Security access systems

Advantages And Pitfalls Of Electronic Locking Solutions

The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an in...

Pulse Secure To Discuss Implementing Network Access Control During SANS Webinar

Pulse Secure, global provider of enterprise secure access solutions announced that John Pescatore, director of emerging security trends at SANS Institute, and Dave Cullen, manager of information technology and chief security officer (CSO) at Entegrus, will participate in a new webinar to discuss what works when implementing network access control (NAC). Pulse Secure NAC Integration Hosted by the SANS Institute, the online seminar will feature an interview with Cullen on integrating Pulse Secur...

Are Integrators And End Users Overwhelmed By Too Many Choices?

Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is alwa...

What Role Does Social Media Play In Promoting Security?

Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What...

Senstar Symphony VMS Supports GDPR Compliance To Meet Data Privacy Regulations

With the European Union’s General Data Protection Regulations (GDPR) now in effect, Senstar is pleased to confirm its Symphony video management software (VMS) provides a set of privacy-related features that support organizations with GDPR compliance while maintaining situational awareness and operator efficiency.  General Data Protection Regulations The General Data Protection Regulations (GDPR) apply to all European Union members as well as all foreign companies that process EU res...

Avigilon Awarded ISO 9001:2015 Certification For Quality Management System

Avigilon Corporation, a Motorola Solutions company, announced it has been awarded ISO 9001:2015 certification for its Quality Management System (QMS). ISO 9001:2015 is a globally recognized quality standard that defines QMS requirements and performance. The standard assists companies to align quality with their wider business strategy, helping to improve communications, efficiency, and implementation of continuous improvement. As part of the ISO 9001:2015 certification process, Avigilon engage...

Round table discussions

Are Integrators And End Users Overwhelmed By Too Many Choices?

Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is alwa...

What Role Does Social Media Play In Promoting Security?

Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What...

Has Consolidation Shifted To The Security Integrator/Installer Market?

Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered...