Access Control


The ID Two Step

AS federal and state governments look for ways to ensure workers' identity, identification cards have come to be a hot topic. In addition to protecting physical assets -- buildings, infrastructure and other facilities -- government officials also are interested in maintaining the integrity of their computer networks.

Diagnosis: Security

JUST as physicians recommend that their patients obtain treatment early before a condition worsens, Intermountain Healthcare (IHC) also is addressing the issue of security before problems occur.

A Shot in the Arm

Cover Your Assets

THE cost of lost assets to companies has been demonstrated in many studies to be significant. The application of DVR technology has been proven to reduce this type of loss in a cost-effective manner.

A Remote Control

THE Edwin Holmes Co. created the central station intrusion alarm monitoring business model in Boston, in the 1850s.

Biometrics Come Calling

THE next time you consider installing a new access control system, you might want to think out of the box and go biometric.

The Key to Security

BADCOCK Home Furniture & More is a furniture retailer with a fleet of 45 tractors and 300 trailers, servicing nearly 330 stores in seven states throughout the southeast United States.

A Door Wide Open

IN the last four and a half years, new government mandates for tighter physical security at critical infrastructure sites have led to significant strides in physical access control innovation.



Flying Solo

SECURITY is something the airlines take very seriously, even more so after 9/11. Sun Country Airlines is no exception. And like other carriers, Sun Country is facing cost challenges greater than ever before.

ID Cards Get a Touch-Up

TEN years ago, the use of biometrics for identifying people was only seen in the movies -- too advanced for the real world.

Raising the Grade

THE Jessica Lunsford Act -- named for the nine-year old who was murdered by a construction worker at her school -- sent school districts throughout Florida scrambling to implement fingerprinting and screening systems to comply with the law.

A Human Intervention

THE landscape of information security continues to be dynamic. New threats emerge daily in the forms of new viruses, worms, phishing, pharming, social engineering and identity theft.

A Need for ID

Leaving a Mark on Security

IN a time when identity management and interoperable security initiatives are at the forefront of agendas and presidential mandates, security directors are implementing new biometric technologies that notably increase entry point protection, secure sensitive assets and reduce outside threats.

Saving Precious Time

LOCKOUT/TAGOUT or "red tagging" (also known as clearance tagging) is the critical procedure followed to ensure that equipment at the Fayette Power Project's three coal-fired generating units near La Grange, Texas, are safely shut down and energy sources isolated to prevent accidental release of stored energy, making it safe for their maintenance staff to begin working on equipment.

Playing on the Positive Side of Human Nature

MOST retailers are acutely aware of the impact employee theft has on their business. According to the University of Florida 2004 National Retail Security Survey, 47 percent of all shrink is attributed to employee theft.

Security Simplified

FOR its new Medical Arts & Research Building, the University of Connecticut standardized on a security system by using a simplified approach that combines after-hours electronic perimeter access control with interior mechanical locking. By effectively managing the access to the building itself, a less-complicated keying system that still provides the desired level of security can be used inside.

Vanderbilt Establishes International Headquarters in Germany

New office tied to acquisition of Siemens’ Security Products.

Intercede Receives Lenel Factory Certification

MyID identity and credential management solution interfaces with the Lenel OnGuard access control system.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3