Technology & Trends - Access control cards/ tags/ fobs

How To Manage Physical Security Data In Compliance With EU GDPR

Until recently, data laws have differed from one country to the next. This meant that for those organizations conducting business or protecting assets abroad, they needed to localize both their infrastructure and policies dependant on the country they were operating in. However, with the impending arrival of the EU GDPR (General Data Protection Regulation), which comes in to force on the 25th May this year, all of that will need to change. Data Management In CCTV Surveillance Surprisingly, des...

Utilizing The Cloud In Evolving Access Control Systems In 2018

In 2017, SALTO Systems led the market with increased emphasis on two growing sectors within access control: Mobile technology and cloud solutions. Strengthening Market Positions Mobile access control applications are now a must across all security verticals. The hospitality sector, for example, is quickly seeing smartphones replacing room keys and check-in lines with mobile apps like SALTO’s JustIN Mobile. This technology replaces the need for an access card by securely sending a mobile...

Top 10 Mergers And Acquisitions In The Security Industry For 2017

Rapid changes in the physical security market this year have largely overshadowed one arena where change has slowed down in 2017 – mergers and acquisitions (M&A). Although there were no “mega-mergers” as in years past (such as Axis-Canon and Johnson Controls-Tyco, M&A activity still made headlines last year on SourceSecurity.com. In 2017, we wrote about M&A news involving companies such as HID Global, Eagle Eye Networks, ADT, and Honeywell. ...

Surveillance In 2017: 360-degree Cameras A Primary Device For Total Situational Awareness

The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree ca...

Top Practical Strategies For Biometric Adoption

Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organizations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA Case Study But does that mean that organizations need to hold off on implemen...

Cloud Systems, Cybersecurity And Mobile Credentials Will Continue To Drive Debate In 2018

Overall, it’s been quite a year for the industry and Vanderbilt. Last year, we predicted that the security industry would see a rise in cloud-based systems in 2017, and based on the developments and trends we've seen over the last 12 months, that forecast has come true. ACT365 Access Control And VMS Vanderbilt introduced the ACT365 cloud-based access control and video management solution to its portfolio, and it has plans to educate the marketplace on the technological and economic advan...

Perimeters, Entrances And Lobbies To See Increased Security In 2018

During 2017, we’ve enjoyed stable economic growth for a number of years now; we’re not running into as much resistance for security entrances as we did, say, seven to nine years ago. Hardening Perimeters Against Active Shooters Compared to other security products such as cameras and card readers, security entrances are a big investment and considered somewhat of a luxury: during downturns we’re among the first to hit the “cutting room floor.” Now, however, fueled...

Companies Will Use Security Data To Improve Decision Making In 2018

Companies have vast amounts of data at their fingertips to help them make better business decisions about how to secure their buildings and improve business processes. What we will see next year is more companies determining HOW to use their data to help make better business decisions. Physical identity and access management systems with intuitive dashboards will help users determine how to use their data to save money. For example, reducing manual processes can free up hours of time. CSOs can f...

Going Digital: New Technologies For Emergency Management

In recent years, organizations have transformed the way we prepare, respond to and manage emergency situations globally. Through the rapid uptake of new technologies, organizations can accurately account for their individuals in the event of an emergency and maintain the safety of their employees and visitors. In the event of an emergency in an organization, an efficient and rapid evacuation is of the utmost importance, as hundreds or thousands of people need to be evacuated as quickly as possi...

Top 3 Mistakes When Integrating Security Entrances And Access Control Systems

Access control and security entrance integration is a specialized discipline. It is true that security entrances require only a dry contact and can integrate with virtually any access control system, but there are some things to be considered when researching the right access control system for your organization’s security goals. After 21 years’ experience in the security industry—four of those serving as an advisor for security solutions to dozens of Fortune 1000 companies&md...

Advanced Threat Detection: How Video Analytics Is Evolving To Meet The Need For Speed

In the digital age, speed has never been more critical. Customers expect an instant response to a query. Executives expect sales data on their tablets in front of them in real-time. A site manager at an oil refinery needs an instant alert about a defective valve. An IT manager expects to know about a phishing email before it hits his employees’ inboxes. The 'need for speed' is impacting the physical security sector too. Customers increasingly expect their security systems to identify and...

Download: Is Your Access Control System As Secure As You Think?

Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users.  Find Out M...