Access Control


Getting Carded

IN recent years, investigative reporters have uncovered security vulnerabilities in what are believed to be closely monitored applications: school buildings. In too many instances, investigators are able to slip into school buildings without being stopped, and administrators find out about the security breach on the evening news.

The Last Word

IT'S a simple enough request at most companies -- the last person to leave the office should lock the doors. But many times, one of the most basic tenants of access control can be compromised by something as simple as a forgetful employee.

Homeland Security Insider

FOUR years in the making, the drive to implement HSPD-12 at long last began by issuing smart identification cards last October. Every federal agency has now opened at least one facility where employees can go to get personal identification verification (PIV) cards fitted to the strict criteria of FIPS 201. This year, federal agencies will begin to activate a massive interoperable system of card readers in which any agency's readers will be able to read and process cards presented by any and all federal employees -- no matter what agency employs them.

A New Deal

RECENTLY, security dealers and integrators in the access control industry have seen a great shake-up. Widespread demand and overall adoption of IP-compatible devices has, in many cases, introduced security dealers to the IT world for the first time.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

Questions and Answers From the Top

BANKS and larger financial institutions are interested in making the most of the newest security technologies and analytical software solutions to better protect assets, employees and customers.

Check Mate

IN the last 10 years, the background screening industry has grown tremendously and has moved from being a process used for security clearance, law enforcement and high-level, sensitive government jobs to an integral part of the hiring process of the vast majority of firms in the United States. Beth Miller of DataCheck Inc., located in San Clemente, Calif., said it best, as "more and more companies are conducting background screenings, it is becoming an everyday process and part of the norm."

Product Spotlight

HONEYWELL has more than 30 years of experience in offering security professionals innovative products and solutions, and company experts have years of service in addressing complex access control situations. In a recent interview with Security Products, Beth Thomas, product manager for Honeywell readers and credentials, discussed the impact ID management and biometric technology has on HSPD-12 and FIPS 201.



Child's Play

"DON'T you love it when a plan comes together?" said Sean Mullin, president of BI2 Technologies and founder of The CHILD Project<sup>TM</sup>, a secure, nationwide network and registry that enables law enforcement and social service agencies to positively identify missing children and adults using iris recognition biometric technology.

Face the Future

BIOMETRIC authentication has come a long way from its humble beginnings in 14th century China where merchants would stamp children's hand and footprints on paper to distinguish them. After seven centuries, though, unique physiological and behavioral characteristics are still used as means of identification.

Industry Insight

GIVEN the current geopolitical climate, driving security initiatives forward is high on the agenda for both government and enterprise. Interest in the increased security and authentication capabilities afforded by smart cards has accelerated worldwide.

The Total Package

ELECTRONIC security products and systems play an ever-increasing role in managing access and egress in today's buildings.

Glance of the Eye

While biometrics was a concept not yet invented in Emerson's day, the quote still applies perfectly to the technique at the heart of Panasonic's BM-ET330 iris recognition system.

Right On Track

SEPTEMBER 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

Flying High

NOWADAYS, it takes much more to have a safe flight, and airports are strengthening security to ensure passengers do travel safely.

Making the Grade

TO create a safe school environment that allows teachers and students to focus on learning, the Palm Beach County, Fla., School District created the Safe Schools Institute (SSI).

Break a Leg

LOCATED about as far as a typical Tiger Woods half-wedge shot from the San Antonio Spurs practice facility, the Texas Center for Athletes could soon be the premier medical facility in South Texas.

The Magic Touch

THE fluctuating state of global migration, combined with international terrorism threats, make ID verification increasingly important at border crossings. According to Customs and Border Protection, in 2005, the United States had an average of 1.2 million visitors per day at the 314 land, air and seaports last year.

The Last Word

THANKS to being almost 1,000 miles away from any land mass, the Galapagos Islands on the Pacific Ocean are famous for the unique and self-supporting habitat that contains thousands of species of plants and animals native to the area.

The ID Two Step

AS federal and state governments look for ways to ensure workers' identity, identification cards have come to be a hot topic. In addition to protecting physical assets -- buildings, infrastructure and other facilities -- government officials also are interested in maintaining the integrity of their computer networks.

Diagnosis: Security

JUST as physicians recommend that their patients obtain treatment early before a condition worsens, Intermountain Healthcare (IHC) also is addressing the issue of security before problems occur.

A Shot in the Arm

Cover Your Assets

THE cost of lost assets to companies has been demonstrated in many studies to be significant. The application of DVR technology has been proven to reduce this type of loss in a cost-effective manner.

A Remote Control

THE Edwin Holmes Co. created the central station intrusion alarm monitoring business model in Boston, in the 1850s.

Biometrics Come Calling

THE next time you consider installing a new access control system, you might want to think out of the box and go biometric.

The Key to Security

BADCOCK Home Furniture & More is a furniture retailer with a fleet of 45 tractors and 300 trailers, servicing nearly 330 stores in seven states throughout the southeast United States.

A Door Wide Open

IN the last four and a half years, new government mandates for tighter physical security at critical infrastructure sites have led to significant strides in physical access control innovation.

Flying Solo

SECURITY is something the airlines take very seriously, even more so after 9/11. Sun Country Airlines is no exception. And like other carriers, Sun Country is facing cost challenges greater than ever before.

ID Cards Get a Touch-Up

TEN years ago, the use of biometrics for identifying people was only seen in the movies -- too advanced for the real world.

Raising the Grade

THE Jessica Lunsford Act -- named for the nine-year old who was murdered by a construction worker at her school -- sent school districts throughout Florida scrambling to implement fingerprinting and screening systems to comply with the law.

A Human Intervention

THE landscape of information security continues to be dynamic. New threats emerge daily in the forms of new viruses, worms, phishing, pharming, social engineering and identity theft.

A Need for ID

Leaving a Mark on Security

IN a time when identity management and interoperable security initiatives are at the forefront of agendas and presidential mandates, security directors are implementing new biometric technologies that notably increase entry point protection, secure sensitive assets and reduce outside threats.

Saving Precious Time

LOCKOUT/TAGOUT or "red tagging" (also known as clearance tagging) is the critical procedure followed to ensure that equipment at the Fayette Power Project's three coal-fired generating units near La Grange, Texas, are safely shut down and energy sources isolated to prevent accidental release of stored energy, making it safe for their maintenance staff to begin working on equipment.

Playing on the Positive Side of Human Nature

MOST retailers are acutely aware of the impact employee theft has on their business. According to the University of Florida 2004 National Retail Security Survey, 47 percent of all shrink is attributed to employee theft.

Security Simplified

FOR its new Medical Arts & Research Building, the University of Connecticut standardized on a security system by using a simplified approach that combines after-hours electronic perimeter access control with interior mechanical locking. By effectively managing the access to the building itself, a less-complicated keying system that still provides the desired level of security can be used inside.

Vanderbilt Establishes International Headquarters in Germany

New office tied to acquisition of Siemens’ Security Products.

Intercede Receives Lenel Factory Certification

MyID identity and credential management solution interfaces with the Lenel OnGuard access control system.

Featured

  • Security Today Announces The Govies Government Security Award Winners for 2025

    Security Today is pleased to announce the 2025 winners in The Govies Government Security Awards. The awards honor outstanding government security products in a variety of categories. Read Now

  • Survey: 60 Percent of Organizations Using AI in IT Infrastructure

    Netwrix, a cybersecurity provider focused on data and identity threats, today announced the release of its annual global 2025 Cybersecurity Trends Report based on a global survey of 2,150 IT and security professionals from 121 countries. It reveals that 60% of organizations are already using artificial intelligence (AI) in their IT infrastructure and 30% are considering implementing AI. Read Now

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • SIA Urges Tariff Relief for Security Industry Products

    Today, the Security Industry Association has sent a letter to U.S. Trade Representative Jamieson Greer and U.S. Secretary of Commerce Howard Lutnick requesting relief from tariffs for security industry products and asking that the Trump administration formulate a process that allows companies to apply for product-specific exemptions. The security industry is an important segment of the U.S. economy, contributing over $430 billion in total economic impact and supporting over 2.1 million jobs. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.