Access Control


IC Realtime Enters Access Control Arena

Video surveillance cameras and recorders now fully integrate with entry-point control hardware and software solutions for smooth one-click navigation viewing.

RemoteLock ACS from LockState Offers Cloud-based Access Control

Integrates external door controllers with internal, stand-alone, Wi-Fi-connected locks.

ZKAccess Releases EC10 Elevator Control Panel

A secure, scalable and affordable access control solution primarily designed to control floor access.

Allegion to Acquire Simonsvoss

Electronic lock company has comprehensive suite of solutions for access control.

Don

Don't Give Physical Security the Back Seat

5 areas that you must focus on in your facility to enhance security.

Dean Drako Purchases Brivo – What Does This Mean for the Industry?

Allows Drako to build upon his current stake in the VSaaS market.

Aurora Launches FaceSentinel, Facial Recognition for Access Control

Access control partners sought for facial recognition system, powered by Deep Learning, at cutting edge of biometric technology.

HID Global Achieves ISO 14001:2004 Environmental Management Certification

Focus areas of the ISO 14001:2004 environmental management system include legislative compliance, pollution prevention, and minimizing energy and resource usage.



Key Control Innovations from Morse Watchmans Advance Security Levels and Risk Mitigation

IFSEC exhibit highlights industry-leading product portfolio.

HID Global Develops Innovative Biotechnology RFID Tag to Meet Vital Need in Cryopreservation

Storage vessels become highly traceable with patented tags and readers that work at subzero -196°C, and software to accurately locate, record and audit stored material.

Charles Johnson Presents Campus Safety Security Solutions at ASCUE Education Conference

To discuss Open Options' DNA Fusion access control software and it's suite of supporting applications.

Senstar Selected to Secure NATO Rapidly Deployable Camps

Perimeter electronic security systems to include intrusion detection, video surveillance, access control, and public address systems.

Dean Drako Acquires Brivo Cloud Access Control Company for $50 Million

Eagle Eye Networks CEO and Barracuda Networks founder expands reach in cloud security.

International W to Represent Cypress in Central and Latin America

Providing customers with accurately translated product information and manufacturing sales and support.

S-ACC-3020-Intelli-M Smart Card EOL Notification

S-ACC-3020-Intelli-M Smart Cards: 2K Access Card with CR-80 Format for legacy IDC smartcard installations only.

Morse Watchmans Adds New Integration Capabilities

KeyWatcher Touch certified for use with Software House C•CURE 9000 v 2.30.

FEAR NOT!

FEAR NOT!

Upgrading from card access to biometric access is easier than you think!

Design Great Projects with Orion ECI and Autodesk Seek

Autodesk Seek helps source product information to enhance building design process.

VingCard Elsafe Takes the Family Name to Become ASSA ABLOY Hospitality

New name for trusted security brand opens the door to future growth and innovation.

Vanderbilt Completes Acquisition of Siemens Security Products

Strategic global expansion delivers more comprehensive range of products.

The Fighting Lady

The Fighting Lady

In 1975, one of the most revered naval aircraft carriers—the USS Yorktown— was relocated to Mount Pleasant, S.C., to star as the centerpiece attraction of the newly developed Patriots Point Naval & Maritime Museum operated by the Patriots Point Development Authority.

Security Corrections

A large corrections campus, encompassing more than 30 buildings in the southeast United States, houses approximately 5,000 inmates with separate jail facilities for men and women who are awaiting sentencing, serving sentenced jail time and are in maximum security.

Securing the Glass Entrance - Wireless reader plays significant role in company security

Securing the Glass Entrance

A dramatic entryway makes a brand’s first impression and sets the tone for visiting customers and staff.

The Importance of Keeping Alarms Up to Date

The Importance of Keeping Alarms Up to Date

During the 1960s, Arlington, Va. and the entire Washington, D.C. area experienced tremendous growth as demand for office space soared and new residents flocked to the region for employment.

Library Complained about Poor Security Before Artwork Disappeared

Library Complained about Poor Security Before Artwork Disappeared

The Boston Public Library’s largest union had repeatedly complained about the lack of security during renovations.

ZKAccess Now Offers A Free 3-credit CEU Course Accredited By ESA & BICSI

Advanced Biometric Access Control designed to teach physical security integrators all they need to know about successful migration from traditional card access systems to biometrics.

Farpointe's New Vandal- and Bullet-resistant Contactless Card Readers Take a Hit

Increased access control security from thugs, delinquents, criminals and terrorists.

Commonwealth Center for Children and Adolescents Selects AMAG Technology's Symmetry

Newly strengthened partnership between AMAG Technology and Salient Systems provides unmatched security system for adolescent mental health hospital.

Delta Vehicle Access Control Systems Integral to Meeting CIP-014

Protects electric power infrastructures from terrorist vehicle attacks.

Morse Watchmans SmartKey Reader Improves Security and Workflow Productivity

Single location automated process offers convenience and speed to system programming.

Denis Hébert Leaves HID Global as President and CEO

A little investigative journalism identifies access control company's rather quiet change.

ZKAccess Honored With ESX Innovation Award For Access Control

Recognized for innovative technology, design and application.

College of Saint Rose Secures Open Campus Environment

Vanderbilt SMS Access Control System helps keep campus safe.

SureView Systems Receives OnGuard Version 7.0 Factory Certification

Immix software platform interfaces with Lenel’s access control security system.

CHERRY Introduces the JT Family of Class 1 Terminal Smart Card Readers

Offers durable and practical transparent solutions for any reader requirement.

Mr. C Spa & Beauty Emphasizes Sophistication and Elegance

Security meets contemporary architectural design with Rockwood decorative pulls.

Four Important Things You Need to Know about Hi-PoE

Online Exclusive: Four Important Things You Need to Know about Hi-PoE

Seemingly limitless system applications allows manufacturers to significantly increase capabilities of cameras and other devices.

Bosch Security Systems Opens New Distribution Center in South Carolina

New site will receive, store and ship more than 50,000 different video surveillance, intrusion and fire detection, access control and management systems and audio and conference systems products.

AMAG Technology Introduces Symmetry CONNECT

Policy-based platform providing safety, security and risk management capabilities for organizations demanding a process and policy-based approach to managing enterprise security functions.

White House Fence gets Spikes for Security

White House Fence gets Spikes for Security

Secret Service hopes to deter and inhibit people from climbing over the fence.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3