Access control readers - Expert commentary

Access Control and Door Entry Management: How Technology is Driving Change
Access Control and Door Entry Management: How Technology is Driving Change

Access control and door entry is a huge responsibility, and challenge, for local authorities and housing associations UK wide. For councils, they’re accountable for the security and safety of many public facilities such as leisure centers, libraries as well as residential housing developments which are often large scale and home to hundreds of people. Housing associations manage affordable rental housing which also means they’re responsible for the appropriate access control management for each individual house or apartment. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage. For example, with modern intercom and access control systems, remote management and communication is something that offers local authorities and housing associations features that enable them to reduce costs and cut their carbon footprints by managing multiple sites from one place. On the other hand, such technological innovation has meant that local authority and housing association specifiers and consultants now have a wide range of systems and products to choose from which can cause issues in ensuring the right system for a specific building or development is chosen. Choosing an appropritate access control system In choosing an appropriate system, local authorities and housing associations need to opt for a cost effective solution that can be easily maintained with excellent support from the manufacturer and guarantees that the system and system parts will remain supported for the duration of its expected life cycle. It is also important that the chosen system is flexible to cater for the varying needs of the tenants and visitors. Of increasing importance is the reduction of anti-social behavior which new technology can help by providing the use of data loggers which track the use and events of a door entry system, allowing specific evidence to be located by integrating with CCTV. Using technology to our advantage Through advancements in management systems and services, we can gain a much better visual representation of the events and general usage of an intercom entry system and not just its proximity access control. Systems, for example, can now send email alarms or notifications to the administrator or management. We are now able to modify user rights and access levels on the go from a mobile app which enables a much greater control over service and maintenance engineers, such as making sure they have full access when required via an app, rather than arriving to site with the incorrect keys or access fob. Systems, for example, can now send email alarms or notifications to the administrator or management Dealing with tenant’s lost and stolen keys has never been so easy either. The blocking or deletion of lost fobs and adding a new fob can be carried out in minutes while at the same time removing the cost of sending an engineer to the development to program new fobs. This greatly reduces the carbon footprint of the whole task as fobs can now be sent out via mail to a secure location for collection. Technology has also helped local authorities and housing associations to overcome the issue of not being able to have a concierge or building manager available 24/7 at some developments. Now with internet communication, it’s possible for tenants and visitors to get in touch with someone should they need assistance, whether that’s from within the apartment or from an entrance point. For example, lets take the Videx VX2200 with IP concierge integration. This system is exceptionally flexible, enabling calls to be answered on Videx intercoms and also mobile phones if required. With the integration of the IP concierge each block can be either standalone or networked via the internet back to a central control room. Reduced maintenance costs and carbon footprint We work with a wide range of local authorities and housing associations to help them overcome access control and door entry challenges. One organization we have recently partnered with is The Living Group to help them greatly reduce their maintenance costs and carbon footprint by installing the MiAccess offline proximity system on many of their developments across the North East. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage By installing an appropriate system, The Living Group has managed to overcome issues caused by the existing system’s limitations and also enabled much more flexibility when it comes to effectively managing the access control system of all their included developments. For those responsible for effective and appropriate access control, the management of the systems are easier, quicker and there’s no delay or on-going costs for needing a specialist program to modify fobs and access rights as this can now all carried out in-house. Improved security legislation Further advancements in programmes such as Secured by Design (SBD), a police initiative that improves the security of buildings and their immediate surroundings to provide safe places to live, work and visit, means that there’s more security legislation being implemented that’s making intercoms and access control more secure, without affecting ease and convenience. Videx holds an SBD accreditation and we know, from first-hand experience, how it’s making a difference in keeping tenants safe. When you combine the safety features promoted by an SBD member company like ourselves with the likes of the Videx event logging, image capture and ability to modify access users on the go, for example, we can help to create a very safe and secure environment. Personally, I think there needs to be a greater emphasis on the role of security legislation Technology has completely transformed the way local authorities and housing association are able to choose, install and manage door entry and access control systems for tenants and visitors alike. Personally, I think there needs to be a greater emphasis on the role of security legislation such as Secured by Design to ensure all councils and housing association consultants are up to date with what constitutes a robust and secure system that’s also cost effective too. In my role, I see weaknesses in systems and constant ongoing costs that could easily be avoided. For instance, features such as timed remote entry means local authority and housing association management no longer need to worry about keys being lost, the wrong keys being supplied or locks needing to be changed. With new systems such as the Videx MiAccess and Videx WS4 range, we can help to massively reduce a housing association’s or council’s carbon footprint and engineer costs by allowing them the access to management and control from an offsite location. Crime prevention We can also use live and logged events to help prevent crime in different ways, from antisocial behavior growing around a tenant being called or visited much more regularly than others, to knowing a tenant is currently still living at a property but isn’t paying rent or answering to any correspondence. Technology enables local authorities and housing associations to receive detailed data and therefore behavioral insights on the people under their management and care. If consultants and specifiers are advised on the most appropriate systems that meet their specific entry needs, they can ensure greater, safer and more convenient access control that meets the requirements of both the end user and the those responsible for its effective management.

Wireless Technology Is Transforming Motion Detection
Wireless Technology Is Transforming Motion Detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

The Growth Of The Mobile Access Card Market In 2020
The Growth Of The Mobile Access Card Market In 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.

Latest Allegion plc news

LenelS2 Unveils OnGuard Security Management System Version 8.0 That Offers Powerful Visualization For Data-based Insights
LenelS2 Unveils OnGuard Security Management System Version 8.0 That Offers Powerful Visualization For Data-based Insights

LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualization for data-based insights. OnGuard Version 8.0 OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more. The OnGuard security management system is an advanced solution in Carrier’s Healthy Buildings Program, and provides critical features like occupancy management, enhanced access control and proactive screening solutions to better protect people and assets, and optimize building health and efficiency. LenelS2, a globally renowned company in advanced security systems and services, is a part of Carrier Global Corporation, an international provider of healthy, safe and sustainable building and cold chain solutions. Transforming security data into actionable insights OnGuard version 8.0 provides end users with the tools to be in complete control of their security environment “OnGuard version 8.0 provides end users with the tools they need to be in complete control of their security environment and transform security data into actionable insights,” said Jeff Stanek, President of LenelS2. He adds, “As the world returns to the workplace, the breadth of new features, updates and enhancements in OnGuard version 8.0 make it an ideal solution for today’s unique security challenges.” Magic Monitor unified client The OnGuard security management system version 8.0 system enhances security and situational awareness through integration with the Magic Monitor client, a Windows and Mac OS client, which provides a unified view of access control, video surveillance feeds and web content in a single display. Users can view OnGuard system alarms, credentials as well as live or recorded video from the LenelS2 Network Video Recorder (LenelS2 NVR) platform, or third-party video management systems, including the Milestone XProtect system. The Magic Monitor unified client supports a single display, a command center workstation or expansive video walls. OnGuard Reports and Dashboard features To turn security data into actionable insights, the OnGuard version 8.0 platform now features a new OnGuard Reports browser client that provides customizable reports. An OnGuard Dashboard feature offers powerful visualization of system, cardholder and alarm data in a variety of graphical formats. The new interactive OnGuard Maps feature offers browser-based visualization of facility layouts and provides dynamic system feedback. With OnGuard version 8.0, the Maps feature is included within the OnGuard Monitor client and is accessible from any computer, tablet or smartphone. Usability enhancements and cyber security upgrades OnGuard version 8.0 system also includes new usability enhancements, integrations and cyber security upgrades The OnGuard version 8.0 system also includes new usability enhancements, integrations and cyber security upgrades to improve safety and convenience. Usability enhancements include easy-to-access language options in OnGuard Visitor Self Service mobile app version 1.5 and a richer video viewing experience across OnGuard web clients. The improved video experience includes new audio, digital zoom, snapshot capture and Milestone XProtect video support in OnGuard Monitor and Surveillance web clients. Enhanced security in K-12 education segment To enhance security in the K-12 education segment, integration with the Allegion Von Duprin Remote Undogging/Remote Monitoring (RU/RM) solution enables an electronic override of mechanical undogging for facility emergency lockdown and remote door status monitoring. ‘Secure by Default’ settings, coupled with license administration security improvements, further enhance cyber security across the OnGuard system.

Allegion Accelerates Vision Of Seamless Access With The Acquisition Of Technology Company Yonomi
Allegion Accelerates Vision Of Seamless Access With The Acquisition Of Technology Company Yonomi

Allegion plc, a renowned global security products and solutions provider, has acquired privately held technology company Yonomi. Yonomi is an innovation provider of IoT Cloud platforms. Founded in 2013 by building automation and enterprise Cloud computing experts, Yonomi was one of the firsts to create an agnostic smart home ecosystem that automatically discovers and coordinates devices. Today, Yonomi solutions are used in more than 150 countries, and millions of IoT devices are connected to its platforms. According to Allegion Senior Vice President and Chief Technology Officer (CTO) Vince Wenos, Yonomi also holds unique intellectual property that matches well to Allegion’s strategic priorities for accelerating growth through seamless access, innovative solutions and meaningful partnerships. Residential smart deadbolt ecosystem “Yonomi’s patented technology and technical capabilities will help accelerate Allegion’s vision of seamless access and enhance the breadth of our software development capabilities,” Wenos said. “It also opens avenues for integration with leaders in home and enterprise solutions for the IoT - supporting our ‘partner of choice’ strategy.” Yonomi employs nearly 25 people at its operations in Boulder, Colorado, and Austin, Texas Wenos added, “We are a customer of the Yonomi platform, ourselves, having embraced Yonomi ThinCloud technology as a part of our residential smart deadbolt ecosystem. This, too, makes us a firm believer in Yonomi solutions and, especially, the team behind them.” Smart home solutions Yonomi’s CEO Kent Dickson will become Vice President and General Manager of the Yonomi business unit within Allegion. Dickson noted that Allegion has been an investor in Yonomi since 2017 and this acquisition was a natural evolution for the Yonomi business.   “This is an exciting moment in time for the Yonomi family and our customers,” Dickson said. “As an early provider of IoT solutions, Allegion truly understands the value of connected ecosystems and shares an important role in progressing smart home solutions through its industry-leading brands like Schlage. In addition, Allegion has been a significant partner of, and investor in, our company, and this acquisition provides more capital and capacity for growth of our existing technologies and platforms.” Yonomi employs nearly 25 people at its operations in Boulder, Colorado, and Austin, Texas. Terms of the transaction were not disclosed.

Security Industry Association Announces The Winners Of The 2021 SIA RISE Scholarship
Security Industry Association Announces The Winners Of The 2021 SIA RISE Scholarship

The Security Industry Association (SIA) has named five young security professionals as the recipients of the 2021 SIA RISE Scholarship, a program offered through SIA’s RISE community, which supports the education and career development goals of young industry talent. Through this scholarship program, open to SIA student members and RISE members who are employees at SIA member companies each awardee will receive a $3,000 scholarship to use toward continuing education and professional development courses, SIA program offerings and/or other academic or education programs. Scholarship funds can be used to expand knowledge in the areas of business, human resources (HR), information technology (IT), marketing, sales, project management, security engineering, and/or risk management. Young security professionals “The 2021 SIA RISE Scholarship awardees are an extraordinary group of young security professionals who represent tomorrow’s industry leaders,” said SIA CEO Don Erickson. “SIA is proud to help foster the careers of these talented honourees, and I look forward to seeing their many accomplishments and successes to come.” Winners for the 2021 SIA RISE Scholarship Nadim Hammoud, Software Developer, Feenics As a key member of the software development at Feenics, Nadim Hammoud has contributed to multiple new features in production and bug fixes, built proofs of concept for prospective clients, and contributed new tests to the automated testing of the company’s web API. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course and certification in AI He has a strong interest in the latest technologies, including cloud computing and machine learning. Prior to his time at Feenics, Hammoud served as a teaching assistant at Carleton University and held engineering and software development positions at Bertrandt and Tactical Technologies Inc. He holds bachelor’s degrees in computer science and biomedical and mechanical engineering from Carleton University. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course, a professional certification in the field of artificial intelligence, and attendance at industry events. Olivia Peralta, Account Executive, Allegion In her role as an account executive at Allegion, Olivia Peralta works with teams around the world to plan and sell access control projects – from teaching the company’s security software to implementing hardware installations hosted on the cloud for physical security end-users. Prior to her time at Allegion, she served as an account executive at ISONAS Access Control and completed communications internships at Western Resource Advocates and the Oregon Natural Desert Association. She holds bachelor’s degrees in environmental sciences and communication and environmental studies from Northern Arizona University and a continuing education certification from Colorado Water Education’s Water Educator Network and is IPVM University Access Control certified. Peralta plans to use the scholarship funds toward earning SIA’s Certified Security Project Manager certification and pursuing an education that bridges the gap between strategy, design, and product delivery. Matthew Rios, Regional Sales Manager, Axis Communications Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification In his role at Axis Communications, Matthew Rios promotes the use of IP video and Axis cameras to integrators, distributors, consultants, and end-users and maintains fluid and enthusiastic relationships with current and prospective customers. Prior to his time at Axis Communications, Rios held sales management roles at Hanwha Techwin America, Honeywell, and R&D Lock and Alarm. He holds master’s and bachelor’s degrees in cybersecurity from Fordham University and a bachelor’s degree in the homeland and corporate security from St. John’s University. Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification. Mary Sharp, HRA, Stanley Access Technologies As a key member of the HR team at Stanley Access Technologies, Mary Sharp is responsible for over 220 professional hourly, non-union service and install technicians and provides support on major change management and organization redesign efforts and issues pertaining to team cohesiveness, dynamics, and management. Prior to her time at Stanley Access Technologies, she held HR and administrative roles at Stanley Healthcare, Infrasource Underground Construction, and Frontline Private Security. She holds a bachelor’s degree in ethics and public policy from the University of Iowa. Sharp will use the scholarship funds toward obtaining the Society for Human Resource Management’s SHRM-CP certification. Trevor Zuerlein, System Designer, VTI Security Zuerlein plans to use the scholarship funds to pursue further education in IT, become a member of (ISC)², and to earn CISSP credentialTrevor Zuerlein started at VTI Security in 2017 as a security systems technician and now serves as a system engineer; Zuerlein is skilled in access control security systems, security cameras, computer repair, computer science, technical writing, and AC/DC electronics. Before his time at VTI Security, he held IT and sales roles with Time Warner Cable, Mead Lumber, and Archer Daniels Midland Company. Zuerlein holds an associate’s degree in information technology from Central Community College. He plans to use the scholarship funds to pursue further education in the IT field, become a member of (ISC)², and work toward his goal of earning the Certified Information Systems Security Professional credential. Networking events SIA RISE is a community that fosters the careers of young professionals in the security industry. In addition to awarding the annual SIA RISE Scholarship, SIA RISE offers fun networking events for young professionals, created the RISE Microlearning Series of mini-webinars on top professional development topics, hosts career growth webinars and trade show education tracks. Mentorship program The recently launched the Talent Inclusion Mentorship Education (TIME) mentorship program for early and mid-career professionals in the security industry and presents the annual AcceleRISE conference, an essential experience designed to ignite new thinking, strengthen leadership and sharpen business acumen in young security talent. RISE is available to all employees at SIA member companies who are young professionals under 40 or have been in the security industry for less than two years.

Related white papers

Physical Access Control In Higher Education

5 Reasons To Integrate Mobile Technology Into Your Security Solution

11 Considerations For Embedded System RFID Readers