Access Control


Saflink, IdentiPHI Announce Merger

Under the terms of the merger agreement, Saflink will acquire all of the outstanding shares of IdentiPHI in a stock-for-stock transaction.

Channel Surfing

When managers at Ingersoll Rand sought to enhance the efficiency of their dealer sales channel, they turned to a Web access and identity management solution for help. This global manufacturer of industrial products and services distributes some of the world’s most popular industrial brands.

Study: Silicon Fingerprint Sensor Market Set To Thrive

With almost every major PC manufacturer integrating silicon chip fingerprint sensors in their products, the market appears set to thrive.

Biometrics Help Increase Security For Storage Facility

Security is always a selling point for the self-storage industry and customers who take advantage of having an extra place to store everything under the sun.



Dispelling the Myths

DISPELLING myths and misunderstandings about biometrics and its increasingly common use in everyday professional and personal lives is a tough task, even in these modern, technologically-advanced times.

Clamoring For Registered Traveler

From the Product Manager's POV

HIRSCH Electronics is no stranger to introducing new products or winning accolades among its peers. From the competition at ISC West, Hirsch won a special achievement award in the Security Industry Association's New Product Showcase in Las Vegas. We thought readers should know more about the RUU-201 Verification Station, so we talked to Scott Howell of Hirsch Electronics.

A Fast Read

IN some cases, companies implementing biometrics will initially encounter employee resistance, with the issues of privacy and hygiene taking center stage. This will invariably be the case if a union is involved and is looking for negotiating points.

Who Are You?

IDENTITY theft has changed the public's perspective on financial security. Phising scams take consumers to Web sites almost identical to their trusted bank, a stolen driver license can lead to forged checks, a stolen Social Security number can open numerous credit card accounts and card cloning has left the public vulnerable.

Biometrics To Go

CONTRARY to using badges, sign-ins or other ways of tracking employees, a biometric reader ensures no employee can punch in for another, eliminating time fraud and reducing payroll costs. Because every person's biometric features—hand, fingerprint, eye or face—are unique, a biometric time clock provides a quick, accurate and reliable way to record in and out punches for each employee. That’s why so many companies, including fast food restaurants, now employ biometrics.

Raising the Bar

Raising the bar is a phrase commonly associated with pole vaulting or high jumping. At the Utah Summer Games, officials also are raising the bar on efficiency and security with a speedier, more stringent ID card program for athletes.

A Knack for Access

NETWORK access control is one of the hottest topics in IT today. Despite this, available approaches are either fragmented or not ready for widespread implementation. In order to understand this phenomenon, users must evaluate current approaches and understand the process of implementing a NAC solution. When implementing network access control, the first set of decisions that need to be made regarding network policy. The first necessary question for a NAC project is: Why does it need to be implemented and what is expected from implementation?

Getting Carded

IN recent years, investigative reporters have uncovered security vulnerabilities in what are believed to be closely monitored applications: school buildings. In too many instances, investigators are able to slip into school buildings without being stopped, and administrators find out about the security breach on the evening news.

The Last Word

IT'S a simple enough request at most companies -- the last person to leave the office should lock the doors. But many times, one of the most basic tenants of access control can be compromised by something as simple as a forgetful employee.

Homeland Security Insider

FOUR years in the making, the drive to implement HSPD-12 at long last began by issuing smart identification cards last October. Every federal agency has now opened at least one facility where employees can go to get personal identification verification (PIV) cards fitted to the strict criteria of FIPS 201. This year, federal agencies will begin to activate a massive interoperable system of card readers in which any agency's readers will be able to read and process cards presented by any and all federal employees -- no matter what agency employs them.

A New Deal

RECENTLY, security dealers and integrators in the access control industry have seen a great shake-up. Widespread demand and overall adoption of IP-compatible devices has, in many cases, introduced security dealers to the IT world for the first time.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

Questions and Answers From the Top

BANKS and larger financial institutions are interested in making the most of the newest security technologies and analytical software solutions to better protect assets, employees and customers.

Check Mate

IN the last 10 years, the background screening industry has grown tremendously and has moved from being a process used for security clearance, law enforcement and high-level, sensitive government jobs to an integral part of the hiring process of the vast majority of firms in the United States. Beth Miller of DataCheck Inc., located in San Clemente, Calif., said it best, as "more and more companies are conducting background screenings, it is becoming an everyday process and part of the norm."

Product Spotlight

HONEYWELL has more than 30 years of experience in offering security professionals innovative products and solutions, and company experts have years of service in addressing complex access control situations. In a recent interview with Security Products, Beth Thomas, product manager for Honeywell readers and credentials, discussed the impact ID management and biometric technology has on HSPD-12 and FIPS 201.

Child's Play

"DON'T you love it when a plan comes together?" said Sean Mullin, president of BI2 Technologies and founder of The CHILD Project<sup>TM</sup>, a secure, nationwide network and registry that enables law enforcement and social service agencies to positively identify missing children and adults using iris recognition biometric technology.

Face the Future

BIOMETRIC authentication has come a long way from its humble beginnings in 14th century China where merchants would stamp children's hand and footprints on paper to distinguish them. After seven centuries, though, unique physiological and behavioral characteristics are still used as means of identification.

The Total Package

ELECTRONIC security products and systems play an ever-increasing role in managing access and egress in today's buildings.

Glance of the Eye

While biometrics was a concept not yet invented in Emerson's day, the quote still applies perfectly to the technique at the heart of Panasonic's BM-ET330 iris recognition system.

Industry Insight

GIVEN the current geopolitical climate, driving security initiatives forward is high on the agenda for both government and enterprise. Interest in the increased security and authentication capabilities afforded by smart cards has accelerated worldwide.

Right On Track

SEPTEMBER 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

Flying High

NOWADAYS, it takes much more to have a safe flight, and airports are strengthening security to ensure passengers do travel safely.

Making the Grade

TO create a safe school environment that allows teachers and students to focus on learning, the Palm Beach County, Fla., School District created the Safe Schools Institute (SSI).

Break a Leg

LOCATED about as far as a typical Tiger Woods half-wedge shot from the San Antonio Spurs practice facility, the Texas Center for Athletes could soon be the premier medical facility in South Texas.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.