Access Control


The ID Two Step

AS federal and state governments look for ways to ensure workers' identity, identification cards have come to be a hot topic. In addition to protecting physical assets -- buildings, infrastructure and other facilities -- government officials also are interested in maintaining the integrity of their computer networks.

Diagnosis: Security

JUST as physicians recommend that their patients obtain treatment early before a condition worsens, Intermountain Healthcare (IHC) also is addressing the issue of security before problems occur.

A Shot in the Arm

Cover Your Assets

THE cost of lost assets to companies has been demonstrated in many studies to be significant. The application of DVR technology has been proven to reduce this type of loss in a cost-effective manner.

A Remote Control

THE Edwin Holmes Co. created the central station intrusion alarm monitoring business model in Boston, in the 1850s.

Biometrics Come Calling

THE next time you consider installing a new access control system, you might want to think out of the box and go biometric.

The Key to Security

BADCOCK Home Furniture & More is a furniture retailer with a fleet of 45 tractors and 300 trailers, servicing nearly 330 stores in seven states throughout the southeast United States.

A Door Wide Open

IN the last four and a half years, new government mandates for tighter physical security at critical infrastructure sites have led to significant strides in physical access control innovation.



Flying Solo

SECURITY is something the airlines take very seriously, even more so after 9/11. Sun Country Airlines is no exception. And like other carriers, Sun Country is facing cost challenges greater than ever before.

ID Cards Get a Touch-Up

TEN years ago, the use of biometrics for identifying people was only seen in the movies -- too advanced for the real world.

Raising the Grade

THE Jessica Lunsford Act -- named for the nine-year old who was murdered by a construction worker at her school -- sent school districts throughout Florida scrambling to implement fingerprinting and screening systems to comply with the law.

A Human Intervention

THE landscape of information security continues to be dynamic. New threats emerge daily in the forms of new viruses, worms, phishing, pharming, social engineering and identity theft.

A Need for ID

Leaving a Mark on Security

IN a time when identity management and interoperable security initiatives are at the forefront of agendas and presidential mandates, security directors are implementing new biometric technologies that notably increase entry point protection, secure sensitive assets and reduce outside threats.

Saving Precious Time

LOCKOUT/TAGOUT or "red tagging" (also known as clearance tagging) is the critical procedure followed to ensure that equipment at the Fayette Power Project's three coal-fired generating units near La Grange, Texas, are safely shut down and energy sources isolated to prevent accidental release of stored energy, making it safe for their maintenance staff to begin working on equipment.

Playing on the Positive Side of Human Nature

MOST retailers are acutely aware of the impact employee theft has on their business. According to the University of Florida 2004 National Retail Security Survey, 47 percent of all shrink is attributed to employee theft.

Security Simplified

FOR its new Medical Arts & Research Building, the University of Connecticut standardized on a security system by using a simplified approach that combines after-hours electronic perimeter access control with interior mechanical locking. By effectively managing the access to the building itself, a less-complicated keying system that still provides the desired level of security can be used inside.

Vanderbilt Establishes International Headquarters in Germany

New office tied to acquisition of Siemens’ Security Products.

Intercede Receives Lenel Factory Certification

MyID identity and credential management solution interfaces with the Lenel OnGuard access control system.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3