Access Control


The ID Two Step

AS federal and state governments look for ways to ensure workers' identity, identification cards have come to be a hot topic. In addition to protecting physical assets -- buildings, infrastructure and other facilities -- government officials also are interested in maintaining the integrity of their computer networks.

Diagnosis: Security

JUST as physicians recommend that their patients obtain treatment early before a condition worsens, Intermountain Healthcare (IHC) also is addressing the issue of security before problems occur.

A Shot in the Arm

Cover Your Assets

THE cost of lost assets to companies has been demonstrated in many studies to be significant. The application of DVR technology has been proven to reduce this type of loss in a cost-effective manner.

A Remote Control

THE Edwin Holmes Co. created the central station intrusion alarm monitoring business model in Boston, in the 1850s.

Biometrics Come Calling

THE next time you consider installing a new access control system, you might want to think out of the box and go biometric.

The Key to Security

BADCOCK Home Furniture & More is a furniture retailer with a fleet of 45 tractors and 300 trailers, servicing nearly 330 stores in seven states throughout the southeast United States.

A Door Wide Open

IN the last four and a half years, new government mandates for tighter physical security at critical infrastructure sites have led to significant strides in physical access control innovation.



Flying Solo

SECURITY is something the airlines take very seriously, even more so after 9/11. Sun Country Airlines is no exception. And like other carriers, Sun Country is facing cost challenges greater than ever before.

ID Cards Get a Touch-Up

TEN years ago, the use of biometrics for identifying people was only seen in the movies -- too advanced for the real world.

Raising the Grade

THE Jessica Lunsford Act -- named for the nine-year old who was murdered by a construction worker at her school -- sent school districts throughout Florida scrambling to implement fingerprinting and screening systems to comply with the law.

A Human Intervention

THE landscape of information security continues to be dynamic. New threats emerge daily in the forms of new viruses, worms, phishing, pharming, social engineering and identity theft.

A Need for ID

Leaving a Mark on Security

IN a time when identity management and interoperable security initiatives are at the forefront of agendas and presidential mandates, security directors are implementing new biometric technologies that notably increase entry point protection, secure sensitive assets and reduce outside threats.

Saving Precious Time

LOCKOUT/TAGOUT or "red tagging" (also known as clearance tagging) is the critical procedure followed to ensure that equipment at the Fayette Power Project's three coal-fired generating units near La Grange, Texas, are safely shut down and energy sources isolated to prevent accidental release of stored energy, making it safe for their maintenance staff to begin working on equipment.

Playing on the Positive Side of Human Nature

MOST retailers are acutely aware of the impact employee theft has on their business. According to the University of Florida 2004 National Retail Security Survey, 47 percent of all shrink is attributed to employee theft.

Security Simplified

FOR its new Medical Arts & Research Building, the University of Connecticut standardized on a security system by using a simplified approach that combines after-hours electronic perimeter access control with interior mechanical locking. By effectively managing the access to the building itself, a less-complicated keying system that still provides the desired level of security can be used inside.

Vanderbilt Establishes International Headquarters in Germany

New office tied to acquisition of Siemens’ Security Products.

Intercede Receives Lenel Factory Certification

MyID identity and credential management solution interfaces with the Lenel OnGuard access control system.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3