Access Control


From the Product Manager's POV

HIRSCH Electronics is no stranger to introducing new products or winning accolades among its peers. From the competition at ISC West, Hirsch won a special achievement award in the Security Industry Association's New Product Showcase in Las Vegas. We thought readers should know more about the RUU-201 Verification Station, so we talked to Scott Howell of Hirsch Electronics.

A Fast Read

IN some cases, companies implementing biometrics will initially encounter employee resistance, with the issues of privacy and hygiene taking center stage. This will invariably be the case if a union is involved and is looking for negotiating points.

Who Are You?

IDENTITY theft has changed the public's perspective on financial security. Phising scams take consumers to Web sites almost identical to their trusted bank, a stolen driver license can lead to forged checks, a stolen Social Security number can open numerous credit card accounts and card cloning has left the public vulnerable.

Biometrics To Go

CONTRARY to using badges, sign-ins or other ways of tracking employees, a biometric reader ensures no employee can punch in for another, eliminating time fraud and reducing payroll costs. Because every person's biometric features—hand, fingerprint, eye or face—are unique, a biometric time clock provides a quick, accurate and reliable way to record in and out punches for each employee. That’s why so many companies, including fast food restaurants, now employ biometrics.

Raising the Bar

Raising the bar is a phrase commonly associated with pole vaulting or high jumping. At the Utah Summer Games, officials also are raising the bar on efficiency and security with a speedier, more stringent ID card program for athletes.



A Knack for Access

NETWORK access control is one of the hottest topics in IT today. Despite this, available approaches are either fragmented or not ready for widespread implementation. In order to understand this phenomenon, users must evaluate current approaches and understand the process of implementing a NAC solution. When implementing network access control, the first set of decisions that need to be made regarding network policy. The first necessary question for a NAC project is: Why does it need to be implemented and what is expected from implementation?

Getting Carded

IN recent years, investigative reporters have uncovered security vulnerabilities in what are believed to be closely monitored applications: school buildings. In too many instances, investigators are able to slip into school buildings without being stopped, and administrators find out about the security breach on the evening news.

The Last Word

IT'S a simple enough request at most companies -- the last person to leave the office should lock the doors. But many times, one of the most basic tenants of access control can be compromised by something as simple as a forgetful employee.

Homeland Security Insider

FOUR years in the making, the drive to implement HSPD-12 at long last began by issuing smart identification cards last October. Every federal agency has now opened at least one facility where employees can go to get personal identification verification (PIV) cards fitted to the strict criteria of FIPS 201. This year, federal agencies will begin to activate a massive interoperable system of card readers in which any agency's readers will be able to read and process cards presented by any and all federal employees -- no matter what agency employs them.

A New Deal

RECENTLY, security dealers and integrators in the access control industry have seen a great shake-up. Widespread demand and overall adoption of IP-compatible devices has, in many cases, introduced security dealers to the IT world for the first time.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

Questions and Answers From the Top

BANKS and larger financial institutions are interested in making the most of the newest security technologies and analytical software solutions to better protect assets, employees and customers.

Check Mate

IN the last 10 years, the background screening industry has grown tremendously and has moved from being a process used for security clearance, law enforcement and high-level, sensitive government jobs to an integral part of the hiring process of the vast majority of firms in the United States. Beth Miller of DataCheck Inc., located in San Clemente, Calif., said it best, as "more and more companies are conducting background screenings, it is becoming an everyday process and part of the norm."

Product Spotlight

HONEYWELL has more than 30 years of experience in offering security professionals innovative products and solutions, and company experts have years of service in addressing complex access control situations. In a recent interview with Security Products, Beth Thomas, product manager for Honeywell readers and credentials, discussed the impact ID management and biometric technology has on HSPD-12 and FIPS 201.

Child's Play

"DON'T you love it when a plan comes together?" said Sean Mullin, president of BI2 Technologies and founder of The CHILD Project<sup>TM</sup>, a secure, nationwide network and registry that enables law enforcement and social service agencies to positively identify missing children and adults using iris recognition biometric technology.

Face the Future

BIOMETRIC authentication has come a long way from its humble beginnings in 14th century China where merchants would stamp children's hand and footprints on paper to distinguish them. After seven centuries, though, unique physiological and behavioral characteristics are still used as means of identification.

Industry Insight

GIVEN the current geopolitical climate, driving security initiatives forward is high on the agenda for both government and enterprise. Interest in the increased security and authentication capabilities afforded by smart cards has accelerated worldwide.

The Total Package

ELECTRONIC security products and systems play an ever-increasing role in managing access and egress in today's buildings.

Glance of the Eye

While biometrics was a concept not yet invented in Emerson's day, the quote still applies perfectly to the technique at the heart of Panasonic's BM-ET330 iris recognition system.

Right On Track

SEPTEMBER 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

Flying High

NOWADAYS, it takes much more to have a safe flight, and airports are strengthening security to ensure passengers do travel safely.

Making the Grade

TO create a safe school environment that allows teachers and students to focus on learning, the Palm Beach County, Fla., School District created the Safe Schools Institute (SSI).

Break a Leg

LOCATED about as far as a typical Tiger Woods half-wedge shot from the San Antonio Spurs practice facility, the Texas Center for Athletes could soon be the premier medical facility in South Texas.

The Magic Touch

THE fluctuating state of global migration, combined with international terrorism threats, make ID verification increasingly important at border crossings. According to Customs and Border Protection, in 2005, the United States had an average of 1.2 million visitors per day at the 314 land, air and seaports last year.

The Last Word

THANKS to being almost 1,000 miles away from any land mass, the Galapagos Islands on the Pacific Ocean are famous for the unique and self-supporting habitat that contains thousands of species of plants and animals native to the area.

The ID Two Step

AS federal and state governments look for ways to ensure workers' identity, identification cards have come to be a hot topic. In addition to protecting physical assets -- buildings, infrastructure and other facilities -- government officials also are interested in maintaining the integrity of their computer networks.

Diagnosis: Security

JUST as physicians recommend that their patients obtain treatment early before a condition worsens, Intermountain Healthcare (IHC) also is addressing the issue of security before problems occur.

A Shot in the Arm

Cover Your Assets

THE cost of lost assets to companies has been demonstrated in many studies to be significant. The application of DVR technology has been proven to reduce this type of loss in a cost-effective manner.

A Remote Control

THE Edwin Holmes Co. created the central station intrusion alarm monitoring business model in Boston, in the 1850s.

Biometrics Come Calling

THE next time you consider installing a new access control system, you might want to think out of the box and go biometric.

The Key to Security

BADCOCK Home Furniture & More is a furniture retailer with a fleet of 45 tractors and 300 trailers, servicing nearly 330 stores in seven states throughout the southeast United States.

A Door Wide Open

IN the last four and a half years, new government mandates for tighter physical security at critical infrastructure sites have led to significant strides in physical access control innovation.

Flying Solo

SECURITY is something the airlines take very seriously, even more so after 9/11. Sun Country Airlines is no exception. And like other carriers, Sun Country is facing cost challenges greater than ever before.

ID Cards Get a Touch-Up

TEN years ago, the use of biometrics for identifying people was only seen in the movies -- too advanced for the real world.

Raising the Grade

THE Jessica Lunsford Act -- named for the nine-year old who was murdered by a construction worker at her school -- sent school districts throughout Florida scrambling to implement fingerprinting and screening systems to comply with the law.

A Human Intervention

THE landscape of information security continues to be dynamic. New threats emerge daily in the forms of new viruses, worms, phishing, pharming, social engineering and identity theft.

Featured

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.