All your entries controlled and
answered at any time!

We present NÜO WM, the digital video-intercom system with IP technology. An absolutely innovative solution with the latest advances in audio and video.

Receive your visitors through a sophisticated video-intercom with perfect audio and video quality that also allows your employees to access either with a biometric, or a high security smart card reader.

All integrated in the same system!

It is simple! Place a video-intercom in each entry of your business, connect it with our high-resolution video console and answer from your reception’s office or wherever suits you better. Whoever tries to access, will be seen and heard with both clarity and definition.

You can open or block doors, put the door in free passage if you need to keep it open for an event, training or when the carrier comes; activate the emergency function so that all doors automatically open in the event of an emergency… as you wish!

We guarantee maximum security, maximum efficiency and maximum control.

WM View

You will feel that the other person is right

Touch Screen

High Definition Screen



Great audio capability + HD, that is how Voxter goes. It is not a simple entry device. Configure welcome messages and amaze your visitors with Voxter´s acoustic and luminous features. Beauty and functionality are fully integrated.



Megapixel HD
Color Camera

Sky Flux/Surf

Prepared to resist to the toughest environmental conditions keeping an impeccable image


We protect your house!!

Enjoy the safety of your home in summer

Say goodbye
to keys!


“Few places are as important as your own home.
Your world, your space”

Imagine walking into your home and disarming the alarm and opening the door with a single gesture.
Arriving home from work, the garage door opening as you approach, with no need for remote controls.

Without complications. Because you are the key!

Control your home from anywhere

Technology for indoor and outdoor


Our solutions and products are the result of research and innovation, and are designed to adapt to your specific needs. We have the perfect alternative to guarantee security in your project or building.

Do you want us to help you?

Contact us at or call us at +34 91 870 71 93 or at +34 91 872 95 76.

The Access Control System
for your business

Security applied to everyday life

With NÜO Go! you can control the access to your business in an intuitive and safe way.

NÜO Go! is a complete solution including all the hardware and software.

Manage your company’s security through a simple application.

There is no software to install, it is included in the controller.

Every last detail is recorded, which can be used to issue custom reports.

Combined biometrics + proximity reader with optical sensor, flush or surface mounted for indoor use.

Combined biometrics + proximity reader with multi-spectral biometrics sensor, MIFARE Plus® cards, Bluetooth and Full NFC. Prepared for the toughest conditions: industry, laboratory …

NÜO Surf MIFARE Plus® Proximity card reader, surface mounted for indoor use.

Standalone electronic handle with proximity reader to provide access control without needing to wire the doors.

Flexibility for your office

Forget having keys made for your employees to copy or lose. NÜO Go! integrates the latest generation biometrics as something natural.

App Web

So easy to use it’s hard to believe.

We have designed an interface so intuitive and simple that you will not need any guidance. You can create a host of predefined or custom reports: for users, doors, timetables, incidents, etc. Everything is within reach using the most intuitive interface which is accessible from any device: computer, tablet or smartphone.

As simple as effective!

App Web

So easy to use it’s hard to believe.

We have designed an interface so intuitive and simple that you will not need any guidance. You can create a host of predefined or custom reports: for users, doors, timetables, incidents, etc. Everything is within reach using the most intuitive interface which is accessible from any device: computer, tablet or smartphone.

As simple as effective!

Video + Audio + Access

On a single system! Your business access controlled and attended at all times.

Welcome your visitors with a sophisticated video-intercom with perfect audio and video quality and give access to employees with a biometric reader or high-security smart cards. In NÜO Go! visitors and employees are integrated in the same system.

The high-resolution anti-glare capacitive touchscreen display (10.1”) clearly shows all the images show by the videointercoms.

Solves communication with non accredited visits and establishes strategic help points in the event of an emergency.

Pedestrian Access

Establish security profiles for each user deciding who enters, when and where. Restrict the access by time, date, areas, users, etc. Furthermore, every command happens in real time, so you can make quick access changes avoiding security problems.


Manage your company’s private parking with Sky Car. The voice will always sound clear even with heavy traffic. The high resolution camera will offer rich images with total definition.


By, certified company by the ACIE

Security | Access | Technology

By is one of the great centers I+D nationwide. More than 80% of the workforce is made up of researchers, engineers and computer scientists. The Agency of Certification in Spanish Innovation has awarded the company with the certificate of activity of I+D+i.

By is a leader company in I+D

By is a leading company in design, development and manufacture of Access Control systems. This is one of the great centers I+D nationwide, a pioneer in the study of biometrics.

Our staff

Our staff is formed by more than 80% of engineers and computer scientists who develop constant research and development of new systems, algorithms and technologies in Security and Access Control Systems.

Our constant work of development and research allows us to offer you systems outstanding for their technological innovation, its careful and modern design and its simplicity of use e installation.

ACIE Agency of Certification in Spanish Innovation

The Agency of Certification in Spanish Innovation (ACIE) awarded By with the Certificate of Activity I+D+i for Research Staff, which is a recognition to our work and encourages us to continue our task.

All our products and solutions are the result of research and innovation, and are designed to suit your specific needs. We have the perfect alternative to ensure the security in your project or building.

Do you want us to help you?

Contact us at or call us at +34 91 870 71 93 or at +34 91 872 95 76.


Colombia 2019

2 – 5 July

Visit us at Stand 127

You are invited!

To the International Security Fair in Bogota, where we are coming with the most advanced technology in Security Systems.

Say Goodbye to “one size fits all”

Because not all doors are the same

Web Application

It is all a click away

Video + Audio + Access

All-in-one integrated system

Visit us at Stand 127


Our solutions and products are the result of research and innovation, and are designed to adapt to your specific needs. We have the perfect alternative to guarantee security in your project or building.

Do you want us to help you?

Iris recognition and retina scanning. Are they the same?

Many of us believed that biometrics only consisted in fingerprint reading, but the reality is that encompasses a lot of recognition methods of people based on physiological or behavioral characteristics.

In security, the recognition of iris and retinal scanning are biometric technologies of “eye” identification, based on the unique physiological characteristics of the eye to identify an individual. Although both use some part of the eye for identification, these biometric methods are very different in performance.

Retina scanning

What is the retina?

It is the layer sensitive to light that is on the inner back of the eye and acts like the film in a camera, reflecting the image we’re seeing. The retina is a structure of blood vessels so complicated that even identical twins do not share a similar pattern, the retina of each person is unique. Although the retina patterns can be altered in diabetes, glaucoma or degenerative disorders of the retina, the retina remains unchanged from birth to death.

Retina scanning

How do retina scanners work?

The retinal scan is performed by directing a beam of invisible low energy infrared light to the eye of the person when he/she looks through the eyepiece of the scanner, as one looks through a microscope. That ray of light draws a standardized route on the retina. As the blood vessels of the retina absorb more light than the rest of the eye, the amount of reflected light varies during scanning. The resulting pattern of variations is converted to a computer code and stored in a database.

Iris scanning

What is the iris?

The color of the iris determines the color of the eye (blue, green, brown,etc.). The iris is a thin circular eye structure, which controls the diameter and size of the pupil and regulates the amount of light entering.

How do iris scanners work?

We get iris information through a high-resolution camera with a subtle infrared lighting that captures images of the structure of the iris.

The images are converted into digital templates and stored in a database in the reader. These biometric templates provide a mathematical representation of the iris, which coincide with a positive and unequivocal identification of a person.

We have concluded that they are different biometric techniques, because they don’t draw patterns in the same area of the eye, but there are some aspects they have in common:

  • Low rates of false acceptances and false rejections.
  • High reliability, two people cannot have the same pattern of iris or retina.
  • Quick verification of biometric data.
  • High protection against spoofing attacks.

Pros and cons of Iris and Retina scan

  • The measuring accuracy of the retina scan can be affected by illness. However, through a retinal scanner, certain diseases such as AIDS and malaria can be detected.
  • The texture of the iris remains incredibly stable, it usually remains unchanged throughout its life, except in extreme cases of eye injury.
  • Retina scanning requires being very close to an eye piece, as is done by looking through a microscope. Also, an infrared light is shot in the eye, so it is quite invasive and annoying to carry it out on a regular basis.
  • The iris scan, for the most part, is considered the best of the two methods as it can be done from a greater distance,and, therefore, it is less intrusive. The iris capture is a typical photographic process.

Both technologies are extremely reliable and with a high level of security, but the difference is in the details and in making the user have an experience of fast and convenient usability.

Iris recognition is the most widespread and used of the two, being the least intrusive. Many government organizations and corporate buildings already use iris scanning as a means of restricting access to certain areas of high security.


Security in airports, research laboratories, courts, customs and data centers is particularly sensitive, so you need to have last generation access control as NÜO Iris.


Iris recognition is the most reliable and secure biometric technology after DNA.


Quick Capture of the iris for enrollment and higher recognition.


Fully integrated into the NÜO platform, it also offers Wiegand and TCP/IP interfaces.

In By we are always at the forefront of everything related to technology and, therefore, we already knew of the arrival of NFC technology a couple of years ago. Now, we would like to dig a little deeper and further explain what this technology is and what its applications may be.

NFC (short for Near Field Communication) is a short-range wireless communication system that operates by proximity in the band of 13.56 MHz. This technology derives from the RFID tags used in access control, transit passes or even security systems in physical stores.

Despite being approved as standard more than ten years ago, in 2003, for many NFC it is still vastly unknown.

How does it work? Bring your mobile device to another is all that the user needs to do so that communication establishes between them. Just that simple. Its high point is the communication speed; that is almost instant without previous pairing. As a weakness, but which is also one of its features, we can say that the distance range is small, since it moves in a range of about 20 cm.

In short, the NFC technology is based on communication between nearby devices and the exchange of information in a fast and convenient way for the user.

But what about the safety of this technology? It bases on a radio frequency communication, which may seem vulnerable. However, NFC technology is very safe because of the authentication and encryption processes of the information exchanged. To this, we must add that the reduced operating distance (less than 20 cm) makes it very difficult for a third device to intercept and/or interfere with communication.

Uses of NFC

The most common uses of this technology are identifying and applications involving data exchange, such as payment via smartphones.

NFC technology


Identification via NFC

The new DNIe 3.0, incorporates the NFC connection, in many cases avoiding the need for a special card reader. Thus, the possibility of using the ID card via smartphones or tablets that have NFC technology opens. If you create an application entity where it is necessary to identify, it can be done by simply approaching the DNI 3.0 to the NFC antenna of said mobile devices.

NÜO readers NFC technology

Also, it is used in the access control allowing communication between NFC devices and the readers with this technology incorporated. That is possible with users of the NÜO family, which include NFC for connection to smartphones, as well as being compatible with all MIFARE® cards and especially designed for proximity cards MIFARE® Plus. Its operation is simple. All you have to do is bring the Smartphone to the NFC reader to exchange data. Depending on the configuration and the permissions you have configured in the NÜO ONE or NÜO SIX systems, we can access some areas or others with a simple flick of the wrist.

Data Collection

As a practical example of the use of NFC technology, these days we’ve learned that the AAC (Automated Assembly Corporation) is negotiating with several companies to start mass producing the InfoSkin system, a new line of NFC tags that adhere to human body.

NFC system healthcare industry

These NFC tags are designed for their use in the healthcare industry and would be used to improve patient care by making it easier for medical staff to update the treatment records of each patient.

Payment by mobile thanks to NFC

On smartphones that use the Android operating system, the NFC technology has been available for quite a while now and thanks to Apple Pay service it is also available on iOS devices. According to Apple, the NFC technology implemented on mobile devices will be dedicated exclusively for payment.

NFC payment system

In conclusion, the NFC technology still has a long way to go and evolve. However, in By we are confident that it has a promising future thanks to its versatility, speed and ability to make our life much easier and more comfortable.

Security in the use of wearables

Security | Access | Technology

The IoT is already present in our daily lives and is here to stay. The use of wearables has grown exponentially in recent years. These devices help us and make our lives easier, but do you know how to use them safely? Here are some tips to help you avoid any risk and keep your privacy safe.

IoT: Internet of Things
IoT: Internet of Things

The IoT (Internet of Things) is getting its place in our daily lives. The use of wearables and connected devices is growing at an unstoppable pace. During 2015 greater than 600% growth figures were achieved, which makes us think that wearables are here to stay.

Smart bracelets smartwatches, heart monitors, glasses, headphones and even smart clothes, make our daily work easier. They track, record information and provide us with a multitude of tasks. It is already possible to know how many steps you have walked, plan a running route, the quality of our sleep, what our heart rate is and even how many calories you have consumed during the day. We can have all the information we need at our fingertips, find maps, watch videos, answer e-mails and even scan foods… The use of these devices is absolutely personal, they are carried close to the body and create a feeling of total privacy. However, is it so? Do we have the assurance that our data are completely safe?

What are the risks you must keep in mind when using your wearable?

Knowing what time you jog, what route you follow, your habits, diseases, your location, etc. is information that can be useful for someone who wants to make fraudulent use of the same or commit some sort of criminal act.

Similarly, and in other areas, not to mention harassment or hacking, the information collected is beginning to be used by third parties such as insurance companies to make recommendations for healthy habits to their customers, and even as valid evidence in trials.

What are the risks you must keep in mind when using your wearable?

One of the main risks in some wearables devices is that they use a wireless Bluetooth connection to connect to your smartphone, and this is where your device becomes vulnerable, as it enables hackers to gain access to it and all the data it contains. They don’t need to physically have your device, but they take advantage of that security hole to get all the information that interests them.

In others cases, the problem is the vulnerability of storage systems related to passwords. It seems that in some devices unencrypted information is transmitted, and user management is poor, so if someone gets the password can access all our private information.

What to do to protect your wearables from possible hacks and ensure confidentiality?

An added risk is the lack of privacy (or complicated accessibility to them) to explain clearly and simply what they do with user data, why they collect them, and if they are transferred to third parties.

Finally, we cannot forget that the data we provide to companies is stored on servers, which can also be attacked by hackers, as has happened in some cases very popular we all remember.

But, what to do to protect your wearables from possible hacks and ensure confidentiality? Very simple

When purchasing a new wearable, learn about the technology used, security measures offered, which data it collects and how it manages them. It is a fundamental first step to avoid unnecessary risks.

Use a PIN. Although it is not a foolproof mechanism, it serves as a deterrent to hackers or thieves.

It limits the information you share. Wearables don’t need to access to all the information about you. It is possible that in some cases they don’t need to know your location, access your photos, or your agenda. Establish the privacy settings appropriately depending on the type of device and the use you will make of it.

Use if necessary, complete security systems which also protect your computer, to prevent that when making a backup of the phone, a possible new route by which access to your information opens.

SOURCES (Spanish):

In By we believe in technology and innovation to help development and improve the lives of people.

Do you want to learn more about us?

Contact us at or call us at +34 91 870 71 93 or at +34 91 872 95 76.

SmartCity and Smart Building, fashion concepts (part II)

Security | Access | Technology

As we already proposed, the fashion concepts are the ones that go further and become a reality that is already present in our lives. What are they? How do they affect us? On this occasion, the Smart Buildings…

The Smart Buildings or Intelligent Buildings will be an indispensable part of the SmartCities, with an aligned concept to them. However, they also operate independently and are already a reality.

Smart Buildings will focus on control and process automation, including management of energy efficiency, lighting, air conditioning, security and access control, audiovisual systems and video surveillance, and total control of the various systems buildings from a computer or workstation.

The aim is to maximize the functionality of the building

The aim is to maximize the functionality of the building, improving the effectiveness of it, providing as many benefits, guaranteeing accessibility, increasing safety to the maximum, and increasing energy saving and efficiency.

Some of the essentials for an Intelligent Building are:

Indispensable for an Intelligent Building

Energy efficiency. Through consumption control and optimization, the use of alternative and clean energy, and the installation of smart meters.

Lighting. With automated lighting systems depending on location (inside or outside), presence through motion sensors, with the establishment of timetables or temporary settings, user preferences, etc.

Heating and Air conditioning. Using sensors of open windows to stop climatisation, establishing zones and times to adjust the temperature, air quality monitoring, and self-regulating for energy efficiency.

Security. High-security control systems of biometric access, access controls on parking, control and recording through control systems presence for employees, video surveillance and CCTV, alarms and smoke, fire or flood detectors, management of emergency doors.

Audiovisual systems. Custom audio systems in the building, centralized management screens, control of audiovisual rooms.

These new forms of construction with new standards, possible through em>innovation and technology, involving a paradigm shift, and require renewed mindsets and efficient solutions that meet the needs of users, and undoubtedly will help improve their quality of life.

In By we believe in innovation and we have been over 30 years researching and developing security solutions and access control. Our experience is at the service of a single goal: helping you with your projects.

Do you want to learn more about us?

Contact us at or call us at +34 91 870 71 93 or at +34 91 872 95 76.

SmartCity and Smart Building, fashionable concepts (Part I)

Security | Access | Technology

SmartCity and Smart Building are undoubtedly the fashionable concepts. Increasingly often found in media, statistics, news, conferences and congresses, and reports of both public and private entities, talking about integrating technology and intelligent systems in cities and buildings. It is an essential step to move forward. But what are they exactly? What agents are involved? What are the advantages for citizens? Do they really represent a revolution as powerful as discussed? What role does security plays within them?

Concept of Smartcity or intelligent city

Undoubtedly, there are many questions that arise in dealing with this concept… So many that a slight approach to the subject comes to frighten the most intrepid. So some brushstrokes will serve us for now to make an approach to these new trends, which are actually much closer (in time and space) than we believe. In this first part of the blog we will discuss the SmartCity.

The concept of SmartCity or Intelligent City refers to the use of new technologies in various fields, systems and infrastructures to achieve a sustainable, efficient, safe, functional and controlled city.

The ultimate goal is to improve the quality of life of citizens, through responsible management of resources, improving the efficiency of urban services, a flow of agile information between citizens, businesses and institutions, and control and automation of process. In short, a connected and collaborative society to change the way we live in cities and relate and interact with the environment.

A comprehensive concept of SmartCity addresses six axes or dimensions:


Implementation of use of the ICT in enterprises, economic promotion, support to entrepreneurship, internationalization, business spaces.


Education and training, e-learning, continuing training, R&D&i, human capital.


Investment in ICT of the Public Administration, online public services, transparent governance, promotion of innovation, e-democracy.


Connectivity and ICT infrastructure, public internet access.


Security and trust, culture and identity.


e-health, accessibility and e-inclusion.

In short, it is about developing better places to live including:

Incorporation of ICT in public services and administrative management, with accessible services through technology platforms from different devices.

Maximum use of new technologies and communication networks to manage the city and provide services to citizens in a connected way.

Connectivity and transport planning. Promoting efficient and sustainable means of transportation such as electric vehicles and bicycles.

Process automation which helps streamline and optimize the operation of systems of the city.

Public access to internet and e-inclusion of all groups and sectors.

Responsible management of resources. Conscious consumption of limited resources.

Integration of new technologies in the spaces for self-management and communication with citizens.

Sufficient social infrastructures: schools, libraries, hospitals, museums and cultural centers, sports facilities, etc. that respond to the needs of the population.

Economic intelligence, which promotes strategies that promote local development and business growth. ICT penetration in enterprises and fostering innovation.

Efficient energy consumption. Promoting the use of counters that control energy consumption to optimize through energy efficient appliances and electrical systems.

Safe and controlled cities through video surveillance, control of both outdoor areas and buildings (especially in institutions, public or private), mechanisms of identity verification of citizens, access control in buildings and facilities.

Green and environmentally sustainable cities. With senough spaces and gardens, encouraging the consumption of renewable and clean energy, minimizing carbon footprint, reducing pollution levels, boosting recycling products, and ultimately, a policy of environmental respect in all areas.

For the development of a SmartCity project, it is essential the involvement of public and private actors. First, it is essential the participation of municipalities from the institutional point of view, as leaders and drivers of change and project promoters. And of course, and not least, the involvement of companies and sectors such as engineering, architecture, construction, security, transportation, and of course, telecommunications and technology in general, providing innovative solutions that enable the transformation of cities.

Smartcity project

According to some reports, the number of SmartCities will triple by 2025. In Spain we already have a Spanish Network of Smart Cities (RECI), with more than 62 participants, among which there are large cities like Madrid and Barcelona, but also other smaller ones, such as Gijon, Santiago de Compostela, Salamanca, or Alcala de Henares to name a few.

In By we believe in technology and innovation to help development and improve the lives of people.

Do you want to learn more about us?

Contact us at or call us at +34 91 870 71 93 or at +34 91 872 95 76.