Facility Security


Design Dynamics

A comprehensive fire and life safety design requires a cohesive blend of alarm and detection capabilities, an appropriate suppression system and a number of other building construction features related to occupancy, facility type and use of space. Planning, an often overlooked component, is integral to keeping occupants safe.

Stopped In Their Tracks

Before Sept. 11, 2001, perimeter security provided an extra barrier of protection for an airport and its people—typically from hijackers and vandals. Although that is still true, there is now an added threat. Today, we cannot afford to let a terrorist or attacker get near airport facilities, people or passengers. In all too many cases, getting close is all they have to do.

Taiwan University Launches Campus-Wide Video Surveillance With Wireless Mesh Network

Taiwan’s Tajen University now ensures campus safety and delivers Wi-Fi access to its 12,000 students and staff using a wireless network infrastructure from Firetide Inc.

University Of Minnesota Uses Two-Factor Authentication Solution

Secure Computing Corp., a enterprise gateway security company, recently announced that University of Minnesota has selected the company's Secure SafeWord (formerly known as SafeWord) as a two-factor authentication solution for 8,000 staff and faculty members.

HID Global Launches IT Channel Program

HID Global recently announced the launch of the HID Global IT Channel Program, established to facilitate identity and access management with leading third-party IT vendors focused on providing secure data access software and integrated strong authentication solutions.

Optellios Announces Hardened, Multi-Zone Intrusion Detection System

Optellios Inc. announced recently that it will be launching a new family of FiberPatrol intrusion detection systems featuring modular, environmentally hardened 4-zone alarm processors. The company will be demonstrating the product at Booth 1044 at ISC West.

RFID Solution Protects Newborns During Hospital Stay

It’s some of the worst nightmares for the parents of a newborn -- their child being abducted or switched during the hospital stay. But thanks to a RFID solution from Xmark, parents are resting just a little easier.

Generation Next

Building security has moved beyond locks and dependable security guards. Today’s threats require sophisticated security. The next generation of access control will converge physical and network security into one manageable entity.



A Boost at the Border

Mention border security, and you might imagine the intersection of two countries, or perhaps the border separating government facilities from private land. But border security also can be defined as perimeter security, which expands the concept to encompass walls, fences, roads and other perimeters around businesses, schools, prisons, utilities, research facilities, and other properties and buildings.

A Way Out

They may not be as cutting edge as video analytics and other new security breakthroughs— but every building has them.

Information is Power

When an incident occurs on campus, the main obstacle is bridging the gap between those who have information concerning the event and those who need to know. Two examples can be used to analyze this problem.

Sound the Alarm

If you pick up any local employment guide, you cannot avoid seeing the many call centers with ads that read, “Customer service representatives wanted—immediate hire.” Why are these call centers continuously struggling with hiring and turnover?

GPS/Wireless Devices Will Track, Manage Security Personnel At Super Bowl

At this year’s Super Bowl, GPS/wireless tracking devices will be used to monitor, track, and manage security personnel in real-time via the Internet, which may speed up security incident response times.

By the Book

Whether in retrofit or new construction on college campuses, the business case for deploying wireless access control systems in networked openings is compelling. Wireless solutions seamlessly integrate into existing access control panels, eliminating wire between locks and access control panel interfaces and providing a complete solution at each opening. Implementing a wireless solution takes significantly less time than its traditional hardwired counterpart.

The Business of Knowing

You’ve all seen that guy in the hallway: that unfamiliar face. “He must be the new guy.” “He must be here for a meeting.” “Isn’t he Jane’s husband?” “He probably works for facility management.” In too many cases, employee simply do not know who or why that person is wandering around the premises

Corrective Action

Correctional facility infrastructures are aging, inmate populations in the United States are increasing, and the cost of operating jails and prisons is growing twice as fast. Correctional facility officials know these facts all too well.

A Message for the Masses

Towering high-rises, sprawling college campuses and mass transit hubs can all have hundreds or thousands of people occupying them at any given moment. When a crisis emerges, it’s critical to protect lives, and that job becomes difficult when people are spread throughout a facility or across a wide area.

Just Say No

Administrators at Haltom High School in Haltom City, Texas, wanted their school’s ID cards to be useful, but never did they imagine the cards would help thwart a drug dealer. “We have used student and faculty ID cards for the last decade,” said Rick Mauderer, associate principal at Haltom High School and the person responsible for the school’s ID program. “As a high school of more than 2,600 students, there is no way we can know who every student is, especially with substitute teachers in the building.

Meeting the Mandates

The Department of Homeland Security’s publication of chemical facilities anti-terrorism (CFAT) standards has many chemical and petrochemical companies scrambling to develop security plans for their high-risk facilities. The continued post-9/11 threat of terrorism dictates urgency, and the DHS put teeth in the CFAT rules.

Out With the Old

In Cincinnati, when you say “school’s out,” it has a whole different meaning. That’s because all 65 schools in the Cincinnati Public School District—encompassing preschool through grade 12—are part of a massive, $1 billion facilities master plan that will completely change the face of the city’s educational infrastructure.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3