, but regardless of their rebranding, all hardware is the same, including the same firmware.  This is the cornerstone of Mercury's "Open Hardware" identity - regardless of vendor, the hardware behaves the same way and interfaces with software using the same framework.

Powered vs. Authentic

While Mercury's marketing and branding is not targeted at end users, the way the company applies branding labels denotes significant differences. For example, both "Mercury Powered" and "Mercury Authentic" are referenced by the company's partners, but they denote distinct OEM relationships:

  • "Authentic Mercury": This tag denotes a partner company uses both Mercury Hardware and firmware in its access platform.
  • "Mercury Powered": However, this tag indicates that only Mercury firmware is being used with hardware designed and manufactured by others. Notable examples of this include Keri Systems, and the Ingersoll-Rand PIM400-1501 used with AD series door locks. The advantage of using Mercury's embedded firmware to power hardware is that the hardware is instantly interoperable with a vast number of access control systems.

While 'Authentic Mercury' hardware is interchangeable and available for a number of resellers, 'Mercury Powered' hardware is typically fixed to a specific part number from a specific provider. Take for example the IR PIM400-1502; While the firmware is interoperable, the hardware is exclusive to Schlage AD series wireless locks.

Interestingly, while discussions of access interoperability standards are heating up, Mercury has become a 'defacto' interoperability standard through growth of it's own market share. However, unlike a true 'interoperability' standard, "Mercury Powered" is licensed by the company and not composed of a consortium of many vendors.

Platform Differentiation

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Even when systems use the same Mercury controllers, this does not guarantee that every vendor writes software to support the same operations. Features like 'anti-passback' controls or alarm monitoring notification are solely dependent on the software vendor to implement, and even if the hardware is interchangeable, the platform differs.

Features supported by Mercury hardware, but not always supported by access vendors include:

Software Integration

Not every EAC vendor using Mercury hardware supports every hardware part number. While the hardware may technically work, if the EAC vendor does not support the specific controller or interface model, it can put the end user at risk when seeking technical support.

Mercury's Partners

Aside from the list of Mercury's largest OEM Partners (see: Mercury's "Platnium Partner" Roster), there are numerous other players that also are interoperable or use the company's hardware. A recent discussion topic listed several of these names, including S2, Stanley/Best, Tridium Framework (Honeywell), and Imron.

 

12 reports cite this report:

ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open Options line for best customer fit, key features, pricing, and main...
Allegion Acquires Isonas on Jun 29, 2018
Isonas failed to 'revolutionize' access control as they regularly claimed. Now, nearly 20 years after their founding, they are being acquired by...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the most widely used access hardware OEM, and partner to 20+ manufacturers,...
ONVIF Releases Profile A for Access on Aug 08, 2017
ONVIF has struggled so far in access control. In 2014, ONVIF released Profile C for access control, but in the 3 years since, only 2 companies...
Manufacturer Revenue / Financials Directory on Jun 05, 2017
This report contains data on the revenue of 32 security manufacturers, trend analysis of whether they are gaining or losing ground and commentary...
Feenics Hosted Access Control Tested on Jul 07, 2016
In the access market, new entrants are uncommon. Because of that, newcomer hosted access vendor Feenics has gained the curiosity of many. A...
AMAG President Becomes Mercury President on Jun 02, 2016
The head of one of the industry's most notable access control manufacturers has become the head of the industry's most widely used open access...
RS2 Access Control Company Profile on Jan 13, 2016
Inside we examine RS2 Technologies Access It! line for best customer fit, key features, pricing, and main weaknesses. Profile RS2 is a US access...
Axis vs HID vs Mercury Access Controllers on Jul 06, 2015
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Historically,...
Brivo Bought Out by Drako for $50 Million on Jun 11, 2015
One man is betting $50 million on hosted access control. Dean Drako, who has been investing millions into building a cloud video startup, Eagle...
Axis Admits Access Control Expectations Low on Oct 17, 2014
Axis entrance into access control had been anticipated for years. Last year, Axis access control launch was the biggest news of the season. What...
Comments (4) : PRO Members only. Login. or Join.

Most Recent Industry Reports

Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
New GDPR Guidelines for Video Surveillance Examined on Jul 18, 2019
The highest-level EU data protection authority has issued a new series of provisional video surveillance guidelines. While GDPR has been in...
Anyvision Aims For 2022 Revenue of $1 Billion on Jul 17, 2019
Only 3 video surveillance manufacturers do a billion dollars or more in annual revenue - Hikvision, Dahua, and Axis. Now, Anyvision plans to join...
HD Analog vs IP Guide on Jul 16, 2019
For years, HD resolution and single cable signal/power were IP camera advantages, with analog cameras limited to much lower resolution and...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
ZeroEyes Gun Detection Startup on Jul 16, 2019
A gun detection video analytics startup, ZeroEyes, is being led by a group of 6 former Navy SEALs, aiming to "save lives" by using AI to assist...
Motorola Acquires Watchguard, Adds to Vigilant And Avigilon on Jul 15, 2019
2 years ago, Motorola had no position nor relevancy to video surveillance. Now, they own major video surveillance, LPR and body camera providers...
Hikvision Global News Reports Directory on Jul 15, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Vivotek Trend Micro Cyber Security Camera App Tested on Jul 15, 2019
Vivotek and Trend Micro are claiming five million blocked attacks on IP cameras, with their jointly developed app for Vivotek cameras. This new...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact