Access Control


Texas Instruments Enters Government ID Industry

Texas Instruments (TI) recently announced it is applying core capabilities in contactless and power efficient microcontroller technologies along with advanced embedded memory for next generation government identification products.

RFID Technology Continues To Make Inroads In Healthcare

Go to any hospital or healthcare provider, and you’ll always see things moving -- staff, equipment, medicine and, most important of all, patients.

The Holding Cell

Since September 2001, the nation has undergone some significant changes in the way it addresses transportation security and, particularly, identity verification. For example, the TWIC program, governed under the auspices of the Transportation Security Administration, now requires that every transportation employee in America, at every port, terminal and station, be positively identified by a government-authorized credential in the form of a smart card.

Bioscrypt Product Approved By TSA

Bioscrypt Inc., a provider of enterprise access control technology, recently announced that its V-Station MIFARE V9.50 has been approved by the Transportation Security Administration and placed on the TSA's "Biometrics for Access Control" Qualified Products List (QPL).

ImageWare Systems To Integrate AFIS Information

ImageWare Systems Inc., a developer of identity management solutions, recently announced a strategic, multi-year licensing agreement with Lockheed Martin for its Automated Fingerprint Identification System (AFIS).

Portable RFID System Used During Marine Expeditionary Force Exercise

Fortress Technologies, a provider of security and secure wireless solutions, recently announced that it successfully demonstrated a secure, wireless backbone as part of a deployable RFID “kit” during a III Marine Expeditionary Force exercise in Gladstone Port, Australia.

Security Freeze Offered On Credit Files To Help Combat Identity Theft

Starting Oct. 15, TransUnion will offer consumers in all 50 states the ability to freeze access to their credit files.



Every Step You Take

THE success of an identity management program begins at the heart of an organization’s business strategy. Ryerson, a leading distributor and processor of metal, based in Chicago, is guided by three fundamental principles, one of which is an intense focus on operating efficiency.

United Kingdom Using Fingerprint Information In Visa Process

While biometrics continue the march toward mainstream acceptance, the United Kingdom is using fingerprint information from visa applicants to protect the country’s borders.

Bangladeshi Voter Registration Project Uses Biometrics

BIO-key International Inc. and Tiger IT recently announced a project to deliver a biometric-based credentialing solution for the Bangladeshi Voter Registration Project.

Secure Access System Protects Tesla Motors Corporate Headquarters

LaserCard Corp. and Tesla Motors recently announced the successful implementation of an optical memory card-based LaserPass Secure Access System for Tesla's corporate headquarters in San Carlos, Calif.

NEC Develops Multi-Frequency, Multi-Protocol RFID Reader/Writer

NEC Corp. has developed a multi-RFID reader/writer (a device that can both read and write tag data) supporting three major RFID (IC) tag frequencies (13.56MHz, UHF band and 2.45GHz), as well as the world's most used protocols

Poll: Consumers Want Stronger Identity Protection

According to the poll, 89 percent of Americans agree that state and federal lawmakers should pass laws restricting the use of Social Security numbers.

bioMETRX, Inc. Acquires Patent for Biometric Padlock

The company believes that this patent is valuable in the portable lock market. For many years, consumers have been using portable locks, such as padlocks and combination locks, to secure personal belongings in lockers and storage cabinets.

Play Your Cards Right

EARLIER this year, information technology and computer security publications buzzed with reports that RFID-based proximity cards could be cloned.

Saflink, IdentiPHI Announce Merger

Under the terms of the merger agreement, Saflink will acquire all of the outstanding shares of IdentiPHI in a stock-for-stock transaction.

Channel Surfing

When managers at Ingersoll Rand sought to enhance the efficiency of their dealer sales channel, they turned to a Web access and identity management solution for help. This global manufacturer of industrial products and services distributes some of the world’s most popular industrial brands.

Study: Silicon Fingerprint Sensor Market Set To Thrive

With almost every major PC manufacturer integrating silicon chip fingerprint sensors in their products, the market appears set to thrive.

Biometrics Help Increase Security For Storage Facility

Security is always a selling point for the self-storage industry and customers who take advantage of having an extra place to store everything under the sun.

Dispelling the Myths

DISPELLING myths and misunderstandings about biometrics and its increasingly common use in everyday professional and personal lives is a tough task, even in these modern, technologically-advanced times.

Clamoring For Registered Traveler

From the Product Manager's POV

HIRSCH Electronics is no stranger to introducing new products or winning accolades among its peers. From the competition at ISC West, Hirsch won a special achievement award in the Security Industry Association's New Product Showcase in Las Vegas. We thought readers should know more about the RUU-201 Verification Station, so we talked to Scott Howell of Hirsch Electronics.

A Fast Read

IN some cases, companies implementing biometrics will initially encounter employee resistance, with the issues of privacy and hygiene taking center stage. This will invariably be the case if a union is involved and is looking for negotiating points.

Who Are You?

IDENTITY theft has changed the public's perspective on financial security. Phising scams take consumers to Web sites almost identical to their trusted bank, a stolen driver license can lead to forged checks, a stolen Social Security number can open numerous credit card accounts and card cloning has left the public vulnerable.

Biometrics To Go

CONTRARY to using badges, sign-ins or other ways of tracking employees, a biometric reader ensures no employee can punch in for another, eliminating time fraud and reducing payroll costs. Because every person's biometric features—hand, fingerprint, eye or face—are unique, a biometric time clock provides a quick, accurate and reliable way to record in and out punches for each employee. That’s why so many companies, including fast food restaurants, now employ biometrics.

Raising the Bar

Raising the bar is a phrase commonly associated with pole vaulting or high jumping. At the Utah Summer Games, officials also are raising the bar on efficiency and security with a speedier, more stringent ID card program for athletes.

A Knack for Access

NETWORK access control is one of the hottest topics in IT today. Despite this, available approaches are either fragmented or not ready for widespread implementation. In order to understand this phenomenon, users must evaluate current approaches and understand the process of implementing a NAC solution. When implementing network access control, the first set of decisions that need to be made regarding network policy. The first necessary question for a NAC project is: Why does it need to be implemented and what is expected from implementation?

Getting Carded

IN recent years, investigative reporters have uncovered security vulnerabilities in what are believed to be closely monitored applications: school buildings. In too many instances, investigators are able to slip into school buildings without being stopped, and administrators find out about the security breach on the evening news.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.