Access Control


When Buttons Are More Convenient than Cards

Integrates long range reading with increased device control in leading proximity or contactless smart card technologies.

Zwipe Biometric Card Holders Can Now Use Installed Proximity as well as Smart Card Readers

With biometric sensor directly on the card, organizations can also leverage legacy proximity card readers to add biometric authentication.

Napco Security Systems Continental Access Alarm Lock and Marks USA Exhibit Solutions at ASIS 2014

Featured products and solutions met and exceeded market demands for security, connectivity, locking and access control.

Viscount Systems Awarded US Patent for Freedom Security Technology

IP protection added, revolutionizing how access control systems are deployed and managed.

HID Mobile Access Included as Enterprise Solution in the Samsung Enterprise Alliance Program

Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.

Secura Key Offers Updated Card Ordering Guide

Allows resellers and customers to have a reference tool for all aspects of the card ordering process.

Man Posing as Member of Congress Gets Access to Secure Area at Obama Event

Man Posing as Member of Congress Gets Access to Secure Area at Obama Event

An unidentified man was able to get access to a secure area backstage at an appearance by the president

New Mobile Solution from Galaxy Control Systems Extends Access Control Reach and Functionality

New handheld reader ideal for mustering, remote/portable applications.



Galaxy Control Systems Offers Access Control Benefits for Education beyond the Conventional

System Galaxy v.10.4 enables innovative applications to track student movement.

New Galaxy Control Systems Remote Access Reader Sets New Benchmark in Polling Speed

Turbo485 delivers speeds up to 10X faster than conventional 485 readers using legacy RS485 architecture.

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

The man was a security contractor with three prior convictions for assault and battery.

Security is Personal

For small to medium-sized businesses (SMBs), access control needs to be affordable, scalable and easy to install, manage and maintain. Business is no longer left at the office, as today’s small business owner needs control and visibility of the organization while on the go.

What Does Apple

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?

Documentation for iOS8 confirms no open access for developers to the NFC controller in the phone and no NFC APIs in the iOS8 SDK.

Hubbell Lighting TOTUS Solutions and Axis Integrate LED and Surveillance into One Platform

Companies will demonstrate Spaulding Lighting’s Cimarron LED Fixture with Active Deterrence Surveillance at 2014 ASIS International Expo in Atlanta, GA.

Report Says Amazon is working on Smart-Home Devices

Report Says Amazon is working on Smart-Home Devices

The work will be done out of their secretive hardware unit, known as Lab126

Morse Watchmans Integration with Software House Streamlines Key Control and Management

Integration with C•CURE 9000 provides users with more effective and efficient management of personnel, credentials and assets.

HID Global Introduces Ultra-thin Epoxy Tag RFID Transponder

Epoxy Tag UHF units endure the rigors of plastic injection molding processes, making them ideal for embedding during production of industrial containers.

Symmetry's Edge Network, Two-door, PoE-enabled Controller Delivers Flexible Options

EN-2DBC Edge Network Controller offers security installers a state-of-the-art panel.

Allegion to Host Press Conference at ASIS International 2014

Discussion consists of new company's new electronic security offerings and a school security seminar.

Video Insight Adds Access Control to Its Enterprise VMS at No Extra Charge

Latest version of VI Monitor v6 includes MonitorCastEDU, an access control product designed specifically for multi-campus education market.

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.

Apple Can’t Unlock your iPhone for the Police, even with a Search Warrant

Apple Can’t Unlock Your iPhone for the Police, Even With a Search Warrant

The company says it has made it impossible in order to deflect allegations of collecting user information.

HID Global Achieves Four-star Austin Energy Green Building Rating

Facility’s AEGB rating follows recent LEED Platinum certification and recognition as one of Austin’s best new buildings, and required HID Global to meet even more stringent sustainability guidelines.

HID Global Ireland Receives Environmental Management System Certification

The first HID Global site in Europe to achieve ISO14001 certification and follows earlier accomplishment at company’s Malaysia operation, further reinforcing company’s commitment to reducing its daily environmental impact around the world.

IDSecurityOnline.com Ranks #214 on the 2014 Inc. 500 List

Named as the 4th fastest growing security company in the United States.

AMAG Technology Releases SymmetryWEB

Manage alarms, card holders and visitors from a web interface.

Napco Security Systems Delivers First Control4-certified Alarm Panel Line

Enables dealers to quickly and easily integrate security within projects and offer protection of homes and businesses.

STANLEY Security Donates Percentage of Proceeds to Wounded Warrior Project

Campaign in effect through December 28.

Tyco Brings CEM to Americas

The security products company brings its brand of intelligent access control solutions over.

Morse Watchmans Solutions Provide Hyatt Regency Dallas with Critical Security and Access Information

Iconic hotel in the heart of Dallas' historic district is committed to the back of the house.

Columnist Says Those with Footage Have the Power

Columnist Says Those with Footage Have the Power

In the aftermath of the Ray Rice Scandal, it comes down to those with the camera footage.

Siemens Building Technologies Teams with Quantum Secure

Significantly expands global channel for SAFE Suite of software products.

Idesco Partners with Brivo Systems to Provide Cloud-based Security Solutions

Security systems integrator takes managed services to the next level with Brivo’s cloud-based access control system.

Secura Key Offers 4-Door NOVA.16 Access Control Kits

Almost everything you need to control access to four doors.

3-D Printed Skeleton Key Can Open Almost Any Lock in Seconds

3-D Printed Skeleton Key Can Open Almost Any Lock in Seconds

Quickly breach high-security locks by using a printed "bump" key.

Windstorm Solutions for Hurricanes and Tornadoes

When it comes to windstorm solutions, it’s all code-driven as door, lock and hardware chosen for an opening are determined by hurricane or tornado codes. The challenge comes with knowing which codes apply.

Standardizing as a Breakthrough

Alcatel-Lucent, a leader in products and innovations in IP and cloud networking as well as ultra-broadband fixed and wireless access, is responsible for countless breakthroughs that have shaped the networking and communications industry.

The New Landscape

Managing access privileges for visitors, contractors and vendors in hospitals is a significant challenge for healthcare institutions.

HID Global and Chapman University Collaborate to Develop A Technology Incubation Environment

HID Global participates in program that sets challenge for student entrepreneurs to expand “Internet of Things” opportunities for HID Trusted Tag Services.

North Bend Schools Automate Lockdown with Genetec Security Center

Public school district in Nebraska upgrades to IP video surveillance and access control to better protect students.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.