Technology & Trends - Access Control

Security Management System’s Usability Key To Easy Adoption

The usability revolution that took place several years ago on the consumer market is breaking into the field of security management. Wouter Kersteman, Interaction Designer at Nedap, explains in this article that intuitive user interfaces with attractive apps and widgets - similar to those found on modern mobile phones and tablets - are the standard of the future; usability is the latest buzzword and may even be a pre-requisite for security management systems.   Rec...

Security Software For Identity Management – A Flexible, Scalable And Secure Approach To Manage Enterprise Risk

Software can combine information from various systems to create a single identity across the organization In today's enterprise business environment, the best approach to managing risk for a known scenario is to both prepare for it and guard against it.  Effective security management necessitates credible real-time information about risk and the ability to respond to that information in a timely manner. However, that information is often not available in real-time or ma...

Power Supply Requirements And Options For Access Control Systems

The power supply is the key driving force for access control systems Power plays a crucial role in the effective functioning of any access control system and the choice of the right power system to suit specific requirements is important. In this article, Ronnie Pennington, National Accounts Manager of Altronix Corporation explains various ways to determine and meet the power requirements for access control systems. Usually, an access control system itself acts as the main so...

IP Technologies Fuel Global Expansion And Standardisation Of Security Systems

Networking is a powerful way to effectively converge and integrate security In an ever-changing world, business organizations require efficient security partners in order to focus their expansion towards growing economies. This physical expansion leads to a need for expanded and enhanced security programs to protect a growing network of people and facilities. In this article, Renae Leary, Senior Director, Global Accounts, at ADT Worldwide, provides an insight into cost-effecti...

Automated Key Control And Management Systems Boost Electronic Access Control

  An automated key control system bridges the gap between mechanical and electronic access control systems The vast array of doors, entrances and restricted areas securing semi-public locales are increasingly demanding the need for effective and easy access control management. In this article, Fernando Pires, VP Sales and Marketing at Morse Watchmans, highlights the effectiveness and convenience offered by automated key control systems that have narrowed the gap...

Open Standards In Physical Access Control Gain Momentum As ONVIF Adoption Grows

 The outlook of the access control is bright despite economic downturn Belying the tough economic environment in which it is operating globally, the security industry is apparently ‘weathering the storm' quite well. Despite some expected adverse impact of the economic downturn, overall the security industry has been relatively immune and resilient compared to some other sectors. This could well be because of the growth in unemployment and higher crime rates necessi...

Choosing The Right Power Supplies For Security Installations

 Selecting the optimum power supply for a system is critical to an installation  When it comes to selecting power supplies, knowledge is power. Determining the power requirements of every systems product, taking into account their integration with one another is critical to ensure that you are selecting and installing the power solutions most appropriate for your installation. Such information will enable you to select the power supplies that will be required to keep your security sys...

Improving Airport Security Effectiveness - Key Solutions

 Dealing with rising airport security threats  demand more innovative solutions   With the rise in large security threats since the commencement of this century, security of airports has become paramount. Looking into this issue Ashley Smith, BSIA (British Security industry Association) Civil Aviation Security Section Chairman, explains how a mix of properly interfaced security systems working in conjunction with monitoring and response staff offers a cost...

Using Smart Card Authentication And Logical Access For Robust Access Control Solutions

  Using card-based access control solutions alongside IT password management provides an additional layer of security A mandatory part of any organization's relationship with its employees is the requirement to set up a secure password, which allows access to important documents needed to ensure fluid day-to-day processes of the business. Ken Scotland, Sales Director at ADT Fire & Security, discusses the best ways to build a more secure modern day enterprise by co...

Wireless Security Systems: Time To Get Serious

More attention needs to be given to wireless security technology Despite major developments in radio technology and increased demand in the market for new solutions, wireless systems are still not fully embraced by the security industry. Tony Makosinski of Honeywell Security Group asks why, and explores what the future holds for wireless technology. Although wireless technology -specifically radio - has been used in the security industry since the 1980s, penetration rates in...

Iris Recognition Systems For Access Control And Identity Management Gain Popularity

The use of retinal scans for security applications is increasing The eyes have it. The use of iris recognition technology is expanding around the globe and it is being utilised in a vast array of commercial and government applications ranging from access control to time management. ASSA ABLOY Future Lab examines  how this biometric technology is breaking new ground in identity management and other security applications. Retinal vs. iris scans Often confused w...

Tips To Reduce False Security Alarms With Proper Installation, Education And Training

  False security alarms can be reduced with simple business practices In today's security conscious environment, repeated false alarms can be costly to a business, and not just in financial terms. A false alarm is simply the activation of one's security alarm system for no apparent reason. With the introduction of European standards and the UK implementation of PD6662 (scheme for the application of European Standards for intruder and hold-up alarm systems) and DD243 (code...

Body Field Communication – New Technologies For Access Control Systems

RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...

Blending Physical Security Systems With Environmental Design For Optimized Crime Prevention Solutions

  Poorly maintained environments send messages that undesirable behavior will be tolerated Crime prevention is not solely the job of locks on doors or security cameras scanning entranceways. The makeup of a physical environment can influence where crimes are committed. That's why Crime Prevention Through Environmental Design (CPTED) should be an essential component to the crime prevention strategy of any building or area.  In this article ASSA ABLOY Future Labs e...

Protecting Financial Organizations From Emerging Security Risks With Integrated Solutions

  Globalisation and new technologies have led to increased threats for financial organizations The banking and financial sector needs to be constantly prepared to manage an increasing range of security risks, from fraud and anti-social behavior to data mismanagement. Organizations must anticipate such potential risks and have well-established plans in place to address them.  Honeywell, with more than 50 years of experience in the security industry, is helping...

Security Planning And Management Tips For Small Businesses

  Cutting costs on security investments puts small businesses at the risk of criminal activity During tough economic times, many small businesses can be found guilty of neglecting investment in their on-going security protection.  Naturally, this can prove to be problematic as the impact of break-ins and criminal activity greatly affect the accounts and day-to-day running of the business. Luke Martyn, SMB specialist at ADT Fire and Security provides practical, cost-ef...

Voice Recognition – Benefits And Challenges Of This Biometric Application For Access Control

Consumers prefer voice recognition technology for biometric identification Voice recognition is the most preferred form of biometric identification among consumers. Derek Scheips for ASSA ABLOY Future Labs outlines the concept behind this technology and some of its uses and drawbacks. With all types of biometric applications on the rise, voice-based authentication is one approach that seems to engender less resistance among users than other biometric forms of s...

Hotel Security Demands More Investment In Latest Integrated Systems

Hoteliers don't give security a high enough priority Security is not as high on the hotel agenda as it should be according to Michael Hartmann, Senior Vice President for Hospitality Solutions with Siemens Building Technologies.  Here he looks at the reluctance to invest in the latest security systems, the different levels of security typically employed and the benefits of an integrated approach. The contribution to profit, or the perceived lack of it, is one of the major...

Security Management With The Convergence Of IP & Physical Security

Examining the road to convergence The use of Internet Protocol (IP) in the security industry is increasing but little is known about the relationship between end users and the merger of traditional physical security and IT otherwise referred to as convergence in the security trade press. Markus Lahtinen of the LUSAX project examines the growth of convergence in the security industry and discusses complexities of this relationship. The LUSAX project at Lund Universit...

Extending Ethernet Capabilities To Enable Better Network Security Applications

PoE technology allows for safer environments through better security systems Power over Ethernet is both convenient and affordable, says Jonas Rehnberg of ASSA ABLOY Future Labs. The benefits to network security are immense, be it in powering security cameras with added features or enabling better access control systems and intruder deterrents. Hailed as a watershed innovation when first standardized in 2003, Power over Ethernet (PoE) offers a way of supplying electricity to n...

The Future Of Intelligent Doors

  HID and Abloy UK are creating the future of intelligent doors At IFSEC 2009, ASSA Abloy launched Hi-O, a new concept for electronic door solutions that improves and simplifies the installation, service and upgrade of access control systems and allows end users to create the first truly "intelligent doors". SourceSecurity.com spoke with Matt Thomas, Managing Director of Abloy UK, and Ian Compton, Director of Sales for UK, IE and Nordics for HID Global, to find out more ab...

Thriving In Unstable Times: Honeywell Unveil Their Keys To Success

   Key to stability during economic downturn is investment in partners and product innovation  If we are to believe the words of the Bank of England's Mervyn King, the recession may be coming to an end. No longer are we to fear the shouts of the dreaded "credit crunch" resonating from our TV screens. While green shoots of economic recovery spring up around the world, there is still enough uncertainty to warrant the question: How is the security industry...

Contactless Smart Cards In Health Care Institutions: Considerations For Entering The Health Care Market

   Hospitals need stronger 'in-depth' physical security at different entry points Within the course of any given day, a hospital or health care chief security officer (CSO) faces the task of not only protecting multiple points of access but also doing so in a way that enables movement and activity, is convenient for staff and patients and does not impede the facility's primary function: saving lives. Health care facilities exist in a wide variety of medical focus, adm...

Tightening Cruise Ships’ Security: State Of Access Control Solutions Onboard Passenger Ships

  Cruise ships need stringent security measures Baggage x-rays, archway metal detectors, body checks, swipe card readers and more... Michael Lawton for ASSA ABLOY Future Lab delves into the world of access control security onboard cruise ships as they are subjected to the tighter security norms of the IMO and ISPS code.If you wanted to describe the security challenges of a cruise liner, you could think of a hotel inside an airport. When it comes to the...

Access Control - The Key To Integrated Security Systems For Businesses

  Integrated access control solutions have become easier to apply Leading integrated security solutions provider Honeywell explains the importance and benefits of implementing an integrated access control solution for businesses. An access control solution can be as simple as the use of electronic or magnetic swipe cards instead of keys to unlock a front door. This limited functionality still retains a considerable level of value. In most cases, businesses can limit...

Museum Security: Integrated Security Systems To Protect The Priceless

  Museums facing growing security challenge with rise of armed robbery  It only takes a shocking 58 seconds to steal a painting. Jonas Rehnberg, writer at Assa Abloy Future labs, speaks to former museum security chief Ton Cremers about the safe-keeping of precious artefacts in museums and art galleries. In 2004, armed, masked robbers stormed into the Munch Museum in Oslo and stole two masterpieces - "The Scream" and "Madonna" - before the eyes of shocked spectators....

Get More From Access Control Solutions

   IP connectivity featured in the latest access control products provides extra flexibility If it's been a while since you last looked at access control systems, be prepared for a surprise, says Matt Haynes of Siemens Building Technologies. For very little extra cost, the latest systems deliver a whole lot more functionality than their older counterparts. Let's be honest, even the most basic of access control systems are likely to perform some useful functions,...

Checklist For Converged Access Control Solution

Jeremy Kimber, Honeywell's EMEA Marketing Leader, lays out the key points to consider when choosing a converged access control solution. In the past few years, perhaps no security industry buzzword has been defined in articles and promotional materials as many times as 'convergence'. These definitions have most commonly referred to the integration of physical  Convergence of physical and traditional IT systems can provide compelling security benefits for an enterprise securit...

Channel Management - The Key To Enhanced Customer Relationship And Higher Investment Protection

Ulrich Wydler of Kaba discusses how recent technological developments along with increasing demand for compatible components and total solutions, have led to the development of total channel management, which challenges the traditional supplier and distribution channels.The markets for mechanical locks, electronic access control and data collection solutions have historically developed separately.  This applies to suppliers as well as their distribution channels.  Locking systems made...

Biometrics - A Path Toward Security And Convenience

Biometrics help secure airports around the world, but the protection doesn’t stop there.  Nathan Cummings explores the application of Biometrics further. Travel to the United States, and chances are good that at the gate, you’ll be greeted by a machine rather than a person.  Like a customs agent reading a passport, these machines use physical features to confirm that you really are who you claim to be – except that unlike a person, they can’t be fooled, bribed...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems