SourceSecurity.com RSS - Access control software news SourceSecurity.com RSS - Access control software news from SourceSecurity.com http://www.sourcesecurity.com/news/pc/software.2.html Copyright (C) SourceSecurity.com 2016 Fri, 27 May 2016 08:00:00 GMT Fri, 27 May 2016 08:00:00 GMT IFSEC 2016: TDSi to display SOLOgarde, MICROgarde and EXcel controllers along with EXgarde and VUgarde softwarehttp://www.sourcesecurity.com/news/articles/ifsec-2016-tdsi-sologarde-microgarde-controller-exgarde-vugarde-software-co-9380-ga-co-1151-ga-co-3480-ga-co-1645-ga-co-1661-ga-co-8096-ga.20658.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/ifsec-2016-tdsi-sologarde-microgarde-controller-exgarde-vugarde-software-co-9380-ga-co-1151-ga-co-3480-ga-co-1645-ga-co-1661-ga-co-8096-ga.20658.htmlEvents NewsFri, 27 May 2016 08:00:00 GMT<table style="width: 220px; float: left;" cellspacing="8"> <tbody> <tr style="height: 223px;"> <td style="height: 223px;"></td> </tr> <tr style="height: 15.5px;"> <td style="height: 15.5px; text-align: center;"><span class="smalltxt"><strong>TDSi&rsquo;s stand will display its SOLOgarde, MICROgarde and EXcel controllers, as well as the company&rsquo;s enterprise solutions</strong></span></td> </tr> </tbody> </table> <p>Integrated security manufacturer TDSi will be showcasing its fully integrated security solutions, including a sneak peek at its new innovations, on its stand at this year&rsquo;s...Avoiding the cybersecurity risks of cloud-based security solutionshttp://www.sourcesecurity.com/news/articles/cybersecurity-risks-cloud-security-co-3019-ga.20667.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/cybersecurity-risks-cloud-security-co-3019-ga.20667.htmlExpert CommentaryThu, 26 May 2016 08:00:00 GMT<table style="width: 100%; margin-left: auto; margin-right: auto;" cellspacing="8"> <tbody> <tr> <td style="text-align: center;"></td> </tr> <tr> <td style="text-align: center;"><strong><span class="smalltxt">Cloud connectivity can provide a linkage between the mobile users <br />and the facilities and systems they want to interact with</span></strong></td> </tr> </tbody> </table> <p><strong>From enterprise applications to small businesses, schools, health care facilities and beyond, investments in physical security systems provide valuable resources to help protect people, property and assets &ndash; and ultimately the financial security and well-being of the organisation. As need and demand for better security has dramatically...Sovereign Fire and Security releases room observation system for detention and healthcare facilitieshttp://www.sourcesecurity.com/news/articles/sovereign-fire-security-room-observation-detention-healthcare-facilities-co-5418-ga-npr.20662.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/sovereign-fire-security-room-observation-detention-healthcare-facilities-co-5418-ga-npr.20662.htmlProduct NewsThu, 26 May 2016 08:00:00 GMT<table style="width: 100%; margin-left: auto; margin-right: auto;" cellspacing="8"> <tbody> <tr> <td style="text-align: center;"></td> </tr> <tr> <td style="text-align: center;"><strong><span class="smalltxt">The ROS consists of a high-security camera inside the secure room <br />paired with an Audio Visual Unit (AVU) outside the monitored area</span></strong></td> </tr> </tbody> </table> <p>Sovereign Fire and Security has released a room observation system (ROS) to promote the welfare of vulnerable people in secure hospitals, mental health units, immigration centres and any kind of detention facility. The product will oversee duty of care but at the same time protect staff from spurious claims of mistreating or neglecting inmates.</p>...Tyco Security Products debuts integrated SALTO lock solution for access controlhttp://www.sourcesecurity.com/news/articles/tyco-security-products-integrated-salto-lock-co-3322-ga-co-8421-ga-co-2554-ga-npr.20659.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/tyco-security-products-integrated-salto-lock-co-3322-ga-co-8421-ga-co-2554-ga-npr.20659.htmlProduct NewsThu, 26 May 2016 08:00:00 GMT<table style="width: 100%; margin-left: auto; margin-right: auto;" cellspacing="8"> <tbody> <tr> <td style="text-align: center;"></td> </tr> <tr> <td style="text-align: center;"><span class="smalltxt"><strong>The <a href="http://www.swhouse.com/products/software_CCURE9000.aspx">C&bull;CURE 9000</a>/SALTO solution is ideal for access control systems that <br />require varying levels of security for interior and exterior access points</strong></span></td> </tr> </tbody> </table> <p>Tyco Security Products announces the integration of its&nbsp;<a class="orangebold"...Aqua announces general availability of Container Security Platformhttp://www.sourcesecurity.com/news/articles/aqua-announces-general-availability-container-security-platform-co-14079-ga-npr.20593.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/aqua-announces-general-availability-container-security-platform-co-14079-ga-npr.20593.htmlProduct NewsMon, 23 May 2016 08:00:00 GMT<table style="width: 100%; margin-left: auto; margin-right: auto;" cellspacing="8"> <tbody> <tr> <td style="text-align: center;"></td> </tr> <tr> <td style="text-align: center;"><span class="smalltxt"><strong>The Aqua Container Security Platform gives organisations total control over the security and compliance posture of software containers</strong></span></td> </tr> </tbody> </table> <p>Aqua Security&trade; (formerly named Scalock) today announced the company&rsquo;s formal launch and General Availability of the Aqua Container Security Platform, the industry&rsquo;s most comprehensive solution for securing containerised environments. The Aqua Container Security Platform provides organisations with full control over the security and...Tyco’s new Total Security integrated solution for remote management of access control, IP video surveillance and intrusion detection in real-timehttp://www.sourcesecurity.com/news/articles/tyco-total-security-integrated-solution-remote-management-access-control-surveillance-intrusion-co-3094-ga-co-583-ga-co-10023-ga-co-988-ga-co-10181-ga-npr.20619.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/tyco-total-security-integrated-solution-remote-management-access-control-surveillance-intrusion-co-3094-ga-co-583-ga-co-10023-ga-co-988-ga-co-10181-ga-npr.20619.htmlProduct NewsTue, 24 May 2016 08:00:00 GMT<table style="width: 100%;"> <tbody> <tr> <td style="text-align: center;"></td> </tr> <tr> <td style="text-align: center; vertical-align: top;"><strong><span class="smalltxt">Available via a unified GUI, Total Security allows users to remotely manage more than 20 security tasks in real time, from anywhere on any Internet connected device</span></strong></td> </tr> </tbody> </table> <p>Tyco Integrated Security (TycoIS), the leading security systems integrator, announced the availability of Total Security, a solution including access control, IP video surveillance and intrusion detection. Available via a unified graphical user interface (GUI), Total Security allows users to manage multiple security tasks on any Internet connected device.</p>...HID Global streamlines security and management systems for CityPoint office building in Londonhttp://www.sourcesecurity.com/news/articles/hid-global-streamlines-security-management-systems-co-823-ga-co-13526-ga.20604.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/hid-global-streamlines-security-management-systems-co-823-ga-co-13526-ga.20604.htmlApplications NewsFri, 20 May 2016 08:00:00 GMT<table style="width: 220px; float: left;" cellspacing="8"> <tbody> <tr style="height: 223.5px;"> <td style="height: 223.5px;"></td> </tr> <tr style="height: 15px;"> <td style="height: 15px; text-align: center;"><span class="smalltxt"><strong>The system enables secure proof-of-presence with frictionless authentication using HID Trusted Tag Services</strong></span></td> </tr> </tbody> </table> <p>HID Global&reg;, worldwide leader in secure identity solutions, recently announced it has been selected by CityPoint to streamline security and management systems for its 35-story office building used by thousands of people on a daily basis in London, UK.</p> <p><strong>Securing CityPoint...Do’s and Don’ts of managing legacy systems – Migration better than rip-and-replace for enhancing security control system functionalityhttp://www.sourcesecurity.com/news/articles/do-don-ts-managing-legacy-systems-migration-enhance-security-control-system-co-1284-ga.20592.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/do-don-ts-managing-legacy-systems-migration-enhance-security-control-system-co-1284-ga.20592.htmlExpert CommentaryFri, 20 May 2016 08:00:00 GMT<table style="width: 100%; margin-left: auto; margin-right: auto;" cellspacing="8"> <tbody> <tr> <td style="text-align: center;"></td> </tr> <tr> <td style="text-align: center;"><strong><span class="smalltxt">Systems may be reliable and performing as originally intended, but can also be<br />outdated in comparison to current technology offerings </span></strong></td> </tr> </tbody> </table> <p><strong>Let&rsquo;s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it&rsquo;s also likely the...The Security Institute launches annual conference & exhibition: The State of Security 2016http://www.sourcesecurity.com/news/articles/security-institute-launches-annual-conference-exhibition-co-12001-ga-co-889-ga-co-5520-ga.20605.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/security-institute-launches-annual-conference-exhibition-co-12001-ga-co-889-ga-co-5520-ga.20605.htmlEvents NewsTue, 24 May 2016 08:00:00 GMT<table style="float: left; height: 5px;" width="5"> <tbody> <tr> <td style="width: 220px;"></td> </tr> <tr> <td style="text-align: center; vertical-align: top; width: 220px;"><strong><span class="smalltxt">The conference will be titled "The State of Security 2016" and will look at real world security issues in real time</span></strong></td> </tr> </tbody> </table> <p>The Security Institute recently announced the launch of its 2016 Conference with a new format from its previous conferences. Introducing the changes, Andrew Nicholls, Deputy Chair of the Institute explains: <em>"With past conferences we have always selected a theme and chosen speakers to deliver presentations that supported those themes. But the security situation is...Skillweb’s SmartTask simplifies and streamlines reporting processes for security teams at University of Wolverhampton campus siteshttp://www.sourcesecurity.com/news/articles/skillweb-smarttask-security-team-university-wolverhampton-co-12059-ga.20601.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/skillweb-smarttask-security-team-university-wolverhampton-co-12059-ga.20601.htmlApplications NewsThu, 19 May 2016 08:00:00 GMT<table style="float: left; height: 5px;" width="5"> <tbody> <tr> <td style="width: 220px;"></td> </tr> <tr> <td style="text-align: center; vertical-align: top; width: 220px;"><strong><span class="smalltxt">SmartTask is also being used across University&rsquo;s reception desk, caretaking &amp; cleaning teams for performance reporting and electronic auditing</span></strong></td> </tr> </tbody> </table> <p>The University of Wolverhampton has selected Skillweb&rsquo;s SmartTask to simplify and streamline reporting processes for security teams operating at its three main campus sites in the West Midlands, Shropshire and Staffordshire. The software system has been adopted as part of a wide-ranging estate management initiative to...Vicon appoints Coaxial Systems Associates as new manufacturers’ representative to further expand sales presence in Florida and Caribbeanhttp://www.sourcesecurity.com/news/articles/vicon-coaxial-systems-associates-manufacturers-representative-florida-caribbean-co-8322-ga-co-1756-ga.20589.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/vicon-coaxial-systems-associates-manufacturers-representative-florida-caribbean-co-8322-ga-co-1756-ga.20589.htmlCorporate NewsWed, 18 May 2016 08:00:00 GMT<table style="float: left; height: 5px;" width="5"> <tbody> <tr style="height: 223.967px;"> <td style="height: 223.967px; width: 220px;"></td> </tr> <tr style="height: 14px;"> <td style="height: 14px; text-align: center; vertical-align: top; width: 220px;"><strong><span class="smalltxt">The appointment signals further strengthening of Vicon&rsquo;s US sales presence in response to strong demand for its security solutions</span></strong></td> </tr> </tbody> </table> <p>Vicon Industries, Inc. (&ldquo;Vicon&rdquo;), trusted designer and producer of video security systems and high-performance IP cameras, continues to expand its U.S. sales presence with the addition of Coaxial Systems Associates (Coaxial), a manufacturers&rsquo;...ZKAccess’ Wireless Bridge kit for its RFID and Biometric door controllers now availablehttp://www.sourcesecurity.com/news/articles/zkaccess-wireless-bridge-kit-rfid-biometric-door-controllers-co-12725-ga-npr.20586.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/zkaccess-wireless-bridge-kit-rfid-biometric-door-controllers-co-12725-ga-npr.20586.htmlProduct NewsWed, 18 May 2016 08:00:00 GMT<table style="width: 100%; margin-left: auto; margin-right: auto;" cellspacing="8"> <tbody> <tr> <td style="text-align: center;"></td> </tr> <tr> <td style="text-align: center;"><span class="smalltxt"><strong>Harnessing the convenience of wireless communication, the Wireless Bridge<br />saves the installer material cost and valuable time</strong></span></td> </tr> </tbody> </table> <p>ZKAccess, a leading provider of biometric and RFID security solutions, is pleased to announce the availability of its Wireless Bridge kit for ZKAccess RFID and Biometric door controllers. The kit provides customers the absolute fastest, easiest, least...Fujitsu names PCSC master distributor for Fujitsu PalmEntry Physical Access Control Solutionshttp://www.sourcesecurity.com/news/articles/fujitsu-names-pcsc-master-distributor-palmentry-physical-access-control-solutions-co-714-ga-co-1284-ga.20581.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/fujitsu-names-pcsc-master-distributor-palmentry-physical-access-control-solutions-co-714-ga-co-1284-ga.20581.htmlCorporate NewsTue, 17 May 2016 08:00:00 GMT<table style="width: 220px; float: left;" cellspacing="8"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"> <p><strong><span class="smalltxt">Agreement enables enhanced technical support and faster time to installation for PalmEntry and PalmEntryXS solutions</span></strong></p> </td> </tr> </tbody> </table> <p>Fujitsu Frontech North America Inc., a leader in innovative technology and front-end solutions is pleased to announce that Torrance, California-based PCSC will be the master distributor for PalmEntryTM and PalmEntryTMXS physical access control solutions effective immediately. Both PalmEntry and PalmEntryXS are based on Fujitsu&rsquo;s award winning PalmSecure&reg; palm vein biometrics technology.</p> <p><strong>Quality access control...Tyco Security Products acquires ID and access management developers Innometrikshttp://www.sourcesecurity.com/news/articles/tyco-security-products-acquires-id-access-management-developers-innometriks-co-4678-ga-co-8421-ga.20580.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/tyco-security-products-acquires-id-access-management-developers-innometriks-co-4678-ga-co-8421-ga.20580.htmlCorporate NewsTue, 17 May 2016 08:00:00 GMT<table style="width: 220px; float: left;" cellspacing="8"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong><span class="smalltxt">The acquisition of Innometriks strengthens Tyco Security Products&rsquo; position in the federal market <br /></span></strong></td> </tr> </tbody> </table> <p>Tyco Security Products has announced that it has acquired substantially all of the assets of Innometriks and 2DogsStudios, developers of high assurance readers, software and mobile solutions for FIPS-201 (Federal Information Processing Standard) smart card credentials.</p> <p><strong>Tyco Security Products&rsquo; access control solution portfolio</strong></p> <p>This acquisition strengthens Tyco Security Products&rsquo; position in the federal market by adding the Innometriks...Tyco Security's PowerSeries Neo and DSC Touch selected for Monitronics authorised dealer programmehttp://www.sourcesecurity.com/news/articles/tyco-security-powerseries-neo-dsc-touch-monitronics-authorised-dealer-programme-co-6145-ga-co-7878-ga-co-1726-ga-co-10903-ga.20553.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/tyco-security-powerseries-neo-dsc-touch-monitronics-authorised-dealer-programme-co-6145-ga-co-7878-ga-co-1726-ga-co-10903-ga.20553.htmlCorporate NewsTue, 17 May 2016 08:00:00 GMT<table style="width: 220px; float: left;" cellspacing="8"> <tbody> <tr style="height: 223px;"> <td style="height: 223px;"></td> </tr> <tr style="height: 60px;"> <td style="text-align: center; height: 60px;">&nbsp;<span class="smalltxt"><strong>Addition of these products allows Monitronics to offer a portfolio of reliable security and home control devices</strong></span></td> </tr> <tr style="height: 15.5px;"> <td style="text-align: center; height: 15.5px;">&nbsp;</td> </tr> </tbody> </table> <p>Tyco Security Products is pleased to announce that Monitronics has selected the DSC PowerSeries Neo platform and the DSC Touch all-in-one smart panel to be part of its authorised dealer programme, a network with more than 600 dealers from throughout...Matrix QR code based access control and attendance monitoringhttp://www.sourcesecurity.com/news/articles/matrix-qr-code-based-access-control-attendance-monitoring-co-10086-ga-npr.20556.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/matrix-qr-code-based-access-control-attendance-monitoring-co-10086-ga-npr.20556.htmlProduct NewsMon, 16 May 2016 08:00:00 GMT<p>Matrix &ldquo;Your Mobile is Your Identity&rdquo; technology offers QR code based identification for users. It marks their attendance and opens doors when a user scans the QR code on their mobile phone camera in the COSEC mobile application.</p> <p><strong>&nbsp;Advantages of&nbsp;QR code based access control <br /></strong></p> <ul> <li>Enter by simply scanning the QR code from a distance</li> <li>Users don&rsquo;t have to touch any scanner</li> <li>Secured and encrypted communication</li> <li>Organisations create their own QR codes by embedding their 2-byte key</li> <li>Eliminates costs involved in expensive devices, wiring, installation and AMC</li> <li>Use of multiple QR codes speeds up entry/exit- avoiding congestion and queues</li> <li>Reduces installation time</li> <li>Works where devices are not easy to deploy, e.g. glass doors, etc.</li> </ul>FST Biometrics identification solution allows JCC Association of North America to protect members, staff and guestshttp://www.sourcesecurity.com/news/articles/fst-biometrics-identification-solution-jcc-association-of-north-america-co-7994-ga.20546.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/fst-biometrics-identification-solution-jcc-association-of-north-america-co-7994-ga.20546.htmlApplications NewsFri, 13 May 2016 08:00:00 GMT<table style="float: left;"> <tbody> <tr> <td style="width: 10px;"></td> </tr> <tr> <td style="text-align: center; vertical-align: top; width: 10px;"><strong><span class="smalltxt">FST&rsquo;s IMID system allows freedom of movement for members and staff, while restricting access to unauthorised users&nbsp;</span></strong></td> </tr> </tbody> </table> <p>FST Biometrics, the leading biometric identification solutions provider, recently announced that The JCC Association of North America has named FST Biometrics a preferred identity management vendor.</p> <p><em>&ldquo;In today&rsquo;s climate in which the need for security &ndash; especially for Jewish organisations &ndash; is greater than ever, we believe our solution offers the best...Qvarn Platform for identity management wins top prize at European Identity & Cloud Awards 2016http://www.sourcesecurity.com/news/articles/qvarn-platform-identity-management-wins-prize-european-identity-cloud-awards.20551.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/qvarn-platform-identity-management-wins-prize-european-identity-cloud-awards.20551.htmlEvents NewsThu, 12 May 2016 08:00:00 GMT<table style="width: 220px; float: left;" cellspacing="8"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><span class="smalltxt"><strong>CEO Kaius H&auml;ggblom received the award from KupperingCole communications head Jennifer Haas and analyst Paul Simmonds</strong> </span></td> </tr> </tbody> </table> <p>The free and open source Qvarn Platform &ndash; for managing digital identities &ndash; has been awarded the prize for &ldquo;Best Approach on Improving Governance and Mitigating Risks&rdquo; at the European Identity &amp; Cloud Awards 2016.</p> <p>Organised each year by industry-leading analyst firm KuppingerCole, the awards honour outstanding projects and initiatives in Identity &amp; Access Management, Governance, Risk Management &amp; Compliance, and Cloud Security.</p>...Critical Communications World 2016: Future technologies, data applications and cyber security to take centre stagehttp://www.sourcesecurity.com/news/articles/critical-communications-world-2016-broadband-technologies-co-5929-ga.20515.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/critical-communications-world-2016-broadband-technologies-co-5929-ga.20515.htmlEvents NewsThu, 12 May 2016 08:00:00 GMT<table style="width: 1px; height: 281px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" align="center" valign="top"><strong>The programme will showcase latest TETRA User case studies and innovations as well as explore Critical Broadband technologies and solutions</strong></td> </tr> </tbody> </table> <p>Following on from last year&rsquo;s success in Barcelona, Critical Communications World 2016 will bring 4,000 professionals together, and over 150 exhibitors to discuss the latest critical communication developments in an era of data, applications, and emerging technologies.</p> <p>Critical Communications World will deliver leading masterclasses, conference and seminar programmes from...How well is Brazil prepared for security challenges marching ahead of Rio Olympics 2016?http://www.sourcesecurity.com/news/articles/brazil-prepared-security-challenges-rio-olympics-2016.20537.html?utm_source=All news&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/brazil-prepared-security-challenges-rio-olympics-2016.20537.htmlSecurity BeatWed, 11 May 2016 08:00:00 GMT<p><span style="font-size: 10pt;"><strong>The largest global event of 2016 &ndash; and the year&rsquo;s biggest security challenge &ndash; will no doubt be the Games of the XXXI Olympiad in Rio de Janeiro, Brazil. Around 15,000 athletes from 206 countries are expected to compete at the Olympic games, August 5-21, 2016, and about 7.5 million tickets will be issued.</strong></span></p> <p>In our age of terrorism, organisers of any event on the scale of the Rio Olympics must consider the possibility of an attack or other security breach during the more than two weeks of the event. Ever since the 1972 Munich massacre, in which 11 Israeli Olympic team members were taken hostage and eventually killed (along with a German police officer), organisers of Olympic games have been keenly aware of the possibility of violence. The threat of terrorism raises the stakes even more.</p> <p>Recent events aggravate concerns about the safety of the Olympics, including the <a class="orangebold"...