[SECTION A] GENERAL Q&A
[SECTION B] SPIDER BLOCKER Q&A
[SECTION C] SPIDER CONTACT Q&A
[SECTION D] DRILL SHIELD Q&A
[SECTION A] GENERAL Q&A
[SECTION B] SPIDER BLOCKER Q&A
[SECTION C] SPIDER CONTACT Q&A
[SECTION D] DRILL SHIELD Q&A
Yes. We take the utmost care with the information that you provide us when placing an order on our website.
In addition, we do not store any of your critical credit card information, as we use trusted payment companies PayPal and Authorize.net to handle all of our credit card transactions.
If you have further questions about the security of ordering online from SSP, please feel free to e-mail us at email@example.com.
To help deter against fake/fraudulent accounts, we’ve implemented two ways of creating a new account.
1: Submit an Authorized Reseller Application. You’ll be vetted and will have an opportunity to choose your Login Info.
2: Make an actual purchase.
-Add product contents into your Cart.
-Proceed to Checkout.
-Under Billing Details, check the box next to Create an Account.
-Continue on with the purchase.
-Input your Username and Password when prompted.
-This login should allow you access to My Account upon your return visit to our website.
After placing your order, you will receive an email confirmation within minutes of order placement.
Once your items have shipped, we will send you another email containing shipping information.
We offer FREE Shipping & Handling to the lower 48 US States (excludes Hawaii and Alaska) on orders totaling at least $50.00 USD.
For orders under $50.00 USD, there is a flat shipping/handling charge of $9.99.
Please contact us if you have shipping needs outside of this jurisdiction, or if you have expedited shipping needs.
For smaller orders we may use USPS First Class / Media Mail.
For medium to larger orders, we either use USPS Priority shipping or FedEx/UPS Ground.
If you have expedited shipping needs, we can accommodate if you send us your UPS Account Information..
For Hawaii, Alaska, or International customers: We use DHL or UPS.
Yes we can. Just send us all pertinent courier info, including a written authorization to use your account for sending your orders.
Depending on your destination: All orders shipped to the Lower 48 U.S. States shall typically arrive in between 3 to 6 business days.
Please note that we are shipping from Hayward, CA, USA (Zip Code 94545).
For any issues, please contact us at firstname.lastname@example.org. Type your SSP Order # in the Subject Field, along with a detailed description of your troubles in the email body.
Do not return any product without receiving a proper Returns Merchandise Authorization (RMA) # from us beforehand. It will be sent back to you, as-is. Buyer is responsible for all return shipping costs.
We accept credit card payments directly on our website via PayPal and Authorize.net, leading online payment providers offering the most secure forms of payment encryptions.
For Authorized Resellers, we can accept direct Purchase Orders. Our payment terms are NET 15 (non-negotiable).
Yes. For security reasons, direct Credit Card transactions submitted using Authorize.net are limited to $4,999.99 USD.
For online purchases $5,000.00 or higher, feel free to use Authorize.net’s ACH/Debit option.
Our Authorized Resellers are composed of Security Integrators/Installers, Consultants, Red Teams, and Distributors.
Download the Reseller Application here.
All applicants must clear credit & background checks, and are subject to full review.
If your entity holds a valid Sales Tax Exemption Certificate: Provide us a copy of the certificate and your account will be configured as Tax Exempt.
We reserve the right to reject/deny any application for any reason.
The Payment Terms are NET 15 (non-negotiable).
This means that 100% payment is due within 15 calendar days of each SSP invoice submission.
Authorized Resellers are able to buy our products at 25% off of MSRP.
Yes. Authorized Resellers must procure a stated value of our products annually. Whether directly from SSP, or through our authorize distributors.
Please reach out to us for more details.
Authorized Resellers (that currently employ at least 1 Full-Time security systems designer/engineer), whom has successfully passed from a list of pre-qualified training programs, are automatically eligible to become Certified Resellers. (This designer shall be termed as the “QI”, or “Qualifying Individual).
An example of an approved program is offered by Dynamic Certified [Course 4.01] Access Control Training Class : Penetration Attack Tools & Advanced Countermeasures.
Another would be: https://redteamsecuritytraining.com/red-team-training/.
The significance is that these program requirements establish the Reseller’s aptitude & proficiency, in that:
A) They have gained proven knowledge into identifying, understanding, and in mitigating modern security risks & threats.
B) They will bear the know-how to properly apply advanced, counter-measuring security products.
*The duration of the Certified Resellership status may depend on the length of validity of the training program’s certificate. Should said training program issue certificates bearing date-based durations and/or expiration dates, it will be expected that the QI renews/re-trains to keep their represented company’s Certified Resellership status in good standing.
-Certified Resellers are ‘up to speed’ in the newest threats & vulnerabilities pertaining to Physical Security Systems. This positions them to be much more valuable to their customers, as compared to their competition who are likely to be ‘in the dark’ about such threats & vulnerabilities.
-Certified Resellers are privy to an added buying discount percentage, in addition to the standard Authorized Reseller discount.
-Certified Resellers receive priority technical support from SSP.
-Certified Resellers receive the latest information and critical updates first.
-Certified Resellers are added to a client-accessible list, containing SSP’s Authorized & Certified providers. It is more desirable for potential clients to select Certified Resellers as their service providers, for their added expertise.
The advanced training assures that your firm:
A) Has been apprised of the most current hacking threats & vulnerabilities impacting Physical Access Control Systems.
B) Has the proficiency to apply the best practices and advanced countermeasure tactics as necessary into your designs, to offset the latest threats. (This includes proper implementation of SSP’s solutions, amongst other advanced security brands in addition.)
In our opinion, it is best that security installers and installation companies are all apprised of modern threats, including advances in hacking/bypassing technologies that may counteract their security designs.
No. The quota for our Certified Resellers is the same quota as Authorized Resellers.
–An Authorized Reseller is a security provider that is able to buy our products from our website, discounted, free of sales tax, and for the purposes of resale. An End User cannot qualify to become an Authorized Reseller.
–A Certified Reseller is an Authorized Reseller, that in addition employs at least one Engineering, Operations, or Installation representative that has successfully completed from a list of pre-qualified 3rd party security training programs.
Yes. Authorized and Certified Resellers are still privy to sale-priced/discounted items.
However, items that are on sale on our website are only applicable to purchases that are made directly from our website. To do this just enter your assigned Reseller Coupon Code at Checkout, and you can take advantage of the added cost savings.
Please do not send us Company Purchase Orders with prices that you may see on our website.
Coupons may not be apply towards sale-priced items.
If you have attained Certified Reseller status, but no longer have a Qualifying Individual ‘in-house’, you will have up to 12 months to replace them with another QI.
*SSP reserves the right to check upon current QI status, at any time, and reserves the right to negate Certified Reseller status accordingly, and with or without cause or warning.
Yes. Certified Resellers bear advanced knowledge of current vulnerabilities impacting Physical Access Control Systems. They are aware of very specific threats, and hence are better positioned to design and install more effective security plans. We highly recommend hiring them.
Non-certified service providers are still able to furnish and install our products. However, they are likely to be without the vital knowledge and unaware to modern threats. If such was the case – A customer may not receive full protection value for their investment.
Should you have any issues with any of our products, please ensure that you have followed all recommended procedures, have visited our FAQ Section, and have communicated with our Support Team.
Contact us at email@example.com. Don’t forget to add your Order # in the Subject Field along with a detailed description of your troubles. Do not return the product without a proper RMA #. It will be returned to you, as-is.
The best method is to contact us via email @ firstname.lastname@example.org. Don’t forget to add your Order # in the Subject Field along with a brief description of your troubles.
You can also leave us a voicemail message at (800) 501-2133. We’ll try and call you back as soon as possible. Please ensure you state:
-Your Full Name & Callback #
-Your Company represented
-If your company is a Certified Reseller
-Your SSP Order #
-A brief explanation of your issue(s)
We’ll do our best to respond back to you as quickly as possible.
Please bear with us, as Spider Security Products is a is privately owned corporation & self-funded startup business.
We have TONS of fresh ideas and innovations in the works, and we highly appreciate your patience & support!
SSP has built (and continues to build) an extensive network of top-quality Domestic (USA) & International manufacturing vendors. Each partner must consistently meet our stringent product specifications, and with each and every single order.
We have established relationships with a diverse group of agents and factories throughout the world including the United States, Mexico, Canada, Europe, UK, India, China, Taiwan, and Japan. As a result of our combined purchasing from proven vendors and freight consolidations, we are able to provide top value for our clients.
Here are a few of sourcing examples:
-Spider Step Bits: Made in the USA
-Spider Blockers: Made in the USA
-Spider Tamper Switches: Made in China
Should Spider Security Products offer back-ordered (or pre-ordered) purchases to be made on our retail website, and for any item(s): We reserve the right to fulfill & send the order within 90 days from initial deposit/full purchase payment.
Should we fail to fulfill & ship your order within this time-frame, we can provide a refund (upon request).
If you are unable to add an item into your online shopping cart, it is likely because it is out of stock.
Our apologies (in advance) for any potential stock shortages, please do check with us again soon.
If you would like to be notified of product restocking or availability, please feel free to join our newsletter or send us an email.
When stock is limited, we may opt to limit purchases to 1 unit per customer, – to ensure that our products are made available to additional clients.
For security companies with multiple branch locations; and if each branch operates under their own tax resale exemption certificate; and if each branch has their own dedicated purchasing agent that will buy from SSP: Each branch shall be required to apply for Authorized Resellership, applicable to that branch only.
For security companies with multiple branch locations; and if each branch employs their own engineers/designers for the security systems that that branch installs : Each branch shall be required to employ one Qualifying Individual (QI) that has successfully passed a pre-qualified training program.
Hacking & reverse-engineering is affecting copious amounts of hardware & software products. Electronic Access Control Systems are not exempt from this, and have even become a focal point.
Consumers pay an average cost of $4,000+ per each electronically-unlocked door, up to 2,000% more than traditional locks.
(“Hard-keyed” locks cost around $200).
Recently, major vulnerabilities in these systems have been exposed. When these risks are not proactively and retroactively addressed, the actual protection value of the systems will be exaggerated.
-What if each $4,000 premium security investment, was no better than a standard $200 lock?
-What if the premium security system actually weakened the buyer’s security posture?
From a criminal vantage-point, (and armed with select hacking tools in hand), your card reader itself, can be used as their key to gain access into your facility. We created the Spider Blocker to prevent this.
Yes, it is.
The vast majority of manufacturers utilize Wiegand signals, for the transmission of sensitive credential data from readers to controllers.
However, Wiegand signals are not safeguarded by any type of software encryption or hardware protection. Data signals from the reader to the controller are transmitted in simple binary form.
A perpetrator is able to gain access to this signal, without impedance, in almost all cases.
Many hacking devices are being developed to exploit the Wiegand signal. We have created a PDF report you can view here.
It’s of utmost importance to note, that during the entire MitM insertion process (before, during, and after), that there are no aesthetic, functional, operational, or performance traces of these hacking modules ever being deployed.
Everything will work as normal.
Security systems are not designed to sense, detect, or to account for MitM devices in any way.
-In virtually every case: No alarms will be triggered when an access device has been removed from its normal, mounted position.
-Accessing and implanting a MitM device onto a live Wiegand signal, can occur while avoiding detection.
-After insertion, the MitM device will be hidden behind that access reader, and cannot be seen from outside of it.
-Once the MitM is installed and operational: No peculiar system performance anomalies would be sensed that would trigger any alarms, or warrant any suspicions.
A customer may be exploited for months or years before any MitM breaches are found, if the devices are even discovered at all.
Because of this, coupled with a likely reluctance by any entity to disclose responsibly, and topped by the fact that there are very few countermeasure options to preventing these attacks: Exact & precise data on documented occurrences are very difficult to gather.
Currently (and especially on Wiegand-based systems): Applying a 2-factor authentication policy does not by itself prevent MitM exploitations.
2FA dissuades other types of attacks, such as the use of stolen physical building access cards.
Without knowledge of a stolen card’s matching PIN Code, they would be prevented from entering the secured space as they would only have 1 of 2 entry requirements.
Requiring [Card+PIN] will not neutralize MitM devices. The reason for this is that access card credential data and numerical PIN keystrokes are both transmitted via the same Wiegand signal.
With MitM devices able to capture both factoring data pieces out of that signal, 2FA requirements can be easily circumvented.
Adding Spider Blockers onto an access control system using 2FA, will help to ensure the effectiveness of that policy. It will prevent a MitM module’s capability to exploit the reader’s transmission lines.
These are the options available:
1- Upgrade to OSDP (Open Supervised Device Protocol). OSDP is growing momentum as the ideal alternative to Wiegand, and is able to utilize all existing cables. However, it requires replacing all current equipment with OSDP-enabled access readers and controllers.
2- Upgrade to other manufacturer-specific (proprietary) products that offer secured signal transmissions. You may need to replace cablings existing cables, but will undoubtedly need to replace all reader and controller hardware.
But a tale of caution when using a proprietary system:
A) Without (open-source) competition, prices can be expectedly much higher than industry standards.
B) A consumer may become “locked into one” service provider, without a network of competitive service providers. There are many cases of customer dissatisfaction in these circumstances.
3- Upgrade to a new IP-based access system. This will require all new (ethernet) home-run cables (with much shorter maximum cable lengths), and new IP-based access readers and controllers. This option is likely to be the most expensive method.
4- Enhance your existing system with the addition of Spider Blockers. System replacement is optional, and not mandatory!
With this simple hardware enhancement, you system would be protected against all of the very same threats as the other methods listed above, but with a huge difference: Your system will also be protected from MitM devices that will be released in the future.
Spider Blockers are the #1 solution against MitM hacking, and also the only one that is signal-agnostic (future-proofed).
OSDP utilizes bi-directional communications between the reader and controller, offering a more secure alternative to Wiegand (which uses 1-way communications).
Deploying OSDP is typically composed of installing an OSDP-compliant access device (e.g. Card Reader), communicating to an OSDP-compliant controller or OSDP-to-Wiegand signal converter.
A system upgrade would typically require replacing every single card reader and access controller, to OSDP-compliant hardware. New premise cabling are sometimes required, and access cards may also need to be re-furnished.
It is of high importance to note. that OSDP makes no guarantees that it cannot ever be hacked or reverse-engineered, as the Wiegand signal has been.
No, you don’t have to choose between one or the other.
In fact, we recommend that you use both. In doing so:
A) OSDP can establish 2-way communications between your access readers and controllers, and migrates away from the useage of unencrypted signals.
B) Spider Blockers will safeguard physical access to active data wires, and hence preventing malicious acts from occurring thereafter.
C) Spider Blockers will provide additional security layers to protect your system against other threats, such as preventing against Power Manipulation Tactics.
The Spider Blocker provides hardware-based protection for access control systems, and against against a multitude of threats.
As an anti-tampering module, the Spider Blocker is initiated by a tamper alarm signal that will trip when someone removes an access reader from its mounted position. When the alarm is sensed, key protection layers will be activated, as outlined here in this chart.
Adding even more value, the Spider Blocker can also serve as an ideal Door Lock-Down Module.
A hardware-driven component that can help mitigate threats in dangerous situations (i.e. Active Shooter scenarios); that is not prone to network latency, infrastructure downages, or server crashes.
Connected to a panic button, lobbies & public areas can be quickly locked down by the Spider Blocker, should a hostile situation arise.
The Spider Blocker is compatible with over 99% of all access control systems. Feel free to contact us if you have specific questions.
SSP does not currently offer formal training on Spider Blocker implementation. However, you can email us at email@example.com or call us at (800)501-2133 if you have any questions. We’re happy to assist.
There are 4 ways that the Spider Blocker may be activated:
1- The removal of an access reader from its mounted position should trigger the Spider Blocker via tamper alarm switch.
2- The Spider Blocker can be remotely activated with a computer controlled relay. (e.g. A CCTV operator sees a perpetrator tampering with a reader on camera – they can shut down the reader remotely using their access system software and activating a relay output.
3- When appropriate tamper switches are installed, cutting/tampering of the reader’s “home run” data cable may activate the Spider Blocker.
4- (When used as a Lock-Down Module): A panic alarm switch can be wired into the Spider Blocker to secure an area.
For several decades, Reader Tamper Switches were widely considered to be a non-critical, optional connection… as there were not yet any MitM technologies created that could hack Wiegand signals.
For a long period of time, security companies did not have have to be concerned about their readers getting hacked.
In 2007, a hacking presentation exemplifying vulnerabilities in Wiegand changed this notion. At that year’s DefCon hacker conference, Wiegand was hacked using the “Gecko”, as demonstrated by security researcher Zac Franken.
But given the available technology at that time (as available to the masses), the Gecko was relegated to an overly large form factor – meaning it was too bulky to deploy without being easily detected.
In more recent years, electronic components have shrunk greatly in size. The advent of technologies such as “Bluetooth Low Energy” or the ESP8266MOD miniature WiFi Module, have allowed more powerful versions of the Gecko to be developed.
Actual examples would be the BLE-KEY in 2015, the ESP-KEY in 2017, and the ESP-RFID in 2018.
No, it is highly unlikely that an access reader can be immediately connected to a security panel. This is due to 2 main issues:
Problem #1- With reader hacking being a fairly new problem, most manufacturers have not actually built tamper switches into their access readers.
Problem #2- For those that do have them, their Tamper Switches usually output a 1-wire “open collector” signal. The problem with these outputs, are that they cannot be connected directly to security panels, which require 2-wire “dry contact” signal connections.
To be fair, by using 3rd party electronic components, you can bridge this (1 vs 2 wire) signal incompatibility. But simply monitoring this tamper alarm does not actually neutralize any of the harmful threats that MitM hacking modules can execute…which the Spider Blocker has been especially created to do.
Yes. The Spider Blocker bridges the gap by converting the reader’s “1-wire signal” to a universally compliant “2-wire signal” that all control panels can monitor.
If you currently have a 6 conductor “home run” cable running out to each Reader, you probably won’t need additional cables to account for the new tamper connection. Here’s why:
The typical wiring scheme of a 6 conductor cable connected to say, an HID Multiclass or iClass Reader, is as follows:
“HOME RUN” CABLE to HID (Reader Function)
RED to RED (+12VDC)
BLK to BLK (Ground)
WHT to WHT (D1)
GRN to GRN (D0)
BRN to BRN (Red LED)
BLU to ORG (Grn LED)
**** to VIO (Tamper) *this wire is typically left unused
As you can see above, the BRN wire of the “home run” is typically wired up to power on the Red LED.
However, since most access reader LED’s are already normally Red in color by default, this connection is unnecessary. As such, the BRN (Brown) Conductor can be freed up for other purposes, such as for connecting the access reader’s Tamper Switch to the control panel.
Our recommended rewiring work is as follows:
“HOME RUN” CABLE to HID (Reader Function)
RED to RED (+12VDC)
BLK to BLK (Ground)
WHT to WHT (D1)
GRN to GRN (D0)
**** to BRN (Red LED) *leave disconnected
BLU to ORG (Grn LED)
BRN to VIO (Tamper) *or connect to an external tamper switch
Note: This may not apply in every instance. If not, you may need to install a new conductor in between your reader and control panel to accommodate the tamper signal.
In this case, connection to the Spider Blocker will be made easier.
2-wire ‘dry contact’ outputs come in two formats, “Form A” and “Form B”. Here are the configurations to accommodate both types:
*Reader Configuration for a 2-wire “Form A” (Common & Normally Open) Reader Tamper Switch:
-Place a small jumper wire in between Reader Ground and Tamper Common
-Connect the Tamper Switch’s Normally Open connection, towards the Spider Blocker’s Trigger Input
-Set the Spider Blocker’s S2 Switch to “Mode A”
**Reader Configuration for a 2-wire “Form B” (Common & Normally Closed) Reader Tamper Switch:
-Place a small jumper wire in between Reader Ground and Tamper Common
-Connect the Tamper Switch’s Normally Closed connection, towards the Spider Blocker’s Trigger Input
-Set the Spider Blocker’s S2 Switch to “Mode B”
To accommodate for a N.C. 1-Wire Open Collector Tamper Switch (MODE A):
-Set Switch S2-1 to ON
-Set Switch S2-2 to OFF
-Set Switch S2-3 to ON
-Set Switch S2-4 to ON
To accommodate for a N.O. 1-Wire Open Collector Tamper Switch (MODE B):
-Set Switch S2-1 to OFF
-Set Switch S2-2 to ON
-Set Switch S2-3 to OFF
-Set Switch S2-4 to OFF
The Spider Blocker itself offers Ten Layers of Protection. When triggered into alarm, the following countermeasure actions occur:
1- Power is disconnected to the Reader preventing “Card Skimming”. Most MitM hacking modules rely upon the 12VDC signal existing at the Reader. Disconnecting the power signal will disallow the MitM from utilizing this voltage and in becoming operational. Secondly, the removal of power also protects against Power Manipulation Techniques.
2- The Reader’s Data lines are severed preventing “Card Replaying”, which is the act of manually transmitting data upstream, with the intention of having the access control panel unlock a door, for the perpetrator (or an accomplice) to enter.
This is especially critical in neutralizing self-powered MitM hacking modules (i.e. as with the BLE-KEY), as severing the data lines will disallow its capability to attack.
3- The Spider Blocker will permanently latch, and the Red “Alarm” LED will be illuminated (Providing a physical, visual indicator of a breaching attempt.)
4- Alarm Output Relay #1 is activated. We recommend this output to be utilized for security status monitoring.
5- Alarm Output Relay #2 is activated. We recommend this output to be utilized for auxiliary purposes, such as in: A) Activating audible sounder alarms, B) Signaling a secondary monitoring system (such as a burglar alarm panel), C) Securing Door Locks (e.g. Door Lock-Down), or D) For many other practical uses.
If your Spider Blocker is tripped into activation: Take caution in not acting too quickly into resetting it.
You should immediately contact your security vendor, to have them take a closer look at the reader. They are the best candidate to know what they did, and did not install.
During their physical inspection, ensure they seek out any potential MitM modules that may might been implanted.
If a module is indeed discovered: Take pictures of it and ensure then completely remove it from your system.
Reset the Spider Blocker only after any foreign modules are either: A) A MitM has been confirmed to not have been installed, or B) A MitM has been confirmed installed, but subsequently removed.
Our full instructions on “what to do” can be downloaded here.
First, the tamper alarm must be cleared (re-mount the reader into its normal, permanent position). Afterwards, there are 2 ways to reset the Spider Blocker:
1- There is an onboard pushbutton that can be pressed for local reset.
2- Send a 1/2-second pulse of a “short” into the Remote Reset input.
You’ll have visual confirmation of a successful reset, as the Red LED will turn off, and the Green LED will illuminate and stay lit.
The Spider Blocker’s Trigger input has 2 main uses:
1- Wire it onto an output of your access control system. Once connected, it can be manually activated by an operator, or it can be grouped along with other Spider Blocker-equipped doors to allow for site lock-down purposes.
2- Wire it into a panic button. Once connected, it can be manually activated by an person (i.e. Receptionist), and can be set into alarm for door lock-down purposes, should a hostile event occur.
The best place to mount Spider Blockers are in a locked security enclosure, inside a secure room within of your facility.
Never mount it outside, or in unsecured locations.
We include a pair of high-tack, double sided 3M Foam Mounting Pads with every module.
For higher density, more secured, or DIN-rail mounting, we offer the SSP-SBL-301-MNT Universal Mounting Kit.
We created the Spider Blocker using electro-mechanical components: Intentionally voiding it of any type of programmable logic, firmware, or software.
In addition, security-related technologies, whenever possible, should be attempted to be secluded from networks, software-driven logic controllers, and the IoT.
As each of these examples run the possibility of being hacked, firmwares corrupted, and require additional levels of maintenance in some form to ascertain intended operations. An overwhelming majority of vulnerabilities, are software-based.
Hardware-based solutions in general, are typically more reliable & dependable.
The BlockerBox is simply a packaged solution that contains (Qty 8) Spider Blocker Modules, pre-fabricated inside of a wall-mountable & lockable wiring enclosure.
As space inside existing security panel enclosures can be very limited: The BlockerBox helps alleviates this issue promoting neater cable management and overall serviceability.
The BlockerBox does not need any external power connections. Each of the (8) Spider Blocker Modules pre-mounted inside the BlockerBox, is powered by the individual 12VDC power connections that already provide power to each separate access device.
We recommend that you mount the BlockerBox in a secured room, preferably nearby the access controller enclosure.
Keep in mind the following:
– The enclosure door’s hinges are removeable, so you can switch the pivoting side either left or right. However- If you move the hinge to the right side, you may need to relocate the enclosure’s tamper switch to the left side.
– If you are installing the BlockerBox onto an existing system: Consider the wiring length’s reach. You want to ensure a proper balance of cable slack on both the panel-side cabling, as well as on the door-side cabling.
We’ve made a short-list below of the most common installation issues involved with Spider Blocker deployments.
(They are listed in no particular order):
1) Insufficient voltage in: Ensure no less than 12.00VDC Terminal Block P1.
2) Insufficient current capacity from power supply: Ensure bandwidth of at least 100mA per (1) Spider Blocker.
3) S2 DIP Switch Settings are incorrect. (Mode A or Mode B?)
4) Improper tamper wiring connection (Installer must test & verify Open Collector N.C. or N.O. tamper signals.
*It is highly recommended that installer tests each tamper signal prior to connecting into the Spider Blocker module, to ensure functionality.
If the issue is power related: We offer our very own Spider 12VDC 5A Power Supply. (Part #: SSP-PWR-1205)
For any further assistance, feel free to contact us!
Not yet. We are currently in the process of achieving UL Certification for the Spider Blocker, amongst many other products.
We recommend provisioning Spider Blocker for every access device on your system.
Your system is only as strong as its weakest link. Neglecting just one device, creates a a void in your overall security posture.
The primary objective is to eliminate the any & all possibility of card cloning or data replaying. Just one compromised credential, derived from a single unprotected reader, can create havoc in any organization.
No, it cannot. Cloned access cards are often perfect identical copies of the originals.
With the Spider Blocker we focus on the root of the problem: By disallowing the theft of the data credentials (out of access readers) to begin with. Without this data, a perpetrator would need to find other means to steal credentials. And there are ways to prevent those other actions as well.
No, it does not. All information from the reader is either passed through to the controller as-is, or expires instantly.
Not a single bit of data is stored in the Spider Blocker.
The Spider Blocker is the #1 ideal choice to serve as a Door Lock-Down Module.
A hardware-based component that can help mitigate threats (and losses) in dangerous situations, such as Active-Shooter scenarios.
Unlike software-based Lock-Down commands, it is not prone to network latency, infrastructure downages, or server crashes.
Connected to a panic button, lobbies & public areas can be quickly locked down with card readers disabled — should a hostile situation arise. The assailant’s access would be compartmentalized, and they could be hindered from crossing into additional areas.
Wiegand-based Card Reader “home run” cables are fully exposed, bearing no supervision whatsoever. This permits the potential for exploitation, without detection.
When the Spider Blocker is connected to a Normally Closed Tamper Switch (such as a Spider Tamper Switch), it opens up the capability into providing crucial monitoring & supervision of the cable.
Once set up: If the cable was to be cut/tampered anywhere in between the Reader and Control Panel, the Spider Blocker will be tripped into an Alarm and can be configured to alert Security of potential foul play.
We created the Spider Door Contact because reed switch door contacts, as overwhelmingly prevalent as they have been, are dangerously vulnerable!
They can be bypassed within seconds by a stronger magnet.
We developed the Spider Door Contact to provide maximum protection for the consumer, and to empower security professionals with a way to safeguard them most properly.
The core component to our Spider Door Contact, is our patent-pending dual magnet design.
We labored for over 2 years and persevered through over 150+ design revisions in R&D to develop it & get it right.
The design consists of a magnet-driven conductive gimbal, that is guided into position by a 2nd (repelling) magnet installed on the door. A door opening would relieve that force.
The actions are all adjoined using our internal spider-hub assembly, and thus the typical “door is open” or “door is closed” signals are accomplished.
As the gimbal rests within its normal “door is closed” space: Any external magnetic forces (sensed from any other direction other than the door magnet itself), will cause the Spider Door Contact’s output to instantly trigger into an alarm.
Yes, it may be useable. But in order to do so, the existing magnet’s north pole must be facing upwards to our Spider Door Contact.
Troubleshooting tip: If you are experiencing reverse performance on the outputs, try flipping that existing magnet around.
Our recommendation is to always replace existing door magnets with our Spider Magnet Capsules. Here are some reasons on why:
1- Most existing magnets are made of Alnico V, which can easily become de-magnetized.
2- Spider Magnets take much less time to install.
3- Spider Magnets can accommodate easily onto almost any type of door.
4- Spider Magnets offer a patented adjustment feature, which will help to eliminate false alarms!
Not yet. We are currently in the process of achieving UL Certification for the Spider Door Contact.
In using them will save you time and money, every time.
Door Magnets offered by traditional manufacturers are extremely limited in application & adaptability. They create add unnecessary costs on each & every single instance of installation.
Example #1: For most interior doors, the installer might utilize up to 10 extra minutes per door, breaking apart the plastic casing and pulling the bare 3/8″ magnet out of it. Then they must mark their drill bit (tape measure, then electrical tape = more time spent) to ensure they do not drill too deep or too shallow. Drill too deep, and the sensor won’t see the magnet. Drill too shallow, and the door won’t close shut.
Example #2: For all exterior doors, typical door magnets do not adapt to these outside applications very easily at all! So installers typically have to drive (on the clock) to the nearest security supplier to furnish a “squeeze magnet” (an added cost) that can accommodate the top-channel cavities that nearly all exterior doors have. Hours of labor may be wasted here.
Our design alleviates all of these issues, and makes for an easy installation regardless of the door type. (With the lone exception being a ‘100% glass’ door).
All door contacts have gapping tolerances…typically between 1/4″ and 1/2″. When these limits are exceeded, false alarms will occur.
Our Universal Caps and Magnet Capsules enable installers into keeping magnets & corresponding door contacts to perfect distances.
Here’s how: When the Magnet Capsule is screwed into the Universal Cap, it’s threaded coupling design introduces a new groundbreaking feature— The Magnet Capsule can be vertically adjusted up & down!
-Turned counter-clockwise it can be brought closer to the door contact.
-Turned clockwise it can be brought further away from the door contact.
Why does this matter? Vertical adjustment capability is significant because post-installation: doors will always sag lower over time. This is a highly common problem that causes false alarms for security systems.
When traditional door magnets are used, they are permanently placed into position… offering ZERO adjustment. Our innovative design finally puts an end to this historic problem.
Yes, but we cannot guarantee full compatibility with all other brands.
Yes. Traditional magnets, which are cylinder-shaped, can fall into a door if the 3/8″ hole is drilled too deeply.
Our Magnet Capsule bears an oversized “head” that prevents it from falling too deep into the door, and situates the magnet perfectly, 100% of the time.
In addition, our Magnet Capsule is made of Neodymium Grade N42, one of the strongest magnets available and is not prone to demagnetization.
Not to worry, this is normal.
The core of our internal design consists of dual ‘repelling’ Neo magnets.
As the door is shut, the 2 magnets will align and balance. (A physical synchronization will be established in between them, in a directional & discerning manner).
When the door is opened, this balance will be interrupted, triggering an alarm.
No, the repelling force is very minimal and should not affect door closings.
No. There should be no concern for demagnetization. We use top-grade Neodymium magnets, which at their worst will lose only up to 1% of their magnetism after 10 years. (This loss is not enough to affect operation). Not to mention the loss would only occur if a single magnet was completely isolated & was not in regular contact with other magnets.
The Spider Drill Shield (Part # SSP-ACC-DRILLSHIELD-038) is designed to accommodate 3/8″ shanked drill bits.
Drill bit shanks must clear at least .75″ past the core bearing assembly.
Unfortunately there are slight diameter size variables & tolerances, in what a manufacturer might build as a “3/8 inch” shank.
(Some of them are much larger than .375″).
Because of this, we cannot guarantee that every 3/8″ shank will be compatible with the Spider Drill Shield.
What we can guarantee, is that our Spider Step Bits will always fit into Spider Drill Shields.
It is likely to be incompatible, as holesaws typically require more cup depth.