Technology & Trends - Access control cards/ tags/ fobs

A Brief History Of ONVIF: How The Global Industry Standard Has Grown

ONVIF's 1.0 Core Specification debuted in 2008 at Security Essen The adoption of the ONVIF protocol by manufacturers continues to grow. Last year, the number of member companies in the ONVIF forum exceeded 500 and more than 5,000 products are currently certified on the ONVIF website. How did ONVIF achieve this amazing result and experience this wild adoption? More than a decade ago, every manufacturer was defining their own protocols and pushing for Video Management Software...

Live Finger Detection Technology Reinforces Future Of Advanced Biometric Authentication

Awareness against fake fingerprints prevent fingerprint from becomingthe choice of biometrics despite their benefits Apple’s refusal to the US government’s request to unlock Syed Rizwan Farook’s iPhone has triggered public interests in personal and information security. Ever since the introduction of Touch ID by Apple, fingerprint technology has been implemented into more and more mobile devices by different manufacturers. It is being adopted as the authentic...

How Smartphone Access Control Credentials Strengthen Security And Minimize Risk To Organizations

PIAM solutions ensure that credentials are onboarded to all the right systems The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they...

New Technologies Empower Visitor Management Systems To Improve Physical Security Efficiency And Cost-Effectiveness

Access control and visitor management are evolving and becoming more rooted in an organization’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organization’s overall physical sec...

Access Control Challenges In A Changing World - From Managing Nurse Servers In Hospitals To Securing Sterile Facilities

ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...

Biometric Authentication Offers Greater Security Advantages Over Traditional Identity Verification Systems

Accurately confirming a person’s identity is one key to improving security forour workplaces, communities, and our nation Perhaps I’m sensitized to the term, but it seems to me that I’m hearing the word “identity” a lot lately.   Identity comes up in current news stories about Syrian refugees, for example. Candidates for the U.S. presidency debate how long it should take to confirm the identity of immigrants before allowing them to ent...

ISC West 2016: Physical Security Industry Focuses On Incorporating Audio, Video And Other Safeguards In An Integrated Approach

Access control now includes a strong focus on the data integration sideof the business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...

Adopting Smart Security Operational Methods For Greener Businesses

Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...

Technology Developments Enhancing Biometrics Performance In The Security Market

Important biometric capabilities include multispectral imaging, superior liveness detection, and tamper resistance Technology developments are enabling a range of new functionality for biometrics in the security market. Early biometrics solutions had poor performance (high failures during enrollment or acquisition that meant significant percentages of users could not use biometrics), says Phil Scarfo, VP worldwide marketing, biometrics, HID Global. Early solutions were not abl...

Proactive PASS Security Guidelines Address School Security Challenges And Lessen Potential For Shooting Incidents

The PASS guidelines don’t just point to specific technologies; they address securityissues and help guide school administrators to make their schools safer and more secure From K-12 to college campuses, schools need integrated solutions and proactive measures to lessen the potential of active shooters while targeting general loss prevention and security. The good news is that technology is available to address nearly every threat and challenge, and systems integrator...

Biometric Solutions Bridge The Gap Between Physical And Logical Access Control

A biometrics-embedded tablet can tag a guard upon entering the building & feed videoof what’s happening beyond secure doors as he/she moves through the facility The best way to make the case for biometrics is to consider a physical and logical access control scenario, according to biometrics vendor SRI Identity, a program from SRI International, one biometrics company. With advances in security technology, access control systems have come to play a bigger role in org...

E-Passport Technologies Address Border Security Crisis And Ease Tourism

Led by European nations, there is a global shift to e-passports, with over 100 countries using these technologies With the number of global international tourist arrivals standing at over 1 billion and increasing migration in Europe, good border and passport security means having a layered approach and plenty of co-ordination among countries, says David Belchick, VP of Government Solutions at Entrust Datacard. Ever-Growing Border Security Challenges “More than one bil...