SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Openow from SMARTair wireless access control

    Openow from SMARTair wireless access control

    Vanderbilt Bluetooth Low Energy readers

    Vanderbilt Bluetooth Low Energy readers

    Dahua Fixed-focal Dome Network Camera

    Dahua Fixed-focal Dome Network Camera

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • IDIS DirectIP NVR-anchored video surveillance solution and SARC secure luxury cars at Autobahn Collision
    • March Networks Searchlight selected by Yesway for enhanced asset protection and security
    • SRI and Echodyne collaborate on 3D Airport Security solution at the 19th AAAE Aviation Security Summit
    • Dahua Technology launches dual-PTZ cameras that enable flexible and multi-scene panoramic monitoring
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • Year in Review 2018
    • Year in Review 2017
    Featured
    • MOBOTIX M7 platform provides more flexibility and computing power
    • Trends in banking security include more networks and software
    • Fast and accurate, Rapiscan’s CT scanning improves airport baggage screening
    • The intersection of education and fire and security
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Upcoming Events
    • Crime Prevention International Conference (CPIC) 2019
    • IFSEC India 2019
    • 2019 China Smart Homes & Buildings Expo
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Crime Prevention International Conference (CPIC) 2019

    Crime Prevention International Conference (CPIC) 2019

    2019 China Smart Homes & Buildings Expo

    2019 China Smart Homes & Buildings Expo

    Oman Facilities & Environment Exhibition & Conference 2020

    Oman Facilities & Environment Exhibition & Conference 2020

    Kuwait Health Safety & Environment Forum 2020

    Kuwait Health Safety & Environment Forum 2020

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY EMEA
    • Hitachi
    • FLIR Systems
    Other Resources
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Financial institutions require future-ready physical security technologies

    Financial institutions require future-ready physical security technologies

    H.265 High Efficiency Coding: Video compression for security applications

    H.265 High Efficiency Coding: Video compression for security applications

    How to overcome the storage challenges of adopting surveillance AI

    How to overcome the storage challenges of adopting surveillance AI

    Physical security supports a future-proof cyber security strategy

    Physical security supports a future-proof cyber security strategy

About us Advertise
  • Artificial intelligence (AI)
  • Cyber security
  • ISC West
  • Counter Terror
  • Robotics
  • Body worn video cameras
  • Intrusion detection
  • Video management software
  • Trade Show/Exhibition
  • Video analytics
  • View all
  1. Home
  2. Products
  3. Access Control
    CCTV Intruder Alarms
  4. Access control cards/ tags/ fobs
    Access control controllers Access control readers

Access Control Cards, Tags & Fobs

 (154)
Refine by:
Products selected for compare
Compare Clear All
Nedap AEOS NeXS Card with default high security 3-DES technology
Nedap AEOS NeXS Card with default high security 3-DES technology

Mifare, Card, 13,56

Add to Compare
ACT ACTProx DUO-B card with magnetic stripe
ACT ACTProx DUO-B card with magnetic stripe

Magnetic Stripe, Card

Add to Compare
Siemens IB1 - Magnetic stripe cards
Siemens IB1 - Magnetic stripe cards

Magnetic Stripe, Card

Add to Compare
Vanderbilt IB-970
Vanderbilt IB-970

Tags

Add to Compare
ACT ACTCARD50
ACT ACTCARD50

Swipe Cards

Add to Compare
ACT ACTCARDS
ACT ACTCARDS

Swipe Cards

Add to Compare
ACT ACTDUO
ACT ACTDUO

Swipe Cards

Add to Compare
ACT ACTFOB
ACT ACTFOB

Proximity keyfobs

Add to Compare
ACT ACTFOB50
ACT ACTFOB50

Proximity keyfobs

Add to Compare
Vanderbilt SI-HB911
Vanderbilt SI-HB911

Proximity, Tag

Add to Compare
Honeywell MicroMAX proximity door control
Honeywell MicroMAX proximity door control

The MicroMAX is an enhanced technology door control module which uses proximity card reader technology to combine performance with flexibility and economy.  The MicroMAX can be integrated with the majority of the Galaxy range of control systems or operate as a stand-alone module.  Key features include: Compact size (68 x 41 x 15 mm) and stylish appearance Up to 487 users supported when used with Galaxy panel Single panel function programmable to MicroMAX card 1000 Event Log Dual MicroMAX/keypad setting operation option Up to 32 readers on a Galaxy 512 & 504 system 1 relay output and 1 internal Piezoelectric buzzer output (fixed) Completely sealed for indoor and outdoor use

Add to Compare
ACT enhance the 2000 controller...
ACT enhance the 2000 controller...

ACT will shortly release the ACT 2000E,, an enhanced version of their market proven 2000 controller range including: User groups up from 32 to 1,000 Visitor cards up from 2,000 to 20,000 Individual PIN numbers up from 2,000 to 20,000 Learned cards up from 2,000 to 20,000 The "bigger and better" ACT2000E now works with most third party readers that have either Wiegand or Clock & Data outputs - allowing specifiers to provide solutions based on mag stripe, proximity, smart card and biometric readers. All enhanced features are in addition to standard ACT2000 features including 2 door controller expanding to 16 doors via single door remote door stations, configured from on board keypad or PC, networked to facilitate up to 1000 doors, door control and monitoring with anti passback (for high security areas), user tracking (car parking), roll call (health & safety), interlock (cash offices and clean rooms), time & attendance with export facility, timed actions per door (i.e. pin and card or door unlock), entry and exit reading on all doors, remote site facility via modem and will communicate to admin PC via TCP/IP connection.

Add to Compare
ACT ACTSmart Proximity Fob
ACT ACTSmart Proximity Fob

Proximity, Fob

Add to Compare
ACTProx HS Card from ACT - extremely durable access control card from ACT
ACTProx HS Card from ACT - extremely durable access control card from ACT

Proximity, Card

Add to Compare
Nedap AEOS Teardrops is a contactless keyfob
Nedap AEOS Teardrops is a contactless keyfob

Proximity, Fob, 13,56

Add to Compare
Nedap AEOS Combi Card available with Mifare or DESFire and Legic technology
Nedap AEOS Combi Card available with Mifare or DESFire and Legic technology

Mifare, Card, 13,56

Add to Compare
ACT ACT 2000
ACT ACT 2000

16 doors/controller, 32 cardholders

Add to Compare
ACT ACTSmart Iso Prox Card
ACT ACTSmart Iso Prox Card

Proximity, Card, ISO size Printable

Add to Compare
ACTProx Duo Card - ID printable card with magnetic strip, from ACT
ACTProx Duo Card - ID printable card with magnetic strip, from ACT

Magnetic Stripe, Card, ISO size Printable

Add to Compare
Siemens SI-IB1
Siemens SI-IB1

Magnetic Stripe, Card, ISO size Printable, 86 x 54

Add to Compare
HID 1324A
HID 1324A

PVC Labels

Add to Compare
HID iCLASS Tag-2060
HID iCLASS Tag-2060

Smart Tags

Add to Compare
HID iCLASS Tag-2061
HID iCLASS Tag-2061

Smart Tags

Add to Compare
HID iCLASS Tag-2062
HID iCLASS Tag-2062

Smart Tags

Add to Compare
HID 57-0001-02
HID 57-0001-02

Key Ring for Keyfob

Add to Compare
Honeywell Security N-300-PRG-CRD
Honeywell Security N-300-PRG-CRD

Master Programming Cards

Add to Compare
Honeywell now despatches HID Prox, Omniprox and iClass access control cards within 5 working days
Honeywell now despatches HID Prox, Omniprox and iClass access control cards within 5 working days

Fast programming and deliveryHoneywell are pleased to announce that it can now perform in-house programming for most HID cards (open formats) and despatch in as little as 5 working days to dealers, distributors or OEM customers across Europe*.The cards covered by this service are: HID proximity cardsOmniClass™ cardsiClass cards*) Minimum order quantity of 100.Please contact your local Honeywell representative for further information or call 08448 000 235.

Add to Compare
Honeywell Security PX-O-KEY-16K16
Honeywell Security PX-O-KEY-16K16

Smart Card, Fob

Add to Compare
Click here to return to active Access control cards/ tags/ fobs
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • »

Browse Access Control Cards, Tags & Fobs

  • Card/ Tag/ Fob
  • Card
  • Fob
  • Tag
  • Technology Type
  • Magnetic Stripe
  • Mifare
  • Proximity
  • Smart Card
  • Wiegand
  • Make
  • Hikvision
  • ACT
  • Vanderbilt
  • MOBOTIX
  • Vicon
  • HID
  • Bosch Security Systems
  • CIVINTEC
  • View more

Access control card/ tag/ fob products updated recently

HID Crescendo® Mobile virtual smart card

HID Crescendo® Mobile virtual smart card

HID Crescendo® Key Series multi-protocol security key

HID Crescendo® Key Series multi-protocol security key

HID Crescendo® C2300 Series smart card

HID Crescendo® C2300 Series smart card

HID SIO Solution for MIFARE® DESFire® EV1 + HITAG1 Card 1451x

HID SIO Solution for MIFARE® DESFire® EV1 + HITAG1 Card 1451x

HID Indala® Proximity CX Series CASI Compatible Prox Credentials

HID Indala® Proximity CX Series CASI Compatible Prox Credentials

HID PVC - 232 PET/PVC - 242 multi-technology dual high frequency card

HID PVC - 232 PET/PVC - 242 multi-technology dual high frequency card

HID PVC - 252 PET/PVC - 262 multi-technology dual high frequency card

HID PVC - 252 PET/PVC - 262 multi-technology dual high frequency card

HID PET/PVC - 243 multi-technology dual high frequency card

HID PET/PVC - 243 multi-technology dual high frequency card

HID Seos®/MIFARE Classic® 5806 Card

HID Seos®/MIFARE Classic® 5806 Card

HID Seos®/MIFARE® DESFire® EV1 5906 Card

HID Seos®/MIFARE® DESFire® EV1 5906 Card

Access control cards/ tags/ fobs - Expert commentary

A secured entrance is the first defence against an active shooter
A secured entrance is the first defence against an active shooter

The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”

Why integrated access control is about more than security?
Why integrated access control is about more than security?

Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.

Open Supervised Data Protocol (OSDP): the gold standard for access control installations
Open Supervised Data Protocol (OSDP): the gold standard for access control installations

Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.

Featured white papers
Financial institutions require future-ready physical security technologies

Financial institutions require future-ready physical security technologies

Download
Understanding the trade-off between image resolution and field of view

Understanding the trade-off between image resolution and field of view

Download
A blind spot in governance, risk and compliance

A blind spot in governance, risk and compliance

Download
Access control card/ tag/ fob news
A secured entrance is the first defence against an active shooter

A secured entrance is the first defence against an active shooter

Opportunities for security integrators in the healthcare vertical

Opportunities for security integrators in the healthcare vertical

ASSA ABLOY's Aperio handles, security locks and escutcheons to secure H-Farm with streamlined access management

ASSA ABLOY's Aperio handles, security locks and escutcheons to secure H-Farm with streamlined access management

Access control card/ tag/ fob case studies
  • ASSA ABLOY's Aperio handles, security locks and escutcheons to secure H-Farm with streamlined access management
  • ASSA ABLOY’s SMARTair swaps manual keys for centralised electronic access control at Westbridge
  • PACOM’s 8002 integrated access and alarm controller helps Mimoto Parking keep Spain’s motorbikes safe and secure
  • Third Millennium and Kings Secure Technologies combine to retrofit client site with high-security card reader technology
See companies providing Access Control products
  • Access control Manufacturers
  • Access control Distributors
  • Access control Resellers / Dealers / Reps
  • Access control Installers
  • Access control Consultants
  • Access control Systems integrators
  • Access control Events / Training / Services

Follow us

Sections Products Companies News Insights Case studies Markets Events White papers Videos
Topics Artificial intelligence (AI) Cyber security ISC West Counter Terror Robotics Body worn video cameras Intrusion detection Video management software Trade Show/Exhibition
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2019, all rights reserved

Our other sites: SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec
Updated Privacy and Cookie Policy
We have updated our Privacy Policy for GDPR.
We also use cookies to improve your online experience, Cookie Policy