Technology & Trends - Access control readers
Bluetooth Smart creates new ways to open doors and gates The latest generation of access control systems offers more secure and sophisticated credentials, and new credential form factors including mobile devices that offer a more secure and convenient way to open doors and parking gates. Mobile access control also delivers a simple and user-friendly secure identity management process, and a platform for integrated, multi-layered physical access control (PACS) and IT security s...
Innovation in the world of physical security systems tends to be a reactive response Threats such as Mifare hacking, the General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. Daryn Flynn, Business Development Manager at Nedap Security Management, states that external factors such as these do...
Endless possibilities for security deployment have been made possible with technological advancements Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, in...
The best standards are often baseline, common-denominator standards that leave room for innovation The collaboration between ONVIF and SIA to develop new access control standards is just the latest standards-related news from the Security Industry Association (SIA), the American trade association headquartered in Silver Spring, Md., near Washington, D.C. In fact, SIA has a long history and tradition of standards development, dating back to the 1980s. SIA has produced 1...
What is it about biometrics that triggers so much worry? Initial resistance gives way to mainstream acceptance when biometric technology allows convenient and secure access to healthcare, banking services, amusement parks, office buildings. What is it about biometrics that triggers so much worry? In the past, concerns seemed to have their foundation in the use of fingerprints in law enforcement; the association between fingerprints and criminality was strong.&n...
Retrofit solutions provide hardware, software, and processes for quick upgrades As security systems age, their components become obsolete, end users outgrow them, or end users may be faced with expensive and time consuming upgrades. Users can spend months researching new solutions or take a chance on a lengthy upgrade with unforeseen challenges and costs. Both options include finding money in the budget for a new system, upgrades or labor expenses that often were not planned f...
An open technology platform can adapt to any environment throughout the organization Looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analyzing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike. Breaking down individual doors into a series of classifications can be most helpful in assuring that the EAC is performing to the highest standards...
“Soft” biometric measurements, such as gait, gender, and ethnicity offer new possibility for biometric solutions What is the next wave of biometrics? The Center for Identification Technology and Research (CITeR) is looking at the possibilities. New developments include consideration of new “soft” biometric measurements, such as gait, gender, and ethnicity. Although not accurate enough to identify a specific person, the capture and analysis of such...
The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems have become a necessity in several high-security environments as they ensure that security is not compromised in the event of some hardware malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this articl...
Many forward-thinking organizations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Use of biometrics presents one of the most secure options for organizations, say Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively. They list out the numerous benefits of...
The power supply is the key driving force for access control systems Power plays a crucial role in the effective functioning of any access control system and the choice of the right power system to suit specific requirements is important. In this article, Ronnie Pennington, National Accounts Manager of Altronix Corporation explains various ways to determine and meet the power requirements for access control systems. Usually, an access control system itself acts as the main so...
The outlook of the access control is bright despite economic downturn Belying the tough economic environment in which it is operating globally, the security industry is apparently ‘weathering the storm' quite well. Despite some expected adverse impact of the economic downturn, overall the security industry has been relatively immune and resilient compared to some other sectors. This could well be because of the growth in unemployment and higher crime rates necessi...
Using card-based access control solutions alongside IT password management provides an additional layer of security A mandatory part of any organization's relationship with its employees is the requirement to set up a secure password, which allows access to important documents needed to ensure fluid day-to-day processes of the business. Ken Scotland, Sales Director at ADT Fire & Security, discusses the best ways to build a more secure modern day enterprise by co...
More attention needs to be given to wireless security technology Despite major developments in radio technology and increased demand in the market for new solutions, wireless systems are still not fully embraced by the security industry. Tony Makosinski of Honeywell Security Group asks why, and explores what the future holds for wireless technology. Although wireless technology -specifically radio - has been used in the security industry since the 1980s, penetration rates in...
The use of retinal scans for security applications is increasing The eyes have it. The use of iris recognition technology is expanding around the globe and it is being utilised in a vast array of commercial and government applications ranging from access control to time management. ASSA ABLOY Future Lab examines how this biometric technology is breaking new ground in identity management and other security applications. Retinal vs. iris scans Often confused w...
RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...
Consumers prefer voice recognition technology for biometric identification Voice recognition is the most preferred form of biometric identification among consumers. Derek Scheips for ASSA ABLOY Future Labs outlines the concept behind this technology and some of its uses and drawbacks. With all types of biometric applications on the rise, voice-based authentication is one approach that seems to engender less resistance among users than other biometric forms of s...
Hoteliers don't give security a high enough priority Security is not as high on the hotel agenda as it should be according to Michael Hartmann, Senior Vice President for Hospitality Solutions with Siemens Building Technologies. Here he looks at the reluctance to invest in the latest security systems, the different levels of security typically employed and the benefits of an integrated approach. The contribution to profit, or the perceived lack of it, is one of the major...
PoE technology allows for safer environments through better security systems Power over Ethernet is both convenient and affordable, says Jonas Rehnberg of ASSA ABLOY Future Labs. The benefits to network security are immense, be it in powering security cameras with added features or enabling better access control systems and intruder deterrents. Hailed as a watershed innovation when first standardized in 2003, Power over Ethernet (PoE) offers a way of supplying electricity to n...
HID and Abloy UK are creating the future of intelligent doors At IFSEC 2009, ASSA Abloy launched Hi-O, a new concept for electronic door solutions that improves and simplifies the installation, service and upgrade of access control systems and allows end users to create the first truly "intelligent doors". SourceSecurity.com spoke with Matt Thomas, Managing Director of Abloy UK, and Ian Compton, Director of Sales for UK, IE and Nordics for HID Global, to find out more ab...
Hospitals need stronger 'in-depth' physical security at different entry points Within the course of any given day, a hospital or health care chief security officer (CSO) faces the task of not only protecting multiple points of access but also doing so in a way that enables movement and activity, is convenient for staff and patients and does not impede the facility's primary function: saving lives. Health care facilities exist in a wide variety of medical focus, adm...
Integrated access control solutions have become easier to apply Leading integrated security solutions provider Honeywell explains the importance and benefits of implementing an integrated access control solution for businesses. An access control solution can be as simple as the use of electronic or magnetic swipe cards instead of keys to unlock a front door. This limited functionality still retains a considerable level of value. In most cases, businesses can limit...
Museums facing growing security challenge with rise of armed robbery It only takes a shocking 58 seconds to steal a painting. Jonas Rehnberg, writer at Assa Abloy Future labs, speaks to former museum security chief Ton Cremers about the safe-keeping of precious artefacts in museums and art galleries. In 2004, armed, masked robbers stormed into the Munch Museum in Oslo and stole two masterpieces - "The Scream" and "Madonna" - before the eyes of shocked spectators....
Jeremy Kimber, Honeywell's EMEA Marketing Leader, lays out the key points to consider when choosing a converged access control solution. In the past few years, perhaps no security industry buzzword has been defined in articles and promotional materials as many times as 'convergence'. These definitions have most commonly referred to the integration of physical Convergence of physical and traditional IT systems can provide compelling security benefits for an enterprise securit...
Browse expert commentaries
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises
Delta Scientific MP100 Portable Barricade Solution