Technology & Trends - Access Control
Law enforcement and pure problem-solving skills will play less of a role for the future security director Much effort has been put down in the professionalization of security work. Not only is it a recurring topic of conversation at events for security professionals, but also a formal topic of concern for ASIS – having active task forces devoted to the promotion of professionalization and academization of security practice as well as a recently updated standard (ANSI/ASI...
Quantifying information provides insights for business to improve performance management The ability to measure and analyze the effectiveness of security operations is extremely useful – not only for identifying and addressing an organization’s vulnerabilities, but also for demonstrating security’s mitigating impact on overall risk levels along with the higher-level value security delivers to a business. Brian McIlravey, Co-CEO at PPM, explains how security m...
Centralized PIAM provides necessary security and operational reinforcement Similar to schools, airports and other semi-public facilities, hospitals and other healthcare facilities are grappling with the new reality that dictates stronger and more enforceable access restrictions. In these new circumstances, the need for security must be balanced with the individual’s need to easily move about the hospital by allowing medical staff, visitors or contract workers to go a...
Key control is a very strategic and integral element within a school’s security platform It used to be that the word “lockdown” was only ever used in reference to an emergency protocol to restrict movement in a prison environment. Today however, the term is in common usage in educational and other environments to describe measures taken under certain conditions of threat. In this article, Fernando Pires, VP of Sales and Marketing at Morse Watchmans, explain...
Innovation in the world of physical security systems tends to be a reactive response Threats such as Mifare hacking, the General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. Daryn Flynn, Business Development Manager at Nedap Security Management, states that external factors such as these do...
Helping utility companies meet the new CIP-14 standard is an urgent new challenge On April 16, 2013, snipers fired for 19 minutes on PG&E Corp.'s Metcalf electric power transmission station near San Diego, California, knocking out 17 giant transformers that supply electricity to Silicon Valley. At least 100 rounds were fired from at least one high-powered rifle. The power grid was rerouted to avoid a blackout, but it took 27 days to make repairs and get the substation bac...
A value management process with clearly defined steps and procedures is critical In a highly competitive marketplace, where organizations need to ensure they are contracting for the best possible services, value must be visible. This starts with aligning with the right service provider – one that is dedicated to the organization’s success and has the people and processes to make an impact. Certainly most, if not all, service organizations say that they strive t...
Endless possibilities for security deployment have been made possible with technological advancements Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, in...
New security technologies have dramatically changed the security landscape over the last decade The security landscape has changed dramatically in the last decade with the introduction of numerous new security technologies to detect crime and deter criminal activity. With a long list of new tools, professionals now need to process vast amounts of information within seconds from many different security systems and then make important decisions about how to respond to an inc...
The best standards are often baseline, common-denominator standards that leave room for innovation The collaboration between ONVIF and SIA to develop new access control standards is just the latest standards-related news from the Security Industry Association (SIA), the American trade association headquartered in Silver Spring, Md., near Washington, D.C. In fact, SIA has a long history and tradition of standards development, dating back to the 1980s. SIA has produced 1...
Hydraulic controllers are very reliable and have few maintenance issues when installed properly When specifying the vehicle access control system you need to stop a truck-bomber, errant driver or vehicle not authorized to enter your facility, you have to decide among bollards, barriers or barricades. Once you have decided the type you will use, you then have to pick the model to use. Finally, you then need to select the type of power unit you are going to deploy. And, going gr...
What is it about biometrics that triggers so much worry? Initial resistance gives way to mainstream acceptance when biometric technology allows convenient and secure access to healthcare, banking services, amusement parks, office buildings. What is it about biometrics that triggers so much worry? In the past, concerns seemed to have their foundation in the use of fingerprints in law enforcement; the association between fingerprints and criminality was strong.&n...
Retrofit solutions provide hardware, software, and processes for quick upgrades As security systems age, their components become obsolete, end users outgrow them, or end users may be faced with expensive and time consuming upgrades. Users can spend months researching new solutions or take a chance on a lengthy upgrade with unforeseen challenges and costs. Both options include finding money in the budget for a new system, upgrades or labor expenses that often were not planned f...
An open technology platform can adapt to any environment throughout the organization Looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analyzing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike. Breaking down individual doors into a series of classifications can be most helpful in assuring that the EAC is performing to the highest standards...
Ideal COTS solutions take cost, customization and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronized and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...
In China and Russia ONVIF Profile S compliance is becoming mandatory for smaller systems The familiarity and widespread use of ONVIF interfaces in the market are evidence of the success of ONVIF, which was created in 2008 by three manufacturers, Axis, Sony and Bosch. More evidence of success is a growing number of new members and compliant products. All over the world, ONVIF is being embraced – in China and Russia, as examples, ONVIF Profile S compliance is becoming mand...
Genetec promotes “hybridisation”, a combination of on-premises components and cloud services The impact of the IT department on physical security has been a source of discussion for years. Generally, the influence of IT on purchasing and technology decisions related to physical security systems has been seen as increasing with no end in sight. One industry leader thinks otherwise. Pierre Racz, president, CEO and founder of Genetec, sees the clout of the IT departm...
Gates and fencing can keep visitors to one part of a campus away from other parts of the campus The need for more robust security in schools has been brought to the fore by a series of shooting incidents in schools in the US in the last few years. While such incidents are relatively rare, the threat of untoward incidents in schools is real and too serious to be ignored. This article lists some essential steps for school administrators to respond to potential security issues ca...
Combining cloud-based computing and local data gathering to improve management of business remotely A new Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management. Combining inputs from surveillance systems, access control, intrusion detection systems, and video analytic...
“Soft” biometric measurements, such as gait, gender, and ethnicity offer new possibility for biometric solutions What is the next wave of biometrics? The Center for Identification Technology and Research (CITeR) is looking at the possibilities. New developments include consideration of new “soft” biometric measurements, such as gait, gender, and ethnicity. Although not accurate enough to identify a specific person, the capture and analysis of such...
There are new biometrics on the horizon, but much of current biometrics research centers on improving the biometrics we have, especially the face, iris and fingerprint recognition systems commonly deployed in the field. These systems are effective and provide good accuracy, but their usefulness is often limited by the conditions under which data is captured. Research is looking for ways to make face, iris and fingerprint biometrics more accurate in more real-world situations....
Security officers work diligently to protect people and property and are often first on the scene of an emergency. Working alongside police, paramedics and firefighters, security officers demand our collective respect. The Freedonia Group reports that the demand for security officer and patrol services is forecast to rise at an annual rate of 4.6 percent through 2014 to $25 billion and the number of officers employed by private security firms is expected to increase 2.6 perce...
A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...
The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems have become a necessity in several high-security environments as they ensure that security is not compromised in the event of some hardware malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this articl...
Comprehensive and robust security programs and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device. Furth...
Companies that have developed a culture of openness can provide and receive feedback at all levels “The nail that sticks out gets hammered down” is an old Japanese saying that took hold in our post World War II corporate America culture. This phrase encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Today it is important for business leaders to consider the impact this has in American workplaces. Brent O’Bryan...
Intelligent asset management is a natural extension of access control Key and asset management can integrate with other security disciplines to extend beyond the much-hyped vogue for 'convergence' and move towards truly intelligent building management. Brenda Taylor, Sales and Marketing Director of Traka, shows how assets can be protected with an approach that draws on shared data while making its own contribution to enterprise-wide information. A point for anybody who has be...
For many companies, the current state of their access control infrastructure is best described as being fractured For many companies, the current state of their access control infrastructure is best described as being fractured. Multiple disparate physical and logical access control systems and cumbersome manual processes are all too common. Standardizing one system throughout a company might address part of the problem, but replacing multiple systems may require large amounts...
Many forward-thinking organizations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Use of biometrics presents one of the most secure options for organizations, say Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively. They list out the numerous benefits of...
The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services. In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...
Browse expert commentaries
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises
Delta Scientific MP100 Portable Barricade Solution