Access control readers have been around commercially since the 1980s, along with physical badge credentials to open doors. Initially, these were magstripes, then proximity cards, then smart cards. The problem is, however is, these are still cards. Plastic cards that identify who you are, and where you work. In a world where technology is being innovated faster than ever before more sustainable alternatives are required.
- By Jason Bohrer
- May 16, 2023
It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door.
- By Brian Davidson
- Mar 23, 2023
With the evolving dynamics of cloud storage and the ability to harness and proactively employ an ever-increasing pool of big data, AI in the form of machine learning and deep learning has become a disruptive technological force in the physical security industry.
- By Kurt Measom
- Dec 02, 2020
Customers and the public trust security firms to safeguard people, places and information. This trust is quickly destroyed when security staff commit a crime, which is often due to inadequately prescreening job candidates during the interview process.
- By Todd Mickelsen
- Dec 02, 2020
As biometric readers play an increasingly prominent role in law enforcement, one of the newest high-value use cases is the ability to identify persons of interest on the street using smaller mobile biometric readers that are easy and safe for officers to both carry and use.
- By Russell Megonigal
- Oct 06, 2020
Security consultants say that they are advising clients against proximity cards for access control due to the ease of copying some electronic access cards.
- By Haley Samsel
- Oct 15, 2019
Employers are becoming more vigilant about workplace security, implementing intensive screenings for job candidates and electronic badge systems for employees.
- By Haley Samsel
- Jul 02, 2019
The way that smart cards are issued has changed dramatically in the last several years with the advent of cloud-based systems that enable the entire process to be managed and executed remotely, and with printer/encoder breakthroughs that significantly boost throughput, reliability and energy efficiency.
- By Robin Tandon
- Feb 01, 2019
Recent cyberattacks highlight the need to know who you are interacting with in email and online activities, and who you grant access to your networks and physical facilities.
- By Gerald Hubbard
- Sep 01, 2017
Three years ago, Shrader Engineering had the privilege of designing one of the most unique security concepts in the region for the city of Sugar Land, Texas, Police Department. The security system forms a “virtual gateway” throughout the city.
- By Mark H. Friday
- Apr 01, 2017
It can be difficult to decide whether and when to make the transition to new access control technology. Transitions are often delayed over budget concerns or because of worries that the process will adversely impact productivity and workflow.
- By Brandon Arcment
- Feb 01, 2017
The identification cards worn by emergency personnel face challenging conditions, not only from temperature extremes and inclement weather, but also from bodily fluids of patients being treated.
With gun control on the forefront of everyone’s minds, technology companies are introducing products that could save lives.
- By Sydny Shepard
- Jan 13, 2016
The property is using VingCard Visionline, Signature RFID locks and Elsafe Sentinel safes.
Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.
- By Ronnie Pennington
- Nov 01, 2015
Biometrics and RFID security solutions meets cameras, DVRs, NVRs, video analysts, access control systems and more.
Unique SlimFlex housings tolerate repeated bending and withstand rugged use.
Biometrics has a central role to play in today’s authentication solutions, so it is important to revisit and review the many myths and misperceptions associated with this technology.
- By Phil Scarfo
- Nov 01, 2013
The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.
- By Mark Steffler
- Nov 01, 2013
Are our faces now like bar codes, easily scanned and instantly traceable? Not quite. But face recognition has grown into a tool that every investigator can benefit from.
- By Paul Schuepp
- Apr 01, 2013