SourceSecurity.com RSS - Access control systems & kits news SourceSecurity.com RSS - Access control systems & kits news from SourceSecurity.com http://www.sourcesecurity.com/news/pc/access-control-systems-and-kits.html Copyright (C) SourceSecurity.com 2014 Fri, 19 Dec 2014 08:00:00 GMT Fri, 19 Dec 2014 08:00:00 GMT Introducing emerald, CEM System's multifunctional IP access terminalhttp://www.sourcesecurity.com/news/articles/co-386-ga-co-1726-ga-co-8421-ga-npr.16067.htmlhttp://www.sourcesecurity.com/news/articles/co-386-ga-co-1726-ga-co-8421-ga-npr.16067.htmlNew Product ReleasesFri, 19 Dec 2014 08:00:00 GMT<p>CEM Systems is part of the Security Products business unit of Tyco, the world&rsquo;s largest pure-play fire protection and Security Company.</p> <p>CEM provides highly advanced security management solutions which include integrated access control, ID badging, alarm monitoring and the industry&rsquo;s most advanced and flexible range of card readers.</p> <p>From a small facility to a large multi-site facility the sophisticated AC2000 access control system and advanced CEM products provide a solution to meet even the most complex needs.</p> <p>Each CEM system can be customised to specifically fit the security needs of the customer, ensuring a powerful, tailored level of protection that simply cannot be matched in the industry.</p> <p>CEM have continuously developed and innovated with the core AC2000 security management system and successful introduced several industry firsts. These include intelligent card readers with built in memory, Power over Ethernet Plus door control and...AxxonSoft powers security monitoring for Pan-American Highwayhttp://www.sourcesecurity.com/news/articles/co-6163-ga.16047.htmlhttp://www.sourcesecurity.com/news/articles/co-6163-ga.16047.htmlApplications NewsThu, 18 Dec 2014 08:00:00 GMT<table style="width: 242px; height: 287px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong><span class="smalltxt">Axxon Intellect PSIM was installed at The Pan-American Highway's tollbooths to service and secure the highway</span></strong></td> </tr> </tbody> </table> <p>The Pan-American Highway is the world's longest motorable road, connecting the U.S. and Canada with Latin America. Extending from the North Slope of Alaska to the southern tip of South America, the highway extends approximately 30,000 miles (48,000 kilometres) &ndash; greater than the circumference of the earth. Construction started in 1923 and, in some stretches, continues to this day. This is a massive project to be sure. But it is also a massive maintenance task. Imagine trying to service and secure such...The year in mergers and acquisitions: Top 10 of 2014http://www.sourcesecurity.com/news/articles/co-7254-ga-co-3126-ga-co-353-ga-co-12086-ga-co-823-ga-co-2060-ga-co-984-ga-co-2910-ga-co-2281-ga-co-1151-ga-co-12085-ga-co-1437-ga-co-268-ga-co-7927-ga-co-12200-ga-co-1756-ga-co-3802-ga-co-2140-ga-co-3194-ga-co-8096-ga.16023.htmlhttp://www.sourcesecurity.com/news/articles/co-7254-ga-co-3126-ga-co-353-ga-co-12086-ga-co-823-ga-co-2060-ga-co-984-ga-co-2910-ga-co-2281-ga-co-1151-ga-co-12085-ga-co-1437-ga-co-268-ga-co-7927-ga-co-12200-ga-co-1756-ga-co-3802-ga-co-2140-ga-co-3194-ga-co-8096-ga.16023.htmlExpert CommentaryThu, 18 Dec 2014 08:00:00 GMT<table style="width: 246px; height: 323px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong></strong></td> </tr> </tbody> </table> <p>2014 was a year for eye-popping merger and acquisition (M&amp;A) activity in the security space. The big deals of the year included some of the largest names in the industry. One name is larger than any in the security market &ndash; Google, which made not one but two acquisitions this year that could have impact the future security market.</p> <p>It was also the year that a smaller player in the video camera market (although a huge familiar brand overall) bought a large, open systems VMS company (to almost everyone&rsquo;s...Embracing big data and discontinuing antiquated systemshttp://www.sourcesecurity.com/news/articles/co-2415-ga.15894.htmlhttp://www.sourcesecurity.com/news/articles/co-2415-ga.15894.htmlExpert CommentaryThu, 18 Dec 2014 08:00:00 GMT<table style="width: 262px; height: 299px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong class="smalltxt">Big Data is a challenge that emerging technologies are working to address</strong></td> </tr> </tbody> </table> <p><strong>Quantum Secure 2014/2015 Review and Forecast:</strong> <br /><br />As demonstrated by end users&rsquo; continued desire to identify and implement technologies that provide the greatest level of protection for people, property and assets, it&rsquo;s clear that security will always be a necessity.</p> <p>Today, customers demand strong, demonstrable ROI from those technologies and expect solutions to align with their overall business goals. For example, the C suite and the Board of Directors require metrics that show which policy...The power of uncoupling hardware and softwarehttp://www.sourcesecurity.com/news/articles/co-4108-ga.15892.htmlhttp://www.sourcesecurity.com/news/articles/co-4108-ga.15892.htmlExpert CommentaryWed, 17 Dec 2014 08:00:00 GMT<table style="width: 263px; height: 297px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong class="smalltxt">Uncoupling software from hardware allows manufacturers to respond faster to changes</strong></td> </tr> </tbody> </table> <p><strong>Nedap Security Management 2014/2015 Review and Forecast:</strong><br /><br />Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems &ndash; these are just some of the challenges <a href="http://www.sourcesecurity.com/companies/search-results/company-search/t.manufacturers.html" class="blue_bold">security manufacturers</a> and system users have to deal with and respond to. External factors such as these do provoke change in...CNL Software's IPSecurityCenter PSIM receives factory certification under Lenel OpenAccess Alliance Programhttp://www.sourcesecurity.com/news/articles/co-1042-ga-co-8497-ga.16020.htmlhttp://www.sourcesecurity.com/news/articles/co-1042-ga-co-8497-ga.16020.htmlCorporate NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 268px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>The interface provides security intelligence, allowing organisations to react faster and more precisely to incidents</strong></p> </td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/cnl-software.html" class="blue_bold">CNL Software</a>, a world leader in Physical Security Information Management (PSIM) software is pleased to announce that its IPSecurityCenter&trade; PSIM has received <a href="http://www.sourcesecurity.com/companies/company-listing/lenel-systems-international.html"...Penton announces International Wireless Communications Expo 2015 keynote speakershttp://www.sourcesecurity.com/news/articles/co-9856-ga.16015.htmlhttp://www.sourcesecurity.com/news/articles/co-9856-ga.16015.htmlEvents NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 268px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>Penton&rsquo;s IWCE keynote speakers includes Roger Cressey and Dr. Reginald Brothers </strong></p> </td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/penton.html" class="blue_bold"><span class="blue_bold">Penton</span></a>&rsquo;s <a href="http://www.sourcesecurity.com/events/enhanced-event-listing/iwce-2015.html" class="blue_bold">International Wireless Communications Expo (IWCE)</a> has announced Roger Cressey, a counter-terrorism analyst for NBC News and former presidential advisor, will give the Opening Keynote Address for its 2015 show. Dr. Reginald...BCDVideo certifies new Johnson Controls P200 video management systemhttp://www.sourcesecurity.com/news/articles/co-10265-ga-co-2900-ga.15991.htmlhttp://www.sourcesecurity.com/news/articles/co-10265-ga-co-2900-ga.15991.htmlCorporate NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 235px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr class="smalltxt"> <td style="text-align: center;"><strong>The P2000 VMS helps to navigate between various management systems</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/bcdvideo.html" class="blue_bold">BCDVideo</a><span class="blue_bold"> </span>has announced the certification of <a href="http://www.sourcesecurity.com/companies/micro-site/johnson-controls-inc.html" class="blue_bold">Johnson Controls&rsquo;</a> newly released P2000 Video Management System (P2000 VMS) on their Nova Series line of enterprise-class storage solutions. This new VMS offers a single, open interface to intuitively navigate between video management, video analytics, system integration, and alarm...Customers want more data analysis and auditinghttp://www.sourcesecurity.com/news/articles/co-3579-ga.15973.htmlhttp://www.sourcesecurity.com/news/articles/co-3579-ga.15973.htmlExpert CommentaryTue, 16 Dec 2014 08:00:00 GMT<table style="width: 266px; height: 309px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td> <p style="text-align: center;"><strong><span class="blue_bold smalltxt" style="color: #999999;"></span><span class="smalltxt">2014 saw more organisations making data-driven decisions with insight or foresight provided by intelligent analysis of the data</span><br /></strong></p> </td> </tr> </tbody> </table> <p><strong>Morse Watchmans 2014/2015 Review and Forecast:</strong> <br /><br />2014 saw a year of continued change in the security marketplace. A healthier economy triggered growth in new projects and helped loosen the purse strings for capital expenditures. From a technology standpoint, the industry evolution to a more network-centric environment created additional opportunities for manufacturers to...Simplifying management of large, geographically complex siteshttp://www.sourcesecurity.com/news/articles/co-6163-ga.15967.htmlhttp://www.sourcesecurity.com/news/articles/co-6163-ga.15967.htmlExpert CommentaryMon, 15 Dec 2014 08:00:00 GMT<table style="width: 224px; height: 323px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Developers have made huge strides in the effectiveness, convenience, and reliability of the technologies used in video surveillance</strong></td> </tr> </tbody> </table> <p><strong>AxxonSoft 2014/2015 Review and Forecast:</strong><br /><br />Video technology began with simple <a href="http://www.sourcesecurity.com/product-categories/cctv.html" class="blue_bold">CCTV systems</a>, but these systems have gradually become more sophisticated, offering both scene analytics and forensic post-analysis. The payoff is found in today's smart security systems.</p> <p>Video analytics are in use today in real-world...Security market shifting from reactive to proactive solutionshttp://www.sourcesecurity.com/news/articles/co-10820-ga.15963.htmlhttp://www.sourcesecurity.com/news/articles/co-10820-ga.15963.htmlExpert CommentarySat, 13 Dec 2014 08:00:00 GMT<table style="width: 178px; height: 306px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>Winning companies are those that continue to be proactive rather than reactive to the changing security environment</strong></p> </td> </tr> </tbody> </table> <p><strong>Scallop <strong>2014/2015&nbsp;</strong>Review and Forecast:</strong></p> <p>In the last few years, we have seen a number of developments in the security industry &ndash; including organisations taking a more proactive approach to security. As a result, the demand for <a href="http://www.sourcesecurity.com/tags/surveillance-systems.html"...Maxxess to unveil its eFusion integration with Salto’s Virtual Network access control at Intersec 2015http://www.sourcesecurity.com/news/articles/co-9972-ga-co-3322-ga.15977.htmlhttp://www.sourcesecurity.com/news/articles/co-9972-ga-co-3322-ga.15977.htmlEvents NewsFri, 12 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 267px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Maxxess will also launch an interactive and online security consultant&rsquo;s pack at the event</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/maxxess-systems-inc.html" class="blue_bold">Maxxess</a> will showcase an unsurpassed number of integrations within its eFusion&trade; security management platform at <a href="http://www.sourcesecurity.com/events/enhanced-event-listing/intersec-dubai-2015.html" class="blue_bold">Intersec 2015</a> due to take place...Security market trends in video: hype or happening?http://www.sourcesecurity.com/news/articles/co-227-ga-co-289-ga-co-1151-ga.15966.htmlhttp://www.sourcesecurity.com/news/articles/co-227-ga-co-289-ga-co-1151-ga.15966.htmlExpert CommentaryFri, 12 Dec 2014 08:00:00 GMT<table style="width: 238px; height: 323px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>There is convergence of both the video and access control technologies, and of the companies themselves</strong></td> </tr> </tbody> </table> <p><strong>Milestone Systems 2014/2015&nbsp;Review and Forecast:</strong></p> <p><a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/milestone-systems.html" class="blue_bold">Milestone Systems</a> is always in touch with our vast ecosystem of partners around the globe as we support them in their customer projects and needs. We partake in hundreds of industry events,...Smart phone access control shift expected for 2015?http://www.sourcesecurity.com/news/articles/co-6909-ga.15964.htmlhttp://www.sourcesecurity.com/news/articles/co-6909-ga.15964.htmlExpert CommentaryFri, 12 Dec 2014 08:00:00 GMT<table style="width: 242px; height: 310px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The major trend <strong>ECKey </strong>has seen in 2014 is an increased demand for &ldquo;accountable&rdquo; access control that is both convenient and affordable<strong>&nbsp; </strong></strong></td> </tr> </tbody> </table> <p><strong>ECKey <strong>2014/2015&nbsp;</strong>Review and Forecast:</strong></p> <p>The major trend we have seen in 2014 is an increased demand for &ldquo;accountable&rdquo; <a href="http://www.sourcesecurity.com/product-categories/access-control.html" class="blue_bold">access control</a> that is both convenient and affordable. Tight budgets are shining a light on the true cost of ownership...NICE Systems integrates its situation management solution with CloudScann’s hosted See It Send It mobile apphttp://www.sourcesecurity.com/news/articles/co-9744-ga-npr.15961.htmlhttp://www.sourcesecurity.com/news/articles/co-9744-ga-npr.15961.htmlNew Product ReleasesThu, 11 Dec 2014 08:00:00 GMT<p>NICE Systems and CloudScann have announced an integrated mobile application solution, turning smartphones into reporting tools to document incidents as they happen and allowing officials to act faster to resolve them.</p> <p>The integrated solution combines NICE&rsquo;s situation management solution, Situator, with CloudScann&rsquo;s hosted See It Send It mobile app. By using the app on their smartphones, field personnel can report incidents, including sending video and photos, to a centralised command center through NICE Situator. Communication is bi-directional, so Situator can also push incident alerts, task lists, and links to live video feeds to the mobile app. This will extend the real-time awareness of safety, security, and operational issues for the largest statewide public transportation system in the U.S.</p> <p>Situator pinpoints the GPS location of the sender&rsquo;s phone as the incident location, and can then pull up video feeds from nearby surveillance cameras....Samsung video surveillance brand intact after sale of shares to Hanwhahttp://www.sourcesecurity.com/news/articles/co-1437-ga-co-9381-ga-sb.15942.htmlhttp://www.sourcesecurity.com/news/articles/co-1437-ga-co-9381-ga-sb.15942.htmlSecurity BeatWed, 10 Dec 2014 08:00:00 GMT<p><strong>When is an acquisition not really an acquisition but rather the &ldquo;sale of shares by one corporate conglomerate to another?&rdquo;</strong></p> <p>Such is the core question in the aftermath of <a href="http://www.sourcesecurity.com/news/articles/co-1437-ga.15846.html" class="blue_bold">Samsung&rsquo;s sale of its interest in Samsung Techwin</a> to fellow Korean conglomerate Hanwha Holdings. Samsung announced sale in late November of its 32.4 percentage ownership in the video surveillance company (as part of a larger sale of its defence and chemical affiliates). The 32.4 percent of stock represents the largest share of ownership in <a href="http://www.sourcesecurity.com/companies/micro-site/samsung-techwin.html" class="blue_bold">Samsung Techwin</a>.</p> <p>However, <a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/samsung-techwin-america.html" class="blue_bold">Samsung Techwin America</a> says the sale will not impact its growing success in...Connected Technologies welcomes Sam Rizzo as new Business Development Directorhttp://www.sourcesecurity.com/news/articles/co-10973-ga-co-5961-ga-co-289-ga-co-12491-ga-co-9976-ga.15939.htmlhttp://www.sourcesecurity.com/news/articles/co-10973-ga-co-5961-ga-co-289-ga-co-12491-ga-co-9976-ga.15939.htmlCorporate NewsWed, 10 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Rizzo will advance the company&rsquo;s flagship <strong>ConnectONE&nbsp;</strong>integrated security management platform</strong></td> </tr> </tbody> </table> <p>Sam Rizzo, a veteran of the security industry with past employment spanning more than 40 years, has joined <a href="http://www.sourcesecurity.com/companies/company-listing/connected-technologies.html" class="blue_bold">Connected Technologies</a>, LLC as Director of Business Development. Rizzo comes on to advance the dealer-integrator program for Connect ONE&reg;, the flagship, integrated security management...Identiv to present Imperial Capital's 11th Annual Security Investor Conferencehttp://www.sourcesecurity.com/news/articles/co-5790-ga.15934.htmlhttp://www.sourcesecurity.com/news/articles/co-5790-ga.15934.htmlEvents NewsTue, 09 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 267px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Identiv&rsquo;s CFO, Brian Nelson will present at Imperial Capital's 11th Annual Security Investor Conference</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/identive-group.html" class="blue_bold">Identiv</a>, a global security technology company that provides trusted identity solutions for premises, information, and everyday items, recently announced that Brian Nelson, CFO, will present at Imperial Capital's <a...Cognitec signs software development and license agreement with Intel Corporationhttp://www.sourcesecurity.com/news/articles/co-2232-ga.15931.htmlhttp://www.sourcesecurity.com/news/articles/co-2232-ga.15931.htmlCorporate NewsTue, 09 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>The companies will apply face recognition to access control on electronic devices</strong></p> </td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/cognitec-systems-gmbh.html" class="blue_bold">Cognitec Systems</a> has signed an important software development and license agreement with Intel Corporation.</p> <p>Under the agreement, the companies will cooperate to apply face recognition to access control on electronic devices. Logon to PCs, laptops, tablets, mobile phones, and other computing devices will become both more convenient...Storm to introduce new generation of keypads with integrated Genuine HID contactless technologyhttp://www.sourcesecurity.com/news/articles/co-823-ga-co-10911-ga.15930.htmlhttp://www.sourcesecurity.com/news/articles/co-823-ga-co-10911-ga.15930.htmlEvents NewsTue, 09 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 281px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The new generation of Storm keypads with HID contactless technology will be unveiled at Intersec 2015</strong></td> </tr> </tbody> </table> <p>Back in the year 2000, <a href="http://www.sourcesecurity.com/companies/company-listing/storm-interface.html" class="blue_bold">Storm</a>&rsquo;s AXS StrikeMaster keypads were voted No.1 by professional security installers. These award winning keypads have been a firm favourite ever since. Their durability and reliability built a reputation for being the &ldquo;fit and forget&rdquo; access control product.</p>...