Salto Access Control Reviewed

Author: Brian Rhodes, Published on Aug 07, 2013

Salto's access control system, using credential based networking, claims to be at least 50% less expensive than traditional access control offering. While the company's strongest market has traditionally been Europe, the company is pushing into the Amercias and beyond. Will Salto's credential based networking disrupt the access control market? In this note, we examine the company and weigh its strengths and weaknesses.

*****'* ****** ******* ******, ***** ********** ***** **********, ****** ** be ** ***** **% **** ********* **** *********** ****** ******* offering. ***** *** *******'* ********* ****** *** ************* **** ******, the ******* ** ******* **** *** ******** *** ******. **** Salto's ********** ***** ********** ******* *** ****** ******* ******? ** this ****, ** ******* *** ******* *** ***** *** ********* and **********.

[***************]

********

*** ******* ***** **** ************* ****** ****** *** *** ** *********** ** * '******* *******'. ** will *** **** *** *********** ** *** ******, *** ******** the ************'* ***** ***** ******** * **** ********:

Key ******

*** '**** **-****' ****** *** ******* *********** ******** ** '***********' hardwired ****** *******:

  • ****** ********* ****:***** *** ********** **** ****** ****** ****** ***********, ******** ** that **** ******* *** ****** *** ** *** ****-*** ******** use *** ******** ** ****** ****** * ******** *** ************ of ********/******* ***** ** ******.
  • (******) *******:*** ******** ** **** ***** *** ** **** ******* *** powered ** *********, **** **** * *** ********* ****** '*******' control ***** ** '***** ****' ** *** **** *** ********** system. 
  • ****** *******:****** ************* *******, **** ******* *** **** ***** ** ******** schedules, *** ****** ** **** ****'* **** *** ************ ****** to ********** *****, **** **** ***** ******* *** *** ******* to *** ******** ****'* **.
  • ***********:******* *********** ****** ************** ** *** ********* (**: ***********, **********, cabling, ***** ********), * ***** ****** ** **** ********* **** those *********. ** ***** **** ***** ***** ** * ******* below.

***** ***** *********** ** **** ******* *** ****** ******** ***** are ********, *** *** ***** **** *** ********** **** ** 'read/write' ***** ** ****** *** ***** ****** * ****** ** where ** ******* ******** ** ***** *******.

System ******

***** ********** ******* * '*******', ** * ***** (******) ********** placed ** ******* *********. ***** ** ****** *** ****** ****** to **** ******* ** **** **** ** **** ***** * facility.

 

*** ******* ****** ** *** **** **** ***** ******** *******:

  • *******:*** ****'* ********** ** ******* ** ***** *** ******* **/**/** hour ******. ***** ************* ****** ***** * ************* ****, ** lost ** ****** ***** *** ************* ***********.
  • **** ****** *****/*********:******* ** **** ****'* ****** ****** *** ****** ** *** hotspot, ******** ******* ** ********* ***********.
  • ****** **** *******:** *****/***** **** **** ****** *** ** ******** ** *** system, ***** ******* *** ****** ** **** ********** *** ********** push ** **** *****.

*******, ******* ***** *** ****** *** ****** **** *** ***** as ****:

  • ***** *****:* **** **** ******* **'* ******* ** ****** ** **** card, *** *** **** ***** **** ******* **** ** *** head *** ** **** *******.
  • ******* ******:*** ***** ***** *** ******* *******. ** *** ******* ***** is *** ** * ********** ****, ** ***** ****** *** door's ** ** ****** ** *** ****, *** *** **** uploads **** ***** ** *** *******.

**** *****, **** **** ** *** ****** **** ** ********* with * ***** ******** *******. **** ******** ********* ******** ******** ******** on *** ****, *** ******** * ******, *******, *** ******** hardware, *** **** *** ******* ********** *****. *** ******** ** battery ******* *** ********* *******. *******, ******* ***** *** ********* as '******' ****** ***** * *********** ****** ***********.

Retrofit *********

**** ******** *********** ** *** ****** ********. ***** ****** *********** 'retrofit *****' *** *** *** ******* ******** **** **** **** devices *** ******* ***** *****. *******, ********* **** ** *** Salto ****** ******* *** ********* *** ********** ****:

Credential *******

***** ***** *** ***********, *** *** **** *** ************ **** Salto *** *** ** * ******. *******, *********** *** ********** with *** ***** **** *******, ********* ******, ******, *** *******. Systems ***** **** ******** ****** *** ** ********** ** **** with ***** ******* (**: ******* ******, ********* *******) *** ***** credentials *** ** **** *** ***** ************.

*******

***** ****** **** *** ******** *** ** *** ********** ********** much ** *** ************** ********* ****** ** ** ****** ******* system. 

  • ********:*****'* ********** ******** ****** **** ~$**** - $****, ********* ** ************ online ********. *** ***** ****** ******* ******** **** ****** ******, while *** **** ****** ***** ** ********* ******.
  • ********:*** **** ** '******* *****' ****** ******* ~$*** *** ~$****, based ** ******* ** *** **** *** ********* **** ********** and ***** ********.  ***** ******** *********, **** ** *** ******** support *** *****.
  • ********:**** ***** ******** **** **** **** $****, **** ** ******* of ~$***. **** ** ****** ** ********** ******, ****** ******* compatibility, *** ****** **** **** (**: **** ******, ******, ** padlocks)
  • **** *********:******** ********* *** ****** ** ~$***, *** **** ********* ******** as ********** (*******) *****.
  • ***********: ***** ******** ***** ***** ** ***** ******* ~$*.** - $12.50/ ****, **** *** **** ********* ****** ***** *** ******.

***** ****** * ******* *** **** ******** ** *** ********, although ******** ******** ******* *** ** *********.

Comparative *****

********** **** ***** *** * ***** ****** **** ***** ******* $800 - $**** *** ****. ** **********, **** '********' ****** systems ***** ******* $**** - $**** *** ****, ******* ******* cost ******* ** ***********.

** **********, ***** *********** *** ****** *** **** **** ******* offsets. *** *******, *****'* ****** **** ***** ~$**.**, ***** *** specific ************ ****~$*.** ****.

******* ** * ******** ******** ** *****'* ******, **** *** average **** ******* ~**% - **% **** *** ****. ***** offers *** ******* ** ******* ***** ******* *** ******* ** expanding ***** *** **** ********.

*********

*******, *** ****** **** *** ** *** ***** ****** *** all ************. ******* ******* ********* *******:

  • ** **** ***** ******:* ********* *********** ** **** ***** ********** ******* ********** ***** from *** ********** *****. ***** **** *** **** **** ** a ***** *** ** ****** ********** **** *** ** *******, traditional **** ********* ***** ******* ******** ********** *** * ****** method ** ***** ****** *** ****** ****** ****.
  • ** ******** *******:******* *** **** ** **** ******* **** ** ********** **** a ****, ******** **** '******** ********' ** *** ***** *** not ******** **** ******* *******.
  • **** ** ********:*****'* *********** **** ****** *** **** ******, *** ***** ****** expansion **** ***** ******* *** ***** ******* **** ***** ***** in *** **** ******, *** ******* ** ***** *******. ************, tech *******, *** ***** ******* *** *** ** ******* *** in *** *******. ******** ** ********* *** *********, ***** ** still ********** ******* ** **** **********, **********, *** ***********.

Hotel ***** ******

** **** ****, *****'* ****** *** ** ******** ** *****-**** access, ***** *** ********** ******* **** *** *********** ** **** instructs * **** ******* ** *** ** ****. **** ******* rely ** *** ********** ** ****** *** ******** ** *** lock, **** *** *******, *** **** **** ** ******* *****. For **** *******, *** ******** ****** *************.

*******, *****'* ****** ****** *** ********** **** *** *********** ***** system, *******:

  • ******** *************:* ***** ****** ******** ********** ******** ******** **** ** * specific ******, ***** ***** ***** ************ ** ******** ******** **** using *** '***' ****** *****.
  • ****-***** *************:*****'* ****** ******* *** **** *** '*****' ****** ** *** credential, ****** ********* ********** **** *** ******* ** ******* ***** attempts. * ***** ****** **** '******' ******** ** *** **** and ***** ** ** ******* **** ** *** **********.
  • ********** ******:**** ***** ******* *** *********** ******* ** ********* *****, ***** on ****. ***** *** *****-*** **** ** ******* ********* ***** make ***** *** *********** ****** ***********, ********** ****** ******* *** durable *********** **** *******, *** *********** **** ******* *** ***** sizable ******* ** ****.

Comments (12)

Another drawback is if Bob's card needs to be invalidated, unless someone immediately goes to the stand alone lock and updates it, you have to wait for someone with the invalidation information to make it to the lock, whereby in the meantime someone with Bob's card can still enter the door.

Otherwise, I still thought it was kind of neat.

wow points are very small

(disclosure: we distribute an access control system that is fully integrated to Salto)

[MODERATOR'S NOTE: The platform is ICT]

Salto integrates with a few "full online" access control systems to make a powerful "hybrid" solution.

The perimeter doors and the mission-critical doors, where live control is required (for lockdown, for example), are controlled through the "full online" system.

The lower security doors (those that typically would not have been outfitted with access control at all) could use Salto locks since the cost is much lower than with online doors. An example of this would be the classroom doors in a college.

That way, you get the benefit of electronic access control on a larger amount of doors (traceability of events, doors locked 24 hours a day, access limited by rights that can change very simply) than you would typically get on an "full-online-only" system.

With a hybrid (or integrated) solution, all of the events that happen offline are transported on the User's cards until they get to an online "hotspot" reader: the events are then retrieved from the smart card (Mifare, DESFire) through the online reader and transferred into the "full online" system's database. You can go through and report on offline events just like you could with online events.

In the above integration, Salto's software platform is not even used, all of the programming (including all of the programming of the offline doors) is done through the online system's user interface.

Integrated applications that we've done:

Mines (the Salto doors are on the residential portion - the miner's dwellings)

Schools/universities

Condominium buildings (perimeter/parking/elevator are online; individual suites are Salto)

What happens when you return from a 2 week vacation, your work involves travel or you are sick? Is your card assumed lost after 48 hours? How can this be handled best.

Robert,

I only have a basic level of understanding of the Salto products but from what I know, you can program the card's access rights to expire after a certain amount of time (let's say 48 hours). When the card User comes back to the site after his vacation, he will pass through a perimeter door equipped with an "online Hotspot" reader that will then instantaneously give him his access rights for the next 48 hours. His card will not work on any door until he presents the card to this (there would often be more than one) hotspot reader to have the card reactivated.

The hotspots are strategically placed on the site to minimize bothering the card User (so it would typically be on a choke-point door such as the front door or an employee entrance where the User MUST pass through to get inside the site).

I also know that you can turn this "expiration" completely off on the card or even on a specific reader.

Hello, Mark:

Will you disclose the platform you distribute? It would clarify your earlier response, and because it is relevant and non-promotional in the context of this post, it would be helpful to know.

Thanks,

@ Robert:

The automatic invalidation of credentials can be turned off entirely, but you can also move cards to a 'vacation period' where they are turned off for the duration of a vacation, but then reactivated once that period ends.

Of course, Salto, like most EAC platforms, wants to be a 'power application' that even HR is updating multiple times per day, so reclassifying users based on their vacation schedules may be a bit much...

Hi Brian, I have no problem giving the access platform we distribute- it is ICT. (Salto partnership announcement)

If you want any additional information, let me know, I'm quite technical.

I think CoreStreet tried this several years ago, with their "card-connected" concept, before turning their efforts towards FIPS and becoming part of HID (and Phil Libin heading west to start Evernote).

It will be interesting to see if this concept gains traction, and if so, in what markets.

Does anyone care to update on Salto for 2017-18 ?

We are considering it for a 64 unit condominium with one door currently controlled.

We are about halfway through our first Salto data-on-card installation in downtown Dallas; about 300 doors total.

This is a mixed-use development with a residential tower, commercial office tower, some retail, and common areas, parking, etc.

We are using a very attractive Salto product called the A Element; it's a mortise lock with a very small reader component that mounts above the lock handle, as shown here:

This application didn't want any keys on the exterior of the door at all, as you can see.

With the doors properly prepped, it's a very quick installation. We are placing the 'update' readers at common points of entry, in the elevators, etc., to have a really strong chance of 'updating' a card before a resident can get to the unit.

We really like it.

Hope that helps,

Greg

Thank you Greg! We are now working on getting trained in three weeks and

we believe this could provide more competitive advantages to other quotes.

Anyone with anything else to add or detract, feel free.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
Vivotek 12MP Fisheye Camera Tested (FE9391-EV) on May 08, 2018
Next in our 12MP fisheye camera evaluation, we bought and tested Vivotek's latest generation FE9391-EV, a new model claiming improved smart IR...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...
JCI / Tyco VideoEdge NVR Profile on May 03, 2018
JCI (formerly Tyco) is one of the largest players in the global security industry, both as a manufacturer and an integrator. The company's most...
IP Network Hardware for Surveillance Guide on May 02, 2018
Video surveillance systems depend on IP networking equipment. In this guide, we explain the key pieces of equipment and features, explaining where...
Access Control Levels and Schedules Tutorial on May 01, 2018
Configuring access levels and setting up schedules is central to maintaining facility security. Many people may need to enter areas but most do not...

Most Recent Industry Reports

Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...
Dahua 12MP Fisheye Camera Tested (NK8BR4) on May 16, 2018
Continuing our coverage of 12MP sensor fisheye cameras, we bought and tested the Dahua NK8BR4, examining: Default vs. Optimized...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact