Access Control


Streamline Traffic Flow

Streamline Traffic Flow

Building owners have found that integrating an elevator destination control system with its security management system enhances these benefits for tenants because they can use their credential for both access control and elevator access, but careful planning is a must to ensure cost effectiveness.

Gaining Intelligence

Gaining Intelligence

Today’s biometrics systems are moving identity authentication toward real time, accurate and secure, individual ID based on unique biometric characteristics, including iris patterns, fingerprint minutiae, facial structure or voice.

Upgrading Your Entrance Lanes

Upgrading Your Entrance Lanes

The PEC works by singling out any pedestrians attempting access without proper credentials.

Genetec Announced General Availability of Synergis Master Controller

Genetec Announced General Availability of Synergis Master Controller

A new, intelligent, IP, door controller addresses longstanding customer demand for non-proprietary access control solutions.

ASSA BLOY and HID Global Will Showcase Solutions at Mobile World Congress 2013

ASSA BLOY and HID Global Will Showcase Solutions at Mobile World Congress 2013

Article Highlights: HID Global will showcase the Seos ecosystem with parent company ASSA ABLOY and its group companies’ solutions in Pod #1 in the NFC Experience Center. ASSA ABLOY group company Yale Locks will be demonstrated in the GSMA Connected City. Seos digital credentials will be used with an Oberthur Technologies dragonFly NFC SIM card and ASSA ABLOY group company VingCard Elsafe locks in the Oberthur Technologies stand 6C81, Hall 6.

ABI Research Forecasts Dual Interface and Pure Contactless Smart Cards

ABI Research Forecasts Dual Interface and Pure Contactless Smart Cards

Over the next three years, ABI Research expects to see a shift in the penetration ratio of pure contactless and dual interface shipments.

Viscount Systems Awarded Contract to Secure Large Industrial Facility

Viscount Systems Awarded Contract to Secure Large Industrial Facility

This contract expands the Freedom Active Directory to run on the Microsoft Hyper-V Cloud.

FST21 Released Next Generation Version of SafeRise Solution

FST21 Released Next Generation Version of SafeRise Solution

FST21 has created the next generation of its award-winning product, SafeRise, which can manage and control entry points, common areas, elevators and parking lots.



Six Steps To Choosing Your Next Gen Intrusion Prevention System

Six Steps To Choosing Your Next Gen Intrusion Prevention System

IT professionals are adopting the latest technologies to meet increasing bandwidth demands, create higher and faster performing networks and increase availability.

PPM 2000 Receives Lenel Factory Certification from the OpenAccess Alliance Program

Perspective by PPM 2000 incident management software integrates with Lenel’s OnGuard access control security system.

Addressing The Insider Threat

Airline and airport workers require access to sensitive and restricted areas every day. Ensuring that only authorized staff has access to restricted areas is an important aspect of airport security, and one that requires the same high level of attention as passenger security threats.

Biometrics on the Front End

Unlike other forms of strong authentication, biometrics is the only means of determining who is using the system. Systems relying on PINs, passcodes or less reliable means of user authentication are rapidly becoming both ineffective and obsolete.

Worlds Colliding

There’s no question that the 21st century has brought significant change to security solutions. An abundance of connectivity options and the application of technologies—such as IP, virtualization, hosted solutions and mobile—are enhancing the way we secure the enterprise and helping to improve security.

v2.0 and Counting

Just as typewriters and paper gave way to personal computers and floppy disks, tablets, smartphones and the mobile apps that can be used on these devices are becoming the technology of choice for business and personal use, including the physical security industry.

Secure Issuance

The United States is looking for better and more cost-effective ways to serve its more than 220 million licensed drivers.

Current and Future Trends Abound

While technology developments such as near-field communications (NFC) and personal identification verification (PIV) credentials are becoming more widespread, emerging product developments that offer interesting challenges to the traditional concepts of access control, like ecosystems and access control as a service (ACaaS), are presenting more of an opportunity for suppliers of access control equipment.

Ease of Inspiration

There were dreams and promises of Minority Report-like video intelligence that could predict a crime before it happened. Fortunately, industry expectations have come back down to earth, and we’ve learned some valuable lessons along the way.

Network vs. Device Security

As virtual offices and remote workforces become the norm, so does the need for a secure mobile collaborative environment.

Developing Trust with Credentials

When the National Institute of Standards and Technology (NIST) developed the FIPS 201 standard, the government was using Wiegand wire, magnetic stripe, proximity or barcode credentials as part of their physical access control systems (PACS). Each of these technologies could be easily duplicated, making it virtually impossible to distinguish between a government-issued or forged credential.

The ABCs of Key Control

In developing a comprehensive physical security strategy, it’s important to include a key control plan as part of the overall security package. Key management systems can reinforce access control policies that are already in place and can also help to reduce the costs that are associated with lost keys or unmanaged access. It’s also important to know that it is never too late -- or too early -- to implement a key control and management plan as part of an overall physical security strategy. And if you’re not sure about how to proceed, the following three questions may provide the answers for you.

Gunnebo Wins Major Order for Access Control in Riyadh, Saudi Arabia

“We chose Gunnebo since its products comply with the Aramco Functional Specification Document. The products are required to be high-quality in design and easy to maintain,” states Engr. Ihab N. Gazawi, Security Systems Engineer, Saudi Business Machines Ltd.

HID Global's Access Control Solution Safeguards China Hospital

First Affiliated Hospital of Jinan University in Guangzhou, China has selected HID Global's networked access control solutions and contactless readers to provide multi-layered security with advanced access control level settings and centralized monitoring to improve the hospital’s overall security in key access zones.

Lenel and Mercury Security Sign Contract for Access Control Hardware

Mercury Security Corporation has signed a long-term contract with Lenel Systems to provide access control hardware for use with the Lenel OnGuard® Total Security Platform.

Smarter Security Easy Control Solutions Protecting Vocus Headquarters

Smarter Security, Inc., provider of premium, innovative entrance control and outdoor security solutions, today announced that Vocus recently deployed Fastlane GlassGate™ 200 optical turnstiles in the main lobby of the company’s new headquarters building in Beltsville, Maryland.

Integrator Support Partnering With Brivo Systems

Brivo Systems LLC, leader in cloud applications for security management, today announced that it has entered into a new partnership agreement with Integrator Support.

Milestone XProtect IP Video Helps Protect Brampton Manor Academy

Milestone Systems, the open platform company in IP video management software (VMS), has formed the centerpiece of a major surveillance upgrade in a 1,500 pupil school based in East London called the Brampton Manor Academy.

Smarter Security Protects New Vocus Headquarters Building

Vocus recently has deployed Smarter Security's Fastlane GlassGate™ 200 optical turnstiles in the main lobby of the company’s new headquarters building in Beltsville, Maryland.

ObjectVideo Supports International Weapons Security Teams

Sandia National Laboratories' International Nuclear Security Engineering department is using ObjectVideo's OV6 video analytics software for training purposes.

Luxury Complex Installs Morse Watchmans Key Control System

At the garden-style, gated Brookview Apartment community in Marlton, NJ, Property Manager Eric Schulz is working to prevent problems with the help of a Morse Watchmans automated key control and asset management system.

From The Edge To The Cloud

System designers must ensure that sufficient storage is available to archive video for the required length of time and at the required frame rate and resolution.

Security Ahoy

Security Ahoy!

Emeryville Marina is located on 14 acres of land that extend out into San Francisco Bay. It is a popular local attraction with 381 permitted boat slips and hundreds of visitors every day.

High-quality sound systems can be implemented over a virtually limitless, multi-zone area

Audio Combines Communication And Security

Over the past two decades, many widely known incidents have occurred that have caused the loss of life. Emergency situations, ranging from the 9/11 attacks to fires to public stampedes at sports and religious gatherings, have caused various agencies to begin to analyze the weaknesses of all types of communications systems used in venues and transportation hubs worldwide.

Video Insight Receives Lenel Factory Certification

Video Insight announced that it has received Lenel factory certification and joined the Lenel OpenAccess Alliance Program (OAAP).

Salient Systems Becomes AMAG Technology Certified Partner

Salient Systems is now a member of AMAG Technology’s new Symmetry™ Extended Business Solutions Program as a Certified Partner.

Western Rim Selects KeyLink for Key Management Systems

Western Rim Property Services, owner and manager of more than 7,500 apartment homes in Texas, has selected BuildingLink's KeyLink for key management systems in 13 luxury properties in Texas.

Morse Watchman Extends KeyWatcher at UCSF

Working closely with the client, Morse Watchmans has upgraded and expanded the KeyWatcher key control and management system at the University of California, San Francisco (UCSF).

Jericho Systems Named Best Privacy Technology of 2012

Jericho systems' Enterspace Exchange PatientPortal was named Best Privacy Technology of 2012 during the Second International Summit on the Future of Health Privacy in Washington, D.C.

University Wins Award for HID Global Mobile Access Control Pilot

The National Association of Campus Card Users (NACCU) has awarded Arizona State University's HID Global mobile access control pilot with the inaugural Innovative Technology Award.

One World, One Call

Many of today’s growth-oriented businesses aim to extend operations to other states and countries after solidifying success in existing markets, and this trend will only continue to accelerate.

Supporting PIV I Cards

When your physical access control system (PACS) manufacturer tells you its system supports PIV-I “end-to-end,” you might want to do some additional digging to make sure you both agree as to what that really means.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3