Access Control


Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

The ruling doesn’t allow police to unlock phones using passcodes, however.

Pros and Cons of Barriers

When specifying the vehicle access control system needed to stop a truck-bomber, errant driver or vehicle that is not authorized to enter your facility, you have to decide among bollards, barriers or barricades.

Opening the Door to a Secure Future

When Clay Platte Family Medicine Clinic looked to upgrade their lock-and-key door controls, they turned to an IP-based access control system from Axis Communications to address these competing demands.

Honeywell Adds Schlage AD Series Locking Systems to Pro Watch Access Control Suite

This eliminates the need to run wires to each access point and reduces time and associated labor costs.

Adams Rite Adds Dual Lever Hardware to RITE Door

New TRUE Wood RITE door available in three types with a variety of product options available.

ASSA ABLOY Announces Sponsorship of Safe and Sound Initiative

Empowering communities to improve the safety and security of their schools.

Multi-factor Verification with a Lifetime Warranty

Farpointe Pyramid Proximity Card ReaderPlus Keypad has 8-inch read range that determines what you have and a PIN establishes what you know.

HID Global Demonstrates Its Secure Mobile Identities and Solutions at CARTES 2014

Latest credential management and layered authentication solutions addressing enterprise and banking security will be showcased.



Genetec Wins 2014 Axis ADP of the Year Award for North America

Axis recognizes Genetec for its continued growth and commitment to IP video surveillance and access control technology.

AMAG Technologys Newest Symmetry V8 Software Further Developed to Support Federal Government

Government entities required to install FICAM-compliant products to meet security specifications.

Cornhusker Bank Standardizes on Genetec Security Center

110-year old bank in Lincoln, Nebraska unifies security operations across its branches.

HID Global and Datawatch Systems Showcase Mobile Access Control

Washington D.C. high-rise office building tenants can view HID Mobile Access capabilities that are integrated with other advanced building technology in special demonstration suite.

Twist Mobile Access Adoption Growing

Twist Mobile Access Adoption Growing

Smartphones expected to replace mechanical keys and physical access cards making user experience, value and new gestures a must.

Von Duprin Concealed Vertical Cable Exit Devices Fill Church's Tall Order

Expansion and the building of new structures prompted way to secure pairs of 14-foot tall bronze doors.

Vanderbilt Industries Agrees to Acquire Siemens Security Product Business

Move consolidates company’s fast growing presence in global security systems industry.

CEM Systems Releases New Version of AC2000 Security Management System

Latest version of AC2000 offers solutions to improve security, a range of new integrations and enhances the functionality of emerald, the intelligent access terminal.

FBI Not Happy with Google, Apple Encryption

FBI Not Happy with Google, Apple Encryption

The encryption techniques might be regulated by the government in order to maintain control.

HID Global and RFI Pilot Use of Smartphones and Gesture Technology for Enterprise Access Control

Second Netflix pilot follows HID Global’s and RFI’s successful initial Netflix project, and takes mobile access control to the next level of security and convenience.

Dropbox Blames Security Breach on Password Reuse

The company is urging users to enable two-step authentication.

When Buttons Are More Convenient than Cards

Integrates long range reading with increased device control in leading proximity or contactless smart card technologies.

Zwipe Biometric Card Holders Can Now Use Installed Proximity as well as Smart Card Readers

With biometric sensor directly on the card, organizations can also leverage legacy proximity card readers to add biometric authentication.

Napco Security Systems Continental Access Alarm Lock and Marks USA Exhibit Solutions at ASIS 2014

Featured products and solutions met and exceeded market demands for security, connectivity, locking and access control.

Viscount Systems Awarded US Patent for Freedom Security Technology

IP protection added, revolutionizing how access control systems are deployed and managed.

HID Mobile Access Included as Enterprise Solution in the Samsung Enterprise Alliance Program

Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.

Secura Key Offers Updated Card Ordering Guide

Allows resellers and customers to have a reference tool for all aspects of the card ordering process.

Man Posing as Member of Congress Gets Access to Secure Area at Obama Event

Man Posing as Member of Congress Gets Access to Secure Area at Obama Event

An unidentified man was able to get access to a secure area backstage at an appearance by the president

New Mobile Solution from Galaxy Control Systems Extends Access Control Reach and Functionality

New handheld reader ideal for mustering, remote/portable applications.

Galaxy Control Systems Offers Access Control Benefits for Education beyond the Conventional

System Galaxy v.10.4 enables innovative applications to track student movement.

New Galaxy Control Systems Remote Access Reader Sets New Benchmark in Polling Speed

Turbo485 delivers speeds up to 10X faster than conventional 485 readers using legacy RS485 architecture.

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

The man was a security contractor with three prior convictions for assault and battery.

Security is Personal

For small to medium-sized businesses (SMBs), access control needs to be affordable, scalable and easy to install, manage and maintain. Business is no longer left at the office, as today’s small business owner needs control and visibility of the organization while on the go.

What Does Apple

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?

Documentation for iOS8 confirms no open access for developers to the NFC controller in the phone and no NFC APIs in the iOS8 SDK.

Hubbell Lighting TOTUS Solutions and Axis Integrate LED and Surveillance into One Platform

Companies will demonstrate Spaulding Lighting’s Cimarron LED Fixture with Active Deterrence Surveillance at 2014 ASIS International Expo in Atlanta, GA.

Report Says Amazon is working on Smart-Home Devices

Report Says Amazon is working on Smart-Home Devices

The work will be done out of their secretive hardware unit, known as Lab126

Morse Watchmans Integration with Software House Streamlines Key Control and Management

Integration with C•CURE 9000 provides users with more effective and efficient management of personnel, credentials and assets.

HID Global Introduces Ultra-thin Epoxy Tag RFID Transponder

Epoxy Tag UHF units endure the rigors of plastic injection molding processes, making them ideal for embedding during production of industrial containers.

Symmetry's Edge Network, Two-door, PoE-enabled Controller Delivers Flexible Options

EN-2DBC Edge Network Controller offers security installers a state-of-the-art panel.

Allegion to Host Press Conference at ASIS International 2014

Discussion consists of new company's new electronic security offerings and a school security seminar.

Video Insight Adds Access Control to Its Enterprise VMS at No Extra Charge

Latest version of VI Monitor v6 includes MonitorCastEDU, an access control product designed specifically for multi-campus education market.

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3