Mercury Open Access Hardware Examined

By: Brian Rhodes, Published on Jul 15, 2013

Everyone wants an "open" access platform, yet no one delivers... or do they? One of the biggest names in access control is one most end-users rarely hear mentioned but widely used. Mercury Security's entire portfolio is composed of open hardware, and in theory, can be reused when changing between platforms. In this note, we look at Mercury's openness and interoperability in the access market, and identify where the issue gets cloudy: Just how far does "openness" go?   

Mercury's Fit

A sizeable swath of EAC vendors purchase hardware from, or design systems to work with, Mercury hardware. The company does not sell it's own brand to end users, rather instead focusing on OEMing equipment for vendors who use  Mercury's API [link no longer available] to customize software interfaces to the equipment. The standard hardware offering to OEMs includes a handful of products, notably the EP2500 and EP150x controllers, and the MR5e single door interface panel:

Other Mercury SKUs exist, including other interface panels and the M5 Casi-Rusco "Bridge" controller board, but regardless of their rebranding, all hardware is the same, including the same firmware.  This is the cornerstone of Mercury's "Open Hardware" identity - regardless of vendor, the hardware behaves the same way and interfaces with software using the same framework.

Powered vs. Authentic

While Mercury's marketing and branding is not targeted at end users, the way the company applies branding labels denotes significant differences. For example, both "Mercury Powered" and "Mercury Authentic" are referenced by the company's partners, but they denote distinct OEM relationships:

  • "Authentic Mercury": This tag denotes a partner company uses both Mercury Hardware and firmware in its access platform.
  • "Mercury Powered": However, this tag indicates that only Mercury firmware is being used with hardware designed and manufactured by others. Notable examples of this include Keri Systems [link no longer available], and the Ingersoll-Rand PIM400-1501 used with AD series door locks. The advantage of using Mercury's embedded firmware to power hardware is that the hardware is instantly interoperable with a vast number of access control systems.

While 'Authentic Mercury' hardware is interchangeable and available for a number of resellers, 'Mercury Powered' hardware is typically fixed to a specific part number from a specific provider. Take for example the IR PIM400-1502; While the firmware is interoperable, the hardware is exclusive to Schlage AD series wireless locks.

Interestingly, while discussions of access interoperability standards are heating up, Mercury has become a 'defacto' interoperability standard through growth of it's own market share. However, unlike a true 'interoperability' standard, "Mercury Powered" is licensed by the company and not composed of a consortium of many vendors.

Platform Differentiation

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Even when systems use the same Mercury controllers, this does not guarantee that every vendor writes software to support the same operations. Features like 'anti-passback' controls or alarm monitoring notification are solely dependent on the software vendor to implement, and even if the hardware is interchangeable, the platform differs.

Features supported by Mercury hardware, but not always supported by access vendors include:

Software Integration

Not every EAC vendor using Mercury hardware supports every hardware part number. While the hardware may technically work, if the EAC vendor does not support the specific controller or interface model, it can put the end user at risk when seeking technical support.

Mercury's Partners

Aside from the list of Mercury's largest OEM Partners (see: Mercury's "Platnium Partner" Roster), there are numerous other players that also are interoperable or use the company's hardware. A recent discussion topic listed several of these names, including S2, Stanley/Best, Tridium Framework (Honeywell), and Imron [link no longer available].

 

11 reports cite this report:

ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open...
Allegion Acquires Isonas on Jun 29, 2018
Isonas failed to 'revolutionize' access control as they regularly...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the...
ONVIF Releases Profile A for Access on Aug 08, 2017
ONVIF has struggled so far in access control. In 2014, ONVIF released...
Manufacturer Revenue / Financials Directory on Jun 05, 2017
This report contains data on the revenue of 32 security manufacturers, trend...
Feenics Hosted Access Control Tested on Jul 07, 2016
In the access market, new entrants are uncommon. Because of that, newcomer...
AMAG President Becomes Mercury President on Jun 02, 2016
The head of one of the industry's most notable access control...
RS2 Access Control Company Profile on Jan 13, 2016
Inside we examine RS2 Technologies Access It! line for best customer fit, key...
Brivo Bought Out by Drako for $50 Million on Jun 11, 2015
One man is betting $50 million on hosted access control. Dean Drako [link no...
Axis Admits Access Control Expectations Low on Oct 17, 2014
Axis entrance into access control had been anticipated for years. Last year,...
Comments (4) : Members only. Login. or Join.

Related Reports

Avigilon Open Analytics Tested on Apr 16, 2020
After years of effectively closed analytics, Avigilon decided in late 2018 to...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...
Milestone Presents XProtect On AWS on May 04, 2020
Milestone presented its XProtect on AWS offering at the April 2020 IPVM New...
Avigilon Face Mask Detection Tested on Jun 24, 2020
Face mask detection or, more specifically not wearing a face mask, is an...
Clinton Public View Monitor (PVM) Mask Detection Tested on Jul 09, 2020
Face mask detection, or more specifically not wearing one, is expanding...
Dahua USA Admits Thermal Solutions "Qualify As Medical Devices" on Jul 02, 2020
Dahua USA has issued a press release admitting a controversial point in the...
Herta Facial Recognition Plus Masks Tested on Aug 19, 2020
Masks increase face recognition errors, but facial recognition developer...
Fever Camera Sales From Integrators Surveyed on Jun 01, 2020
Fever cameras are the hottest trend in video surveillance currently but how...
IPConfigure Presents Orchid Fusion VSaaS on Apr 30, 2020
IPConfigure presented Orchid Fusion VSaaS at the April 2020 IPVM New Products...
Face Masks Increase Face Recognition Errors Says NIST on Aug 04, 2020
COVID-19 has led to widespread facemask use, which as IPVM testing has shown...
Dynamic vs Static IP Addresses Tutorial on Apr 16, 2020
While many cameras default to DHCP out of the box, that does not mean you...
Add Door Operators To Fight Coronavirus on Mar 31, 2020
IPVM recommends that integrators advocate and end-users consider adding door...
Meditherm Medical Thermal Cameras Examined on May 07, 2020
US-based Meditherm emphasized to IPVM its 20+ year development history and...
Smartphone Thermal Camera Body Temperature Measurement Tested (FLIR / Seek) on Apr 10, 2020
Thermal cameras have exploded in popularity due to coronavirus, but can...

Recent Reports

IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Norway Ethics Councils Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
Today is your last chance to save $50 on registration for the Fall 2020 Video...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...
China Bems Temperature Measurement Terminal Tested on Sep 22, 2020
Guangzhou Bems (brand Benshi) is the manufacturer behind temperature...
Axis Exports To China Police Criticized By Amnesty International on Sep 21, 2020
Axis Communications and other EU surveillance providers are under fire from...
Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Axis Compares Fever Camera Sellers to 9/11 on Sep 18, 2020
Axis Communications, the West's largest surveillance camera manufacturer, has...
Avigilon Elevated Temperature Detection Camera Tested on Sep 17, 2020
Avigilon has entered the temperature screening market with the release of...
Chilean Official Investigated for Motorola And Hikvision Contracts on Sep 17, 2020
A corruption investigation is underway in Chile after a crime prevention...
Huawei HiSilicon Production Shut Down on Sep 17, 2020
Huawei HiSilicon chips are no longer being manufactured or supplied to...
Virtual ISC West and GSX+ Exhibiting Contrasted on Sep 17, 2020
Both ISC West and ASIS GSX are going virtual this year, just weeks apart, but...