Security access systems

What Are The Security Challenges Of The Enterprise Market?

Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the en...

Losing The One-Size-Fits-All Mentality Surrounding Entrance Control Systems In 2018

The optical speed lane and turnstile sector of the security market has had a very busy 2017. Growth in commercial construction has provided more opportunity.  Innovations in technology have given speed lane manufacturers an opportunity to deliver a better product. Orion Sales Increase And Company Growth Orion Entrance Control, Inc., had a great 2017 as sales increased and our company grew. We attribute our success to the unique approach we have taken since day one: providing customized pr...

How Terror Attacks Have Driven Demand For A Higher Quality Of Security Training In 2018

  The demand for security consultancy services has increased as recent terror events have highlighted the need for effective and proportionate mitigation measures. Security training has seen an increase in demand, especially for technical courses in the areas of access control and CCTV. Security management training has also risen, except in the oil and gas sector where demand dropped significantly; this is attributed to the suppressed oil price. However, recently there are si...

Learning To Combine The Cloud And On-Premise Security In 2018

This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous Authentication Experience Demand grew for unified identity and access management systems supporting both cards and cellphone devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuo...

SALTO Systems Redesigns Hospitality Website To Be Mobile-friendly

SALTO Systems, a manufacturer of electronic access control solutions, has redesigned its Hospitality website with a completely new and interesting look. The cell-friendly Hospitality website adds a new flavor to SALTO’s digital presence, offering more accessibility and easy-to-use features. Electronic Lock Solutions For Hotel Doors The new SALTO Hospitality website emphasizes the theme “A hotel experience you need to discover” and offers innovative additions for introduc...

S2 Security Launches New Security Management App, S2 Mobile Security Professional

S2 Security, developer of complete enterprise security solutions, announced the release of S2 Mobile Security Professional, a security management app for smartphones and tablets. S2 Mobile Security Professional allows both security managers and staff to operate their S2 access control and video management systems from anywhere, dramatically improving productivity, decision-making and response time. The new app is a complete reimagining of the award-winning S2 Mobile Security Officer. With a str...

Round Table Discussions

What Are The Security Challenges Of The Enterprise Market?

Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the en...

How Does The IT Department Influence Security Purchases?

In recent years, information technology (IT) departments at end user companies have often been seen as adversaries of traditional security departments – or, at least, as a thorn in their side. One of the issues is territorial: As physical security products have migrated to use of Internet protocols and the network infrastructure, the IT and security departments have clashed – erm… make that interacted – more and more often. New realities such as cybersecurity have made i...

How Can Security Systems Be Used To Predict Bad Things?

It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most com...