Technology & Trends - Access control system accessories

Automated key control and management systems boost electronic access control

  An automated key control system bridges the gap between mechanical and electronic access control systems The vast array of doors, entrances and restricted areas securing semi-public locales are increasingly demanding the need for effective and easy access control management. In this article, Fernando Pires, VP Sales and Marketing at Morse Watchmans, highlights the effectiveness and convenience offered by automated key control systems that have narrowed the gap...

Access control with mobile phones: the future with Near Field Communications

  Keys could be a thing of the past as Near Field Communication technology enables mobile phones to be used as keys Near Field Communications (NFC) technology is a catalyst that will hasten the use of mobile phones as mobile electronic keys for access control. Though the technology already exists, the necessary infrastructure and supporting devices still have some way to go. In this article, Rachel Sa of ASSA Abloy Future Labs evaluates the benefits an...

Application of Public Key Infrastructure (PKI) in physical access control

  The Public Key Infrastructure is beginning to be adopted as a driver in physical access Traditionally associated with logical access and the digital signing of documents, Public Key Infrastructure (PKI) is now also being used to control physical access. Their use in physical access control is likely to be more prevalent with the implementation of the FIPS 201-2 recommendations this year. Derek Scheips of ASSA Abloy Future Lab explores the benefits of this key infr...

Wireless security systems: time to get serious

More attention needs to be given to wireless security technology Despite major developments in radio technology and increased demand in the market for new solutions, wireless systems are still not fully embraced by the security industry. Tony Makosinski of Honeywell Security Group asks why, and explores what the future holds for wireless technology. Although wireless technology -specifically radio - has been used in the security industry since the 1980s, penetration rates in...

Iris recognition systems for access control and identity management gain popularity

The use of retinal scans for security applications is increasing The eyes have it. The use of iris recognition technology is expanding around the globe and it is being utilised in a vast array of commercial and government applications ranging from access control to time management. ASSA ABLOY Future Lab examines  how this biometric technology is breaking new ground in identity management and other security applications. Retinal vs. iris scans Often confused w...

Tips to reduce false security alarms with proper installation, education and training

  False security alarms can be reduced with simple business practices In today's security conscious environment, repeated false alarms can be costly to a business, and not just in financial terms. A false alarm is simply the activation of one's security alarm system for no apparent reason. With the introduction of European standards and the UK implementation of PD6662 (scheme for the application of European Standards for intruder and hold-up alarm systems) and DD243 (code...

Body field communication – new technologies for access control systems

RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...

Blending physical security systems with environmental design for optimised crime prevention solutions

  Poorly maintained environments send messages that undesirable behaviour will be tolerated Crime prevention is not solely the job of locks on doors or security cameras scanning entranceways. The makeup of a physical environment can influence where crimes are committed. That's why Crime Prevention Through Environmental Design (CPTED) should be an essential component to the crime prevention strategy of any building or area.  In this article ASSA ABLOY Future Labs ...

Protecting financial organisations from emerging security risks with integrated solutions

  Globalisation and new technologies have led to increased threats for financial organisations The banking and financial sector needs to be constantly prepared to manage an increasing range of security risks, from fraud and anti-social behaviour to data mismanagement. Organisations must anticipate such potential risks and have well-established plans in place to address them.  Honeywell, with more than 50 years of experience in the security industry, is helpin...

Security planning and management tips for small businesses

  Cutting costs on security investments puts small businesses at the risk of criminal activity During tough economic times, many small businesses can be found guilty of neglecting investment in their on-going security protection.  Naturally, this can prove to be problematic as the impact of break-ins and criminal activity greatly affect the accounts and day-to-day running of the business. Luke Martyn, SMB specialist at ADT Fire and Security provides practical, cost-ef...

Voice recognition – benefits and challenges of this biometric application for access control

Consumers prefer voice recognition technology for biometric identification Voice recognition is the most preferred form of biometric identification among consumers. Derek Scheips for ASSA ABLOY Future Labs outlines the concept behind this technology and some of its uses and drawbacks. With all types of biometric applications on the rise, voice-based authentication is one approach that seems to engender less resistance among users than other biometric forms of s...

Extending Ethernet capabilities to enable better network security applications

PoE technology allows for safer environments through better security systems Power over Ethernet is both convenient and affordable, says Jonas Rehnberg of ASSA ABLOY Future Labs. The benefits to network security are immense, be it in powering security cameras with added features or enabling better access control systems and intruder deterrents. Hailed as a watershed innovation when first standardized in 2003, Power over Ethernet (PoE) offers a way of supplying electricity to n...

The future of intelligent doors

  HID and Abloy UK are creating the future of intelligent doors At IFSEC 2009, ASSA Abloy launched Hi-O, a new concept for electronic door solutions that improves and simplifies the installation, service and upgrade of access control systems and allows end users to create the first truly "intelligent doors". SourceSecurity.com spoke with Matt Thomas, Managing Director of Abloy UK, and Ian Compton, Director of Sales for UK, IE and Nordics for HID Global, to find out more ab...

Access control - the key to integrated security systems for businesses

  Integrated access control solutions have become easier to apply Leading integrated security solutions provider Honeywell explains the importance and benefits of implementing an integrated access control solution for businesses. An access control solution can be as simple as the use of electronic or magnetic swipe cards instead of keys to unlock a front door. This limited functionality still retains a considerable level of value. In most cases, businesses can limit...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems