Technology & Trends - Access control controllers

Long Range Identification - 3rd Major Contactless Access Control

Recently there has been great interest in long range reading (433 MHz technology) For the last two decades, the primary contactless technology used in access control systems has been the proximity card (125 kHz technology). In the last decade, proximity cards have been augmented by the smart card (13.56 MHz technology). And that's the way it has been until just recently. All of a sudden, there has been great interest in long range reading (433 MHz technology). Merging Traditi...

Integrators Should Foster Relationships To Increase K-12 Education Sales

Integrators must understand that the K-12 market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (K-12) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience and the insight gained by putting se...

School security: Communication and controlling access

Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...

Online And Offline Locks: Leveraging The Best Of Both Options

Online wireless locks enable real-time online access control functionality Organizations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customized system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...

Addressing The Unique Security Challenges Of K-12 Schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

Canon-Axis Buy: Integrators Respond

Systems integrators weighed in on what they expect and the long-term outlook for Axis and Canon Recent news of Canon’s $2.83 billion cash bid for network surveillance leader Axis Communications came as a surprise to some, but many could easily digest the move as more consolidation of the marketplace, especially the crowded video surveillance space. Systems integrators weighed in on what they expect and the long-term outlook for IP camera leader Axis and Canon, a Japanese...

Need Help Choosing An Access Control System?

Decision-making and investigations are faster if operators don’t have to navigate among different applications Overwhelmed by too many choices for an access control system? Where do you start? Always seeking to help, SourceSecurity.com asked access control suppliers to describe what differentiating characteristics set their systems apart from others in the market. AMAG: Easy Migration, Simple Pricing Model AMAG’s Symmetry platform includes access control, photo...

Access Control Keeps Schools Safe

Schools are beefing up their security, with access control their go-to technology Schools are back in session after the winter break, but security is a 24/7 matter any time of year. K-12 and upper education are on high alert, dealing with increased incidents of violence, crime and vandalism. Access control is often the chosen technology of this vertical market, pairing well with CCTV, emergency communications and lockdown. Integrators and dealers who understand the nuances of...

IP Solutions Provide Multiple Layers Of Access Control At Transit Hubs

Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to ma...

Innovation At The Reader Disrupting The Access Control Market

More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; o...

Meet Dave Tyson - ASIS 2015 President

Dave Tyson has 30 years of experience in all facets of enterprise security The incoming president of ASIS has volunteered with industry groups for years. His goal: to help people get better at their jobs. With 30 years' experience in all facets of enterprise security, Dave Tyson, CPP, CISSP, looks forward to his 2015 term as President of ASIS International (ASIS). “I’ve spent a lot of years working to make a difference in the security industry,” Tyson says...

Reliable And Improved Security Technologies Making Video Analytics Effective

Observers say improved analytic technology and better support technologies are making video analytics effective Video analytics and biometrics entered the security technology market some years ago accompanied by great expectations. Both generally disappointed security directors and end users. Manufacturers oversold video analytics as a tool that could monitor video for hours on end without losing concentration — something human security officers couldn’t do. Analy...