SourceSecurity.com RSS - Access control readers news SourceSecurity.com RSS - Access control readers news from SourceSecurity.com http://www.sourcesecurity.com/news/pc/readers.html Copyright (C) SourceSecurity.com 2014 Thu, 18 Dec 2014 08:00:00 GMT Thu, 18 Dec 2014 08:00:00 GMT The year in mergers and acquisitions: Top 10 of 2014http://www.sourcesecurity.com/news/articles/co-7254-ga-co-3126-ga-co-353-ga-co-12086-ga-co-823-ga-co-2060-ga-co-984-ga-co-2910-ga-co-2281-ga-co-1151-ga-co-12085-ga-co-1437-ga-co-268-ga-co-7927-ga-co-12200-ga-co-1756-ga-co-3802-ga-co-2140-ga-co-3194-ga-co-8096-ga.16023.htmlhttp://www.sourcesecurity.com/news/articles/co-7254-ga-co-3126-ga-co-353-ga-co-12086-ga-co-823-ga-co-2060-ga-co-984-ga-co-2910-ga-co-2281-ga-co-1151-ga-co-12085-ga-co-1437-ga-co-268-ga-co-7927-ga-co-12200-ga-co-1756-ga-co-3802-ga-co-2140-ga-co-3194-ga-co-8096-ga.16023.htmlExpert CommentaryThu, 18 Dec 2014 08:00:00 GMT<table style="width: 246px; height: 323px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong></strong></td> </tr> </tbody> </table> <p>2014 was a year for eye-popping merger and acquisition (M&amp;A) activity in the security space. The big deals of the year included some of the largest names in the industry. One name is larger than any in the security market &ndash; Google, which made not one but two acquisitions this year that could have impact the future security market.</p> <p>It was also the year that a smaller player in the video camera market (although a huge familiar brand overall) bought a large, open systems VMS company (to almost everyone&rsquo;s...Embracing big data and discontinuing antiquated systemshttp://www.sourcesecurity.com/news/articles/co-2415-ga.15894.htmlhttp://www.sourcesecurity.com/news/articles/co-2415-ga.15894.htmlExpert CommentaryThu, 18 Dec 2014 08:00:00 GMT<table style="width: 262px; height: 299px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong class="smalltxt">Big Data is a challenge that emerging technologies are working to address</strong></td> </tr> </tbody> </table> <p><strong>Quantum Secure 2014/2015 Review and Forecast:</strong> <br /><br />As demonstrated by end users&rsquo; continued desire to identify and implement technologies that provide the greatest level of protection for people, property and assets, it&rsquo;s clear that security will always be a necessity.</p> <p>Today, customers demand strong, demonstrable ROI from those technologies and expect solutions to align with their overall business goals. For example, the C suite and the Board of Directors require metrics that show which policy...The power of uncoupling hardware and softwarehttp://www.sourcesecurity.com/news/articles/co-4108-ga.15892.htmlhttp://www.sourcesecurity.com/news/articles/co-4108-ga.15892.htmlExpert CommentaryWed, 17 Dec 2014 08:00:00 GMT<table style="width: 263px; height: 297px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong class="smalltxt">Uncoupling software from hardware allows manufacturers to respond faster to changes</strong></td> </tr> </tbody> </table> <p><strong>Nedap Security Management 2014/2015 Review and Forecast:</strong><br /><br />Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems &ndash; these are just some of the challenges <a href="http://www.sourcesecurity.com/companies/search-results/company-search/t.manufacturers.html" class="blue_bold">security manufacturers</a> and system users have to deal with and respond to. External factors such as these do provoke change in...Penton announces International Wireless Communications Expo 2015 keynote speakershttp://www.sourcesecurity.com/news/articles/co-9856-ga.16015.htmlhttp://www.sourcesecurity.com/news/articles/co-9856-ga.16015.htmlEvents NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 268px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>Penton&rsquo;s IWCE keynote speakers includes Roger Cressey and Dr. Reginald Brothers </strong></p> </td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/penton.html" class="blue_bold"><span class="blue_bold">Penton</span></a>&rsquo;s <a href="http://www.sourcesecurity.com/events/enhanced-event-listing/iwce-2015.html" class="blue_bold">International Wireless Communications Expo (IWCE)</a> has announced Roger Cressey, a counter-terrorism analyst for NBC News and former presidential advisor, will give the Opening Keynote Address for its 2015 show. Dr. Reginald...BCDVideo certifies new Johnson Controls P200 video management systemhttp://www.sourcesecurity.com/news/articles/co-10265-ga-co-2900-ga.15991.htmlhttp://www.sourcesecurity.com/news/articles/co-10265-ga-co-2900-ga.15991.htmlCorporate NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 235px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr class="smalltxt"> <td style="text-align: center;"><strong>The P2000 VMS helps to navigate between various management systems</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/bcdvideo.html" class="blue_bold">BCDVideo</a><span class="blue_bold"> </span>has announced the certification of <a href="http://www.sourcesecurity.com/companies/micro-site/johnson-controls-inc.html" class="blue_bold">Johnson Controls&rsquo;</a> newly released P2000 Video Management System (P2000 VMS) on their Nova Series line of enterprise-class storage solutions. This new VMS offers a single, open interface to intuitively navigate between video management, video analytics, system integration, and alarm...Users need more flexibility, security and longer-range solutionshttp://www.sourcesecurity.com/news/articles/co-2736-ga-co-574-ga.15895.htmlhttp://www.sourcesecurity.com/news/articles/co-2736-ga-co-574-ga.15895.htmlExpert CommentaryTue, 16 Dec 2014 08:00:00 GMT<table style="float: left; width: 264px; height: 299px;" border="0" cellspacing="8"> <tbody> <tr> <td></td> </tr> <tr class="smalltxt"> <td style="text-align: center;"><strong>End users continue to move to smart cards and smart readers, wanting the extra flexibilities they offer</strong></td> </tr> </tbody> </table> <p>2014 was very good year at <a href="http://www.sourcesecurity.com/companies/company-listing/farpointe-data-inc.html" class="blue_bold">Farpointe Data</a>. Significantly, it became part of the <a href="http://www.sourcesecurity.com/companies/company-listing/dorma.html" class="blue_bold">DORMA group</a>, which helps cement our standing as a global partner of premium RFID solutions<span class="blue_bold smalltxt"></span><span class="smalltxt">,</span> including proximity, smart card and long-range solutions, for...IP access control system manufacturer ISONAS announces Robert Lydic as Vice-President of Saleshttp://www.sourcesecurity.com/news/articles/co-6100-ga.15995.htmlhttp://www.sourcesecurity.com/news/articles/co-6100-ga.15995.htmlCorporate NewsMon, 15 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><a href="http://www.sourcesecurity.com/companies/company-listing/isonas-security-systems-inc.html" class="blue_bold"><strong></strong></a><strong>Mr. Lydic will be responsible for managing the outside sales team and working to increase revenue</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/isonas-security-systems-inc.html" class="blue_bold">ISONAS Inc.<span class="blue_bold"></span>,</a> the leading pure IP access control system manufacturer, has announced that Robert Lydic has been...Smiths Detection announces five-year contract to supply X-ray scanners to U.S. Customs and Border Protectionhttp://www.sourcesecurity.com/news/articles/co-1560-ga.16000.htmlhttp://www.sourcesecurity.com/news/articles/co-1560-ga.16000.htmlCorporate NewsMon, 15 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 295px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The advanced scanners will cover a range of operations from screening baggages to examining cargo for contraband</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/smiths-detection.html" class="blue_bold">Smiths Detection Inc.</a> recently announced a five-year contract to supply X-ray scanners to U.S. Customs and Border Protection (CBP) for its non-intrusive inspection programme, aimed at protecting points of entry by land, air or sea.</p> <p>The advanced scanners will cover a range of operations, from screening...Security market trends in video: hype or happening?http://www.sourcesecurity.com/news/articles/co-227-ga-co-289-ga-co-1151-ga.15966.htmlhttp://www.sourcesecurity.com/news/articles/co-227-ga-co-289-ga-co-1151-ga.15966.htmlExpert CommentaryFri, 12 Dec 2014 08:00:00 GMT<table style="width: 238px; height: 323px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>There is convergence of both the video and access control technologies, and of the companies themselves</strong></td> </tr> </tbody> </table> <p><strong>Milestone Systems 2014/2015&nbsp;Review and Forecast:</strong></p> <p><a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/milestone-systems.html" class="blue_bold">Milestone Systems</a> is always in touch with our vast ecosystem of partners around the globe as we support them in their customer projects and needs. We partake in hundreds of industry events,...Smart phone access control shift expected for 2015?http://www.sourcesecurity.com/news/articles/co-6909-ga.15964.htmlhttp://www.sourcesecurity.com/news/articles/co-6909-ga.15964.htmlExpert CommentaryFri, 12 Dec 2014 08:00:00 GMT<table style="width: 242px; height: 310px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The major trend <strong>ECKey </strong>has seen in 2014 is an increased demand for &ldquo;accountable&rdquo; access control that is both convenient and affordable<strong>&nbsp; </strong></strong></td> </tr> </tbody> </table> <p><strong>ECKey <strong>2014/2015&nbsp;</strong>Review and Forecast:</strong></p> <p>The major trend we have seen in 2014 is an increased demand for &ldquo;accountable&rdquo; <a href="http://www.sourcesecurity.com/product-categories/access-control.html" class="blue_bold">access control</a> that is both convenient and affordable. Tight budgets are shining a light on the true cost of ownership...How biometric cards improve security and extend the life of proximity systemshttp://www.sourcesecurity.com/news/articles/co-11521-ga.15905.htmlhttp://www.sourcesecurity.com/news/articles/co-11521-ga.15905.htmlExpert CommentaryFri, 12 Dec 2014 08:00:00 GMT<table style="width: 154px; height: 259px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="middle" align="center"> <p><strong>Biometric cards provides an easy way for to provide a biometric upgrade to access control systems using card readers</strong></p> </td> </tr> </tbody> </table> <p><strong><em>More and more, security professionals using card-based front ends for their <a href="http://www.sourcesecurity.com/product-categories/access-control.html" class="blue_bold">access control systems </a>have been worried about the security of their proximity systems. They know, that for $200 or less, their proximity system can be violated.&nbsp;</em></strong><strong style="font-size: 12px;"><em>Kim Humborstad, CEO of <a...ONVIF to launch a proactive education and enforcement campaignhttp://www.sourcesecurity.com/news/articles/co-8173-ga.15957.htmlhttp://www.sourcesecurity.com/news/articles/co-8173-ga.15957.htmlCorporate NewsThu, 11 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 266px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The campaign is designed to ensure that all claims of ONVIF conformance are valid</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/onvif.html" class="blue_bold">ONVIF</a>, the leading global standardisation initiative for IP-based physical security products, announced recently that it is launching a proactive education and enforcement campaign designed to ensure that all claims of ONVIF conformance by manufacturers of IP-based physical security products are valid.</p> <p>The education and...Idesco access control readers protect workers at Pyhasalmi Mine in Europehttp://www.sourcesecurity.com/news/articles/co-855-ga.15945.htmlhttp://www.sourcesecurity.com/news/articles/co-855-ga.15945.htmlApplications NewsWed, 10 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The system&rsquo;s access points at entrances/exits deploys numerous Idesco 7 CE readers</strong></td> </tr> </tbody> </table> <p>Pyh&auml;salmi Mine, Europe&rsquo;s deepest underground mine, has deployed a combined access control and rescue control system designed specifically for mining environments. This one-of-a-kind system, designed by <a href="http://www.sourcesecurity.com/companies/company-listing/identoi-oy.html" class="blue_bold">Identoi Oy</a>, was developed in extensive co-operation with Pyh&auml;salmi Mine. To supply the system&rsquo;s readers, Identoi has...Samsung video surveillance brand intact after sale of shares to Hanwhahttp://www.sourcesecurity.com/news/articles/co-1437-ga-co-9381-ga-sb.15942.htmlhttp://www.sourcesecurity.com/news/articles/co-1437-ga-co-9381-ga-sb.15942.htmlSecurity BeatWed, 10 Dec 2014 08:00:00 GMT<p><strong>When is an acquisition not really an acquisition but rather the &ldquo;sale of shares by one corporate conglomerate to another?&rdquo;</strong></p> <p>Such is the core question in the aftermath of <a href="http://www.sourcesecurity.com/news/articles/co-1437-ga.15846.html" class="blue_bold">Samsung&rsquo;s sale of its interest in Samsung Techwin</a> to fellow Korean conglomerate Hanwha Holdings. Samsung announced sale in late November of its 32.4 percentage ownership in the video surveillance company (as part of a larger sale of its defence and chemical affiliates). The 32.4 percent of stock represents the largest share of ownership in <a href="http://www.sourcesecurity.com/companies/micro-site/samsung-techwin.html" class="blue_bold">Samsung Techwin</a>.</p> <p>However, <a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/samsung-techwin-america.html" class="blue_bold">Samsung Techwin America</a> says the sale will not impact its growing success in...SALTO adds Clay Wall Reader to its line of cloud-based electronic locking solutionshttp://www.sourcesecurity.com/news/articles/co-3322-ga-npr.15941.htmlhttp://www.sourcesecurity.com/news/articles/co-3322-ga-npr.15941.htmlNew Product ReleasesWed, 10 Dec 2014 08:00:00 GMT<p>The Clay by SALTO hardware line is about to welcome a new member into the family: the Clay Wall Reader.</p> <p>Thanks to its breakthrough design, the Clay Wall Reader provides an ideal access control solution for installation in places where an electronic lock cannot be fitted. This can include fences, lifts, mechanical doors, parking barriers and so on.</p> <p>Suitable for use indoors or out, the Clay Wall Reader reads encrypted data on its operating Clay Tag and communicates this to the Wall Reader&rsquo;s Control Unit, which talks wirelessly with the Clay IQ which is the central hub of the Clay by SALTO system. This provides users with a number of access control options, including the ability to remotely open parking barriers from inside a vehicle.</p> <p>Main features of the new Clay Wall Reader are: Optical signalling through innovative LED design with dual colour green/red to indicate access authorisation, cloud based real time communication, contactless reading of the...Identiv to present Imperial Capital's 11th Annual Security Investor Conferencehttp://www.sourcesecurity.com/news/articles/co-5790-ga.15934.htmlhttp://www.sourcesecurity.com/news/articles/co-5790-ga.15934.htmlEvents NewsTue, 09 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 267px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Identiv&rsquo;s CFO, Brian Nelson will present at Imperial Capital's 11th Annual Security Investor Conference</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/identive-group.html" class="blue_bold">Identiv</a>, a global security technology company that provides trusted identity solutions for premises, information, and everyday items, recently announced that Brian Nelson, CFO, will present at Imperial Capital's <a...Cognitec signs software development and license agreement with Intel Corporationhttp://www.sourcesecurity.com/news/articles/co-2232-ga.15931.htmlhttp://www.sourcesecurity.com/news/articles/co-2232-ga.15931.htmlCorporate NewsTue, 09 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>The companies will apply face recognition to access control on electronic devices</strong></p> </td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/cognitec-systems-gmbh.html" class="blue_bold">Cognitec Systems</a> has signed an important software development and license agreement with Intel Corporation.</p> <p>Under the agreement, the companies will cooperate to apply face recognition to access control on electronic devices. Logon to PCs, laptops, tablets, mobile phones, and other computing devices will become both more convenient...Biometrics market poised for rapid growthhttp://www.sourcesecurity.com/news/articles/co-1645-ga.15896.htmlhttp://www.sourcesecurity.com/news/articles/co-1645-ga.15896.htmlExpert CommentaryTue, 09 Dec 2014 08:00:00 GMT<table style="width: 262px; height: 313px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong><span class="smalltxt">2014 has been a year of significant <br />growth </span><span class="smalltxt">for TDSi</span> </strong></td> </tr> </tbody> </table> <strong>TDSi <strong>2014/2015&nbsp;</strong>Review and Forecast:<br /><br />In 2014 we saw continued growth at <a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/tdsi.html" class="blue_bold">TDSI</a>, largely through unprecedented interest in<a href="http://www.sourcesecurity.com/technology-areas/network-ip/product-categories/integrated-systems.html" class="blue_bold"> <span class="blue_bold">integrated IP security systems</span></a>. Asian markets have continued to be very buoyant,...TDSi gains market share in Vietnam and Cambodia with partner Giang Viet System Integrated Corphttp://www.sourcesecurity.com/news/articles/co-12468-ga-co-1645-ga.15913.htmlhttp://www.sourcesecurity.com/news/articles/co-12468-ga-co-1645-ga.15913.htmlCorporate NewsMon, 08 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 270px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>TDSi along with security integration partner GTCSI has worked on a number of key projects in Vietnam</strong></td> </tr> </tbody> </table> <p>As part of its expansion in the South Asian market, UK-based integrated security manufacturer <a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/tdsi.html" class="blue_bold">TDSi</a> is working with Vietnamese security integration partner <a href="http://www.sourcesecurity.com/companies/company-listing/giang-viet-technology-company.html" class="blue_bold">GTCSI...ASSA ABLOY acquires ODIS Limitada and expands customer base in Chilean markethttp://www.sourcesecurity.com/news/articles/co-9380-ga.15909.htmlhttp://www.sourcesecurity.com/news/articles/co-9380-ga.15909.htmlCorporate NewsMon, 08 Dec 2014 08:00:00 GMT<table style="width: 3px; height: 266px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The transaction is expected to close during Q4 2014</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/assa-abloy.html" class="blue_bold"><span class="blue_bold">ASSA ABLOY</span></a> has signed an agreement to acquire ODIS Limitada, a leading supplier of locks, padlocks and steel doors to the Chilean market.</p> <p><em>"I am very pleased to welcome ODIS into the ASSA ABLOY Group. ODIS constitutes another important step in our strategy to grow market presence in Chile and other emerging markets,&rdquo;</em> says Johan...