Electronic Access Control | Millennium Group, Inc

Report a Bug, Get some Cash!

By | Millennium Ultra, Promotions | No Comments

Help us find a bug?

Bugs!  Its the bane of every software developers existence.  However, out goal is 100% bug free software and we want to ask you to help!

Between now and December 31, 2017 email us a screen shot and brief description of any bug you find in Millennium Ultra, Ultra Lite or our configuration utilities.

Report a Bug!

Earn Some Cash!

Our development team will verify that software defect and if found valid we’ll send you a $20 Visa Gift Card.

$20 for an email that will help us improve your product?  That’s a pretty good deal!

Announcing NO CHARGE online Tellus Training

By | News, Tellus, Training | No Comments
Tellus Online Training - Tellus logo

If Training is so important, why is it expensive and time consuming?


We’ve decided it shouldn’t be!

First we created Millennium Tellus.  By eliminating the challenges associated with server procurement and software installation we make sure you can complete your electronic access control installation in record time


Now we’ve taken that same commitment to efficiency and applied it to our training program.  Today we are pleased to announce our first ever totally no charge, totally online training program for Millennium Tellus.


Intended for installers and technicians that are already familiar wtih the basics of access control, this approximately 3 hour online course will walk you through the steps of installing and configuring a Millennium Tellus system.


Fast and Free…whats better than that!
Millennium Tellus kit

Take the FREE online Tellus training today

Whitepaper – Power over Ethernet Design Considerations

By | Electronic Access Control, White Papers | No Comments
A New Whitepaper from Millennium Group

Power Over Ethernet - Design Considerations for Electronic Access Control

Power over Ethernet sounds like a real winner eliminating the need for additional power supplies and associated wiring and providing a nice clean install with a simple Ethernet drop to each door. It’s no surprise that a growing range of access control devices are capitalizing on this technology including the recently announced  Millennium Group NetDCD door controller just for this purpose!
But dig a little deeper and the decision to use POE versus more conventional power solutions include numerous and complex factors.  While there are many variables that factor into the decision, three key factors will generally drive the decision to use POE versus conventional wiring methods.
  • How much power do I need at each door
  • What is the distance between network switches or nodes and door controllers
  • What is the relative installed cost POE vs Conventional RS-485
Download the Full Whitepaper Here

Whitepaper – The Contribution of White Hat Hackers to Access Control Security

By | Electronic Access Control, White Papers | No Comments
A New Whitepaper from Millennium Group

Pay Attention to the Hackers!

Businesses and Institutions large and small are becoming increasingly sensitive to the security of their physical and logical infrastructure.  Access control is a core element of an overall facility security plan, but historically there has not been significant awareness of the potential security risks associated with credential options.  Frequently industry professionals simply believed the technology was good enough for the job.

The growing sensitivity to security vulnerabilities combined with the efforts of  the “White Hat” hacker community has exposed exposed the potential weaknesses in each successive generation of credential and reader technology.

To help build awareness of the potential credential vulnerabilities identified by the White Hat hacker community,  Millennium Group Inc. has prepared our latest White Paper The Contribution of White Hat Hackers to Access Control Security.  This paper includes basic information on the vulnerabilities of each major category of credential, and links to specific content from the hacker community demonstrating in detail how those vulnerabilities could be exploited.
Download the Full Whitepaper Here