Technology & Trends - Access control software
Software can combine information from various systems to create a single identity across the organisation In today's enterprise business environment, the best approach to managing risk for a known scenario is to both prepare for it and guard against it. Effective security management necessitates credible real-time information about risk and the ability to respond to that information in a timely manner. However, that information is often not available in real-time or ma...
Use of virtual credentials to manage identity is opening the access control industry to new solutionsToday's mobile phones are so much more than communication devices - they have become an indispensable consumer appliance for numerous personal, professional and entertainment applications. With the advent of Near Field Communications (NFC) technology, these mobile phones can now also be used to hold your identity keys and used to carry out numerous secure transactions, Dr. Tam Hulusi,...
Dealing with rising airport security threats demand more innovative solutions With the rise in large security threats since the commencement of this century, security of airports has become paramount. Looking into this issue Ashley Smith, BSIA (British Security industry Association) Civil Aviation Security Section Chairman, explains how a mix of properly interfaced security systems working in conjunction with monitoring and response staff offers a cost...
Keys could be a thing of the past as Near Field Communication technology enables mobile phones to be used as keys Near Field Communications (NFC) technology is a catalyst that will hasten the use of mobile phones as mobile electronic keys for access control. Though the technology already exists, the necessary infrastructure and supporting devices still have some way to go. In this article, Rachel Sa of ASSA Abloy Future Labs evaluates the benefits an...
The Public Key Infrastructure is beginning to be adopted as a driver in physical access Traditionally associated with logical access and the digital signing of documents, Public Key Infrastructure (PKI) is now also being used to control physical access. Their use in physical access control is likely to be more prevalent with the implementation of the FIPS 201-2 recommendations this year. Derek Scheips of ASSA Abloy Future Lab explores the benefits of this key infr...
The use of retinal scans for security applications is increasing The eyes have it. The use of iris recognition technology is expanding around the globe and it is being utilised in a vast array of commercial and government applications ranging from access control to time management. ASSA ABLOY Future Lab examines how this biometric technology is breaking new ground in identity management and other security applications. Retinal vs. iris scans Often confused w...
HID and Abloy UK are creating the future of intelligent doors At IFSEC 2009, ASSA Abloy launched Hi-O, a new concept for electronic door solutions that improves and simplifies the installation, service and upgrade of access control systems and allows end users to create the first truly "intelligent doors". SourceSecurity.com spoke with Matt Thomas, Managing Director of Abloy UK, and Ian Compton, Director of Sales for UK, IE and Nordics for HID Global, to find out more ab...
Hospitals need stronger 'in-depth' physical security at different entry points Within the course of any given day, a hospital or health care chief security officer (CSO) faces the task of not only protecting multiple points of access but also doing so in a way that enables movement and activity, is convenient for staff and patients and does not impede the facility's primary function: saving lives. Health care facilities exist in a wide variety of medical focus, adm...
Museums facing growing security challenge with rise of armed robbery It only takes a shocking 58 seconds to steal a painting. Jonas Rehnberg, writer at Assa Abloy Future labs, speaks to former museum security chief Ton Cremers about the safe-keeping of precious artefacts in museums and art galleries. In 2004, armed, masked robbers stormed into the Munch Museum in Oslo and stole two masterpieces - "The Scream" and "Madonna" - before the eyes of shocked spectators....
Jeremy Kimber, Honeywell's EMEA Marketing Leader, lays out the key points to consider when choosing a converged access control solution. In the past few years, perhaps no security industry buzzword has been defined in articles and promotional materials as many times as 'convergence'. These definitions have most commonly referred to the integration of physical Convergence of physical and traditional IT systems can provide compelling security benefits for an enterprise securit...
Biometric technology has been with us for over two decades, but how will it evolve over the next ten years? John Davies, Managing Director of access control specialist TDSi, looks at the impact of biometrics and considers how future developments might shape the security industry. Biometrics is quite rightly viewed to be at the cutting edge of security technology. From the very first commercial application of a finger print reader in 1984, we have seen new systems and applications in...
Browse expert commentaries
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera
Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download