SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Electronic access control

Electronic access control - Expert commentary

Looking To The Future With Edge Computing
Looking To The Future With Edge Computing

Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT Global Market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. I...

Open Supervised Data Protocol (OSDP): The Gold Standard For Access Control Installations
Open Supervised Data Protocol (OSDP): The Gold Standard For Access Control Installations

Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations....

New Year's Resolutions To Counter Web And Mobile Application Security Breaches In 2019
New Year's Resolutions To Counter Web And Mobile Application Security Breaches In 2019

With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organization’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scop...

How Organizations Can Secure User Credentials From Data Breaches And Password Hacks
How Organizations Can Secure User Credentials From Data Breaches And Password Hacks

In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anythi...

Access Control As A Service (ACaaS) Solutions Growth With Mobile Access In 2019
Access Control As A Service (ACaaS) Solutions Growth With Mobile Access In 2019

IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. Impact Of Technological Developments While market growth rates ha...

Video Technology Reimagined With The Empowerment Of IoT
Video Technology Reimagined With The Empowerment Of IoT

It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for...

How To Choose The Right Wireless Access Control Locks
How To Choose The Right Wireless Access Control Locks

The basic principles of access control are well established: only authorized people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the...

Enhance Traditional Security Systems Within Your Smart Home
Enhance Traditional Security Systems Within Your Smart Home

Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalize the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have at...

Five Cyber Security Threats Your Enterprise Must Address
Five Cyber Security Threats Your Enterprise Must Address

By now your organization should know the drill. To keep your enterprise safe from unauthorized access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vu...

How To Optimize Mobile Access Control Authentication With Smart Devices
How To Optimize Mobile Access Control Authentication With Smart Devices

Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...

How Managed Detection And Response Enhances Cybersecurity Management In Organizations
How Managed Detection And Response Enhances Cybersecurity Management In Organizations

There was a time when one of our biggest challenges was securing our physical assets, whether that was our people or our property from crime. We researched and deployed the very latest in video solutions, intrusion systems, fire alarms and access control devices, all in an effort to keep the bad guys out and the good guys safe, along with protecting our facilities from break-ins, robberies and countless other crimes. However, times are changing. No longer must we only be concerned about keepin...

How To Manage Physical Security Data In Compliance With EU GDPR
How To Manage Physical Security Data In Compliance With EU GDPR

Until recently, data laws have differed from one country to the next. This meant that for those organizations conducting business or protecting assets abroad, they needed to localize both their infrastructure and policies dependant on the country they were operating in. However, with the impending arrival of the EU GDPR (General Data Protection Regulation), which comes in to force on the 25th May this year, all of that will need to change. Data Management In CCTV Surveillance Surprisingly, des...

Utilizing The Cloud In Evolving Access Control Systems In 2018
Utilizing The Cloud In Evolving Access Control Systems In 2018

In 2017, SALTO Systems led the market with increased emphasis on two growing sectors within access control: Mobile technology and cloud solutions. Strengthening Market Positions Mobile access control applications are now a must across all security verticals. The hospitality sector, for example, is quickly seeing smartphones replacing room keys and check-in lines with mobile apps like SALTO’s JustIN Mobile. This technology replaces the need for an access card by securely sending a mobile...

Why Access Control Systems Should Accommodate Older Systems Rather Than Replace Them In 2018
Why Access Control Systems Should Accommodate Older Systems Rather Than Replace Them In 2018

2017 saw an opportunity for the economy to have a strong stock market, which provided companies confidence to invest in and update their infrastructure. This included many replacing older access control systems and moving to more integrated solutions for better connectivity between all security-related systems. We anticipate commercial businesses to invest in infrastructure, which will include security systems and technologies. Each year there is an increase in random violent incidents, w...

Why Scalable Intelligent Communications Will Be At The Forefront In 2018
Why Scalable Intelligent Communications Will Be At The Forefront In 2018

During 2017, we witnessed as the end-user came to realize that an intercom can be a silo if not properly integrated in with access control, video management, and their existing VoIP-based systems as well as designing intelligibility into every device. We believe the next generation of communication in the Age of Voice has accelerated beyond anyone’s expectations, and we will begin to see more and more attention on highly intelligible, interoperable and scalable intelligent communications...

How Evolving Access Control Solutions Will Benefit The Security Industry In 2018
How Evolving Access Control Solutions Will Benefit The Security Industry In 2018

In 2017, access control solutions evolved and expanded within physical security operations, aligning with the overall industry trend of moving security from a reactive to a more proactive model. Access Control Serving The Industry From increased integration capabilities to mobile applications to predictive analytics, access control served as the platform that enabled this transition in physical and data security. Other steady growth areas included wireless readers, smartphone usage as a crede...

How Terror Attacks Have Driven Demand For A Higher Quality Of Security Training In 2018
How Terror Attacks Have Driven Demand For A Higher Quality Of Security Training In 2018

The demand for security consultancy services has increased as recent terror events have highlighted the need for effective and proportionate mitigation measures. Security training has seen an increase in demand, especially for technical courses in the areas of access control and CCTV.   Security management training has also risen, except in the oil and gas sector where demand dropped significantly; this is attributed to the suppressed oil price. However, recently there are sig...

How The Cloud Is Bringing Change Into The Security Market In 2018
How The Cloud Is Bringing Change Into The Security Market In 2018

  In January of 2017, ISONAS forecasted that the year would be a transformational year in access control with strong movement to IP access control, and that the adoption of IP access control hardware and software would significantly outpace the growth of the overall industry. In retrospect, our forecasts were on point and accurate. The industry has seen robust growth in the high single digits, while IP access control is seeing growth rates of up to 30-35%. The market drivers...

Learning To Combine The Cloud And On-Premise Security In 2018
Learning To Combine The Cloud And On-Premise Security In 2018

This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous Authentication Experience Demand grew for unified identity and access management systems supporting both cards and cellphone devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuo...

Security System Interoperability To Become Standard In 2018
Security System Interoperability To Become Standard In 2018

At ONVIF, we believe our perspective for 2017 turned out to be reasonably accurate. We did see an increasing interest for interoperability all the way to system-to-system level; not only within the security industry, but also in neighbouring industries where the prospects for IoT have drastically improved. I believe the industry as such has matured in its relation to IoT and today we can imagine how IoT will play a part of smarter and safer system deployments. Increased Cybersecurity Threat T...

Top 10 Mergers And Acquisitions In The Security Industry For 2017
Top 10 Mergers And Acquisitions In The Security Industry For 2017

Rapid changes in the physical security market this year have largely overshadowed one arena where change has slowed down in 2017 – mergers and acquisitions (M&A). Although there were no “mega-mergers” as in years past (such as Axis-Canon and Johnson Controls-Tyco, M&A activity still made headlines last year on SourceSecurity.com. In 2017, we wrote about M&A news involving companies such as HID Global, Eagle Eye Networks, ADT, and Honeywell. ...

Surveillance In 2017: 360-degree Cameras  A Primary Device For Total Situational Awareness
Surveillance In 2017: 360-degree Cameras A Primary Device For Total Situational Awareness

The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree ca...

Top 10: What Were Security Professionals Reading About In 2017?
Top 10: What Were Security Professionals Reading About In 2017?

Our most popular articles in 2017 reflected changing trends in the U.S. security market, from deep learning to protection of mobile workers, from building automation to robotics. Again in 2017, the most read articles tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let&rsq...

Companies Will Use Security Data To Improve Decision Making In 2018
Companies Will Use Security Data To Improve Decision Making In 2018

Companies have vast amounts of data at their fingertips to help them make better business decisions about how to secure their buildings and improve business processes. What we will see next year is more companies determining HOW to use their data to help make better business decisions. Physical identity and access management systems with intuitive dashboards will help users determine how to use their data to save money. For example, reducing manual processes can free up hours of time. CSOs can f...

Download: How To Choose An IP-enabled Access Control System
Download: How To Choose An IP-enabled Access Control System

Recent developments in physical security systems have enabled us to expand access control using IT infrastructure. By eliminating the need for hard wiring to a central panel or controller, IP-based systems enable installations that are non-proprietary, flexible and scalable. This means not only a more versatile solution, but also a more cost-efficient one. A network-based system can be enlarged by one door, and one reader, at a time, unlike some traditional systems where controllers or panels o...

Mechatronic Access Control: Superior Security For Hazardous Sites
Mechatronic Access Control: Superior Security For Hazardous Sites

Securing potentially hazardous sites, which contain gas or oil storage facilities, is becoming increasingly important to UK industry. While other businesses are investing in enhanced access control solutions, such as electronic key-centric access management, many sites containing hazardous materials are left stuck in the dark ages, with basic and impractical mechanical locking systems. This is due to the potential risks associated with using an electronic device, which could cause a spark, in cl...

[Download] The State Of Physical Access Control: Impact On The Enterprise
[Download] The State Of Physical Access Control: Impact On The Enterprise

  The global market for card-based electronic access control (EAC) is projected to reach $10.1 billion by 2020 according to Global Industry Analysts. However, as credential technologies have evolved over the years, so have the ways users interact with them.   Mobile Credentials   One of the bigger developments over the past few years has been the increased adoption of mobile credentials, which allows users to access facilities via their mobile device....

Combining Mechanical And Electronic Systems To Enhance Door Security
Combining Mechanical And Electronic Systems To Enhance Door Security

Customers are increasingly requesting both mechanical and electronic services for their doors In most buildings, security is a hybrid solution of both mechanical and electronic security products. Locksmiths take care of the mechanical door hardware and the integrators focus on the electronic security technology. However, for consumers, this traditional division of labor means they must deal with two different companies for the same door - one to design, install and service al...

Physical Security Continues To Support Cybersecurity Aims
Physical Security Continues To Support Cybersecurity Aims

At the end of last year, we anticipated that data gathering and analysis would continue to be a strong trend, and that certainly proved to be the case in 2016.   More and more organizations are seeing the value of the intelligence provided by diverse systems’ data. The number and variety of networked systems and devices – both security and non-security – continued to grow steadily in the last year, and the data these disparate sources create has proven highly...

SourceSecurity.com’s 10 Most Clicked Articles Posted In 2016
SourceSecurity.com’s 10 Most Clicked Articles Posted In 2016

Again in 2016, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let’s look back at the Top 10 articles we posted in 2016 that generated the most page views. They are listed in order here with the author&r...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
Related white papers
One System, One Card

One System, One Card

Download
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Modernizing Access Control

Modernizing Access Control

Download
Related articles
TDSi Becomes TDSi By Hirsch In 2026

TDSi Becomes TDSi By Hirsch In 2026

AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Electronic access control
  4. Expert commentary
About this page

See an extensive list of insightful articles related to Electronic access control, highlighting product, technology and industry trends on Electronic access control from industry thought leaders and experts.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec