Mercury Open Access Hardware Examined

By: Brian Rhodes, Published on Jul 15, 2013

Everyone wants an "open" access platform, yet no one delivers... or do they? One of the biggest names in access control is one most end-users rarely hear mentioned but widely used. Mercury Security's entire portfolio is composed of open hardware, and in theory, can be reused when changing between platforms. In this note, we look at Mercury's openness and interoperability in the access market, and identify where the issue gets cloudy: Just how far does "openness" go?   

Mercury's Fit

A sizeable swath of EAC vendors purchase hardware from, or design systems to work with, Mercury hardware. The company does not sell it's own brand to end users, rather instead focusing on OEMing equipment for vendors who use  Mercury's API [link no longer available] to customize software interfaces to the equipment. The standard hardware offering to OEMs includes a handful of products, notably the EP2500 and EP150x controllers, and the MR5e single door interface panel:

Other Mercury SKUs exist, including other interface panels and the M5 Casi-Rusco "Bridge" controller board, but regardless of their rebranding, all hardware is the same, including the same firmware.  This is the cornerstone of Mercury's "Open Hardware" identity - regardless of vendor, the hardware behaves the same way and interfaces with software using the same framework.

Powered vs. Authentic

While Mercury's marketing and branding is not targeted at end users, the way the company applies branding labels denotes significant differences. For example, both "Mercury Powered" and "Mercury Authentic" are referenced by the company's partners, but they denote distinct OEM relationships:

  • "Authentic Mercury": This tag denotes a partner company uses both Mercury Hardware and firmware in its access platform.
  • "Mercury Powered": However, this tag indicates that only Mercury firmware is being used with hardware designed and manufactured by others. Notable examples of this include Keri Systems [link no longer available], and the Ingersoll-Rand PIM400-1501 used with AD series door locks. The advantage of using Mercury's embedded firmware to power hardware is that the hardware is instantly interoperable with a vast number of access control systems.

While 'Authentic Mercury' hardware is interchangeable and available for a number of resellers, 'Mercury Powered' hardware is typically fixed to a specific part number from a specific provider. Take for example the IR PIM400-1502; While the firmware is interoperable, the hardware is exclusive to Schlage AD series wireless locks.

Interestingly, while discussions of access interoperability standards are heating up, Mercury has become a 'defacto' interoperability standard through growth of it's own market share. However, unlike a true 'interoperability' standard, "Mercury Powered" is licensed by the company and not composed of a consortium of many vendors.

Platform Differentiation

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Even when systems use the same Mercury controllers, this does not guarantee that every vendor writes software to support the same operations. Features like 'anti-passback' controls or alarm monitoring notification are solely dependent on the software vendor to implement, and even if the hardware is interchangeable, the platform differs.

Features supported by Mercury hardware, but not always supported by access vendors include:

Software Integration

Not every EAC vendor using Mercury hardware supports every hardware part number. While the hardware may technically work, if the EAC vendor does not support the specific controller or interface model, it can put the end user at risk when seeking technical support.

Mercury's Partners

Aside from the list of Mercury's largest OEM Partners (see: Mercury's "Platnium Partner" Roster), there are numerous other players that also are interoperable or use the company's hardware. A recent discussion topic listed several of these names, including S2, Stanley/Best, Tridium Framework (Honeywell), and Imron [link no longer available].

 

11 reports cite this report:

ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open Options line for best customer fit, key features, pricing, and main...
Allegion Acquires Isonas on Jun 29, 2018
Isonas failed to 'revolutionize' access control as they regularly claimed. Now, nearly 20 years after their founding, they are being acquired by...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the most widely used access hardware OEM, and partner to 20+ manufacturers,...
ONVIF Releases Profile A for Access on Aug 08, 2017
ONVIF has struggled so far in access control. In 2014, ONVIF released Profile C for access control, but in the 3 years since, only 2 companies...
Manufacturer Revenue / Financials Directory on Jun 05, 2017
This report contains data on the revenue of 32 security manufacturers, trend analysis of whether they are gaining or losing ground and commentary...
Feenics Hosted Access Control Tested on Jul 07, 2016
In the access market, new entrants are uncommon. Because of that, newcomer hosted access vendor Feenics has gained the curiosity of many. A...
AMAG President Becomes Mercury President on Jun 02, 2016
The head of one of the industry's most notable access control manufacturers has become the head of the industry's most widely used open access...
RS2 Access Control Company Profile on Jan 13, 2016
Inside we examine RS2 Technologies Access It! line for best customer fit, key features, pricing, and main weaknesses. Profile RS2 is a US access...
Brivo Bought Out by Drako for $50 Million on Jun 11, 2015
One man is betting $50 million on hosted access control. Dean Drako [link no longer available], who has been investing millions into building a...
Axis Admits Access Control Expectations Low on Oct 17, 2014
Axis entrance into access control had been anticipated for years. Last year, Axis access control launch was the biggest news of the season. What...
Comments (4) : Members only. Login. or Join.

Related Reports

Low-Tech Access Control: Master Keying Explained on Jan 09, 2020
Mechanical keys are one of the most fundamental forms of access control. 'Master Keying' can allow individually different credential keys to...
Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...
Axis Door Station A8207-VE Tested on Aug 07, 2019
Axis newest door station, the A8207-VE, claims to deliver "video surveillance, two-way communication, and access control" in a single device. But...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Airship VMS Profile on Apr 03, 2019
Airship has been developing VMS software for over 10 years, however, with no outside investment, and minimal marketing, the company is not well...
Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...
Milestone Machine Learning Camera Auto-Setting Examined on Mar 13, 2019
Milestone wants to improve image quality using Machine Learning to solve the problem of "a camera doesn't know what it is being used for",...
Arcules Favorability Results 2019 on Mar 08, 2019
Arcules has amazing advantages. Tens of millions of funding from Canon. Unlimited access to Milestone's source code (see our test results). But...
Throughtek P2P/Cloud Solution Profile on Nov 15, 2018
Many IoT manufacturers either do not have the capabilities or the interest to develop their own cloud management software for their devices....
Google Found Software House Vulnerability Allows Inside Attacker To Open Doors on Sep 04, 2018
A vulnerability in Software House IP-ACM modules allows an attacker to potentially unlock doors, or perform other actions, on affected systems....

Most Recent Industry Reports

Access Control Online Show - July 2020 - With 40+ Manufacturers - Register Now on Jul 01, 2020
IPVM is excited to announce our July 2020 Access Control Show. With 40+ companies presenting across 4 days, this is a unique opportunity to hear...
Hanwha Face Mask Detection Tested on Jul 01, 2020
Face mask detection or, more specifically lack-of-face-mask detection, is an expanding offering in the midst of coronavirus. Hanwha in partnership...
UK Government Says Fever Cameras "Unsuitable" on Jul 01, 2020
The UK government's medical device regulator, MHRA, told IPVM that fever-seeking thermal cameras are "unsuitable for this purpose" and recommends...
Camera Course Summer 2020 on Jun 30, 2020
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training...
Worst Over But Integrators Still Dealing With Coronavirus Problems (June Statistics) on Jun 30, 2020
While numbers of integrators very impacted by Coronavirus continue to drop, most are still moderately dealing with the pandemic's problems, June...
FLIR Screen-EST Screening Software Tested on Jun 30, 2020
In our FLIR A Series Test, the cameras' biggest drawback was their lack of face detection, requiring manual adjustment when screening each...
Dahua Buenos Aires Bus Screening Violates IEC Standards and Dahua's Own Instructions on Jun 30, 2020
Dahua has promoted Buenos Aires bus deployments as "solutions that facilitate community safety". However, they violate IEC standards and,...
UK Firm Markets False Fever Screening, Hikvision Disavows on Jun 30, 2020
A UK security firm falsely claimed its Hikvision-based thermal solution could be used for "accurately detecting fever in any person", even claiming...
Industry Study: 83% of US Temperature Screening Sellers Falsely Say Not Medical Devices on Jun 29, 2020
83% of US companies selling temperature screening devices, aka 'fever' detectors, claim they are not medical devices, contrary to FDA definition,...
Manufacturers on Virtual 'ISC West' 2020 and Potential ISC West 2021 on Jun 29, 2020
With the 2020 ISC West show now officially canceled, attention turns to Reed's new "ISC West 2020 Virtual Event" planned for October and for the...