Technology & Trends - Access control systems & kits

2020 Vision: Guide to protecting schools from the threat of terrorism

It seems schools still need to be alert when it comes to the risk of terrorism. Following a recent security threat, Bury College has set an example that schools across the UK need to be aware of the threat of terrorism. As reported by the Manchester Evening News, the incident at the Great Manchester college saw the facility being put in lockdown as a precaution before an evacuation took place. Hundreds of staff and students were caught up in the event. Bury College released a statement followin...

How to enhance IoT applications with network video surveillance

Remember the old adage “The whole is greater than the sum of its parts?” Nowhere is that truism more evident than when you add network video to the current generation of Internet of Things (IoT) solutions. Whether we’re talking about industrial IoT applications, “Smart – X” (city, building, parking etc.) or retail operations, integrating network video into the solution provides value far beyond simple situational awareness. Optimising sophisticated video tec...

Bluetooth Low Energy drives access control innovation

Since the introduction of smartphones with downloadable applications, vendors have been trying to replace the traditional plastic identification (ID) card with a mobile phone application. People might lose or misplace an ID card, but most people immediately recognise if they are without their mobile phone. Mobile ID badges for access control Bluetooth Low Energy iBeacon technology Technical challenges of mobile ID apps The logical extension is to replace or augment the traditional corpor...

Avoid damaging network breaches with reevaluated cybersecurity

In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer...

Safety and security checklist for National Safety Month

According to the FBI’s most recent data, there were almost eight million property crime offences in the United States in 2015, while the Occupational Health and Safety Administration (OSHA) estimates roughly two million employees per year are affected by some form of workplace violence. Don’t let your business become part of these statistics. June is National Safety Month, so it’s the perfect time to reassess your facility security measures and look for improved and effic...

Download: Do you know the weakest link of your access control system?

In end-to-end security, it’s important to consider that the chain is only as strong as its weakest link. That is why it is essential that an access control system is always evaluated in its entirety, to discover where the weakest link can be found.   It is not uncommon for access control systems to be installed and then used for the longest time possible without any attention to updating the system’s intrinsic security features. There are many systems in the field that are...

Consultants' Forum: The consultant-manufacturer relationship in the physical access control market

Manufacturers depend on consultants to get their technologies specified in customer projects. Consultants often depend on manufacturers to provide them current information about the technologies that are the building blocks of their projects. It’s a symbiotic relationship, but not always a perfect one. We recently gathered three consultants to discuss what they want from manufacturers, and a representative of HID Global to add a manufacturer’s perspective. Manufacturers also look to...

Cyber security’s balancing act between utility and protection

Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis. Every second of every day, sensors are digitising the real world, creating information and transporting it across multiple networks and interfaces to a broadening audience. While there is obvious utility being gleaned from this process, from our vantage point here in the physical security space, information sharing and tra...

Cyber criminals are ready to attack your business: Are you ready to defend it?

Just when you think you have seen the worst that cyber criminals have to throw at you, they are back with more sophisticated, and in some cases, more severe threats. Understanding emerging and evolving cyber threats is the first step in helping to protect your organisation. The next, and most important, step is shoring up your defence technologies with the proper training, education and deployment. To help prepare for what may be coming next, let’s take a look at what are already shaping u...

Consultants' Forum: The future of mobile access, location services and BIM

Mobile access is probably the largest emerging trend in the security marketplace, but it is only one of several that are changing the face of the access control market. Another factor showing potential to change the market is the emergence of location systems and positioning systems, as reflected by HID Global’s recent acquisition of Bluvision, a provider of real-time location tracking system for assets and employees, and building information modeling (BIM) is impacting how consultants do...

Consultants’ Forum: Smart buildings and the importance of green technology

Security consultants are on the front lines of trends such as “smart buildings” and the increasing demand for green technologies. We recently gathered together several consultants to reflect on what’s new in these areas, joined by a representative of HID Global. Participants were Chris Grniet of Guidepost Solutions, Brandon Frazier of Elert & Associates, Terry Harless of Burns & McDonnell, and Harm Radstaak, HID Global’s Vice President and Managing Director, Phy...

Leveraging IP network technology in the security intercom market

The transition from analogue to IP technologies has had a large impact on the ways intercoms are used in the security industry. The analogue-to-IP transition has generated a lot of attention in the camera market, and the transition is also taking place for intercoms. Twenty years ago, Axis Communications (2N’s parent company) led the industry in converting from analogue cameras and video to IP. Integrated IP system The conversion took 15 years to achieve, but the same conversion in inter...

How can real-time location systems protect assets and people in an emergency?

Today's threat landscape is bigger and more broad than ever before, with an increasing number of emerging risks falling on the shoulders of security professionals in a variety of markets. Many of these leaders face the growing concerns of finding efficient, integrated solutions that provide protection from threats, but also can be used in everyday communications to streamline operations, provide access control, and automate workflow. One way today's enterprise organisations, citie...

Download: How do you know access control in the cloud is secure?

Access Control as a Service (ACaaS) has grown into a mainstream product offering from many access control manufacturers and the product offering is gaining significant growth in the market. With the adoption of this technology, end users and integrators need to ask several pertinent questions. This White Paper explores several important factors which must be understood in order for end users and integrators to make a sound decision when selecting an Access Control as a Service provider. What...

Download: Three reasons to upgrade your access control technology

The security landscape continues to evolve in new and complex ways. This evolution brings change on many levels, which offers an opportunity for improvement rather than an interruption or a distraction. This concept has never been more important as you face today’s combination of new technologies, escalating security threats and the need to derive greater value from the access control infrastructure while solving increasingly complex system integration challenges. Upgrading from older,...

How are open standards driving the security intercom market?

Part 4 in our Intercoms in Security Series The ONVIF standard makes it simple to integrate the intercom with other ONVIF-compliant video management systems, access control solutions, and cameras Open standards are enabling new capabilities in the intercom market, some of it driven by the transition to systems based on Internet protocol (IP). Today’s most-used phrase in the intercom business is interoperability, given that the intercom is integrated with solutions s...

Innovation in the intercom market drives more access control capabilities

Part 3 of our Intercoms in Security Series: Zenitel’s Call Access Panel manages intelligible critical communications through a security operations centre or control room Greater connectivity, security software enhancements, more customisation, and better sound quality are some of the enhancements driving the intercom market.An advantage now offered on Code Blue’s emergency speakerphones include self-diagnosing software that monitors the status of the phones an...

Integrating security management into broader building systems

Security solutions should be about integration not isolation. Many organisations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. Gert Rohrmann, Technical Manager for the solutions division of Siemens Building Technologies UK, examines how by drawing data from a number of different sources...

Intercom technology and entry security: Keeping pace with security innovation

Part 2 of our Intercoms in Security Series The 2N Helios IP family intercoms present a comprehensive portfolio of security offerings for businesses and individuals Some integrators and end users may think of intercoms as older technology that isn’t required as part of a robust security system. Not true. Intercoms include innovative technologies that have developed rapidly, keeping pace with other categories. Just as cameras and access control systems have made techn...

[Download] House Of Smart Cards: How assumptions can open dangerous security gaps

In early 2016, dialogue between ASIS International in Europe and HID Global around access technology identified the need to take a closer look at why sometimes cutting-edge technology is not as effective as it should be in real world applications. Central to the issue were security gaps caused when elements are combined that do not match the same level of sophistication. This resulted in ASIS conducting a study amongst its European members with HID Global providing support o...

[Download] The state of physical access control: Impact on the enterprise

  The global market for card-based electronic access control (EAC) is projected to reach $10.1 billion by 2020 according to Global Industry Analysts. However, as credential technologies have evolved over the years, so have the ways users interact with them.   Mobile credentials   One of the bigger developments over the past few years has been the increased adoption of mobile credentials, which allows users to access facilities via their mobile device. To m...

Aligning physical and digital security in the Cloud

Organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world Organisations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. At the same time, their users are demanding more choices of smart cards, smartphones, wearables, and other mobile...

Securing premises to avoid million dollar verdicts

Crime prevention may require changes to the structure, added surveillance cameras, effective access control methods Given the vast amount of litigation, businesses and property owners must find a system of adherence towards safe and secure premises to avoid multimillion dollar verdicts. In the business of law, negligent security is a rapidly growing niche field and the number of lawsuits continues to increase. Why? The obvious answer is the current lack of uniform security pro...

Smartphones offer many advantages over cards and fobs for access control

Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious benefit, but there are others. Here are some advantages of using smart devices for access control: 1. Less vulnerability to cloning when compared to magstripe or low-frequency proximity cards. Digital credentials and mobile IDs are securely stored and protected. 2. Longer-distance communication, which allows readers to be mount...

Artificial intelligence poised to make great strides in security industry

When most people think of the term artificial intelligence, science fiction films both old and new tend to come to mind. Whether it’s the military network Skynet becoming self-aware in The Terminator and wiping out the majority of mankind with nuclear weapons, or the hosts in Westworld developing consciousness and turning against their human masters, Hollywood tends to paint a grim picture of this area of technology. The reality is that artificial intelligence – or AI...

Increased power grid security tackles natural and man-made threats

Utility security staff have a responsibility to ensure they can identify risks associated with security threats Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the assumption that when they get out of bed each morning and flip on the lights, the room will illuminate, the coffee pot will come to life and their mobile phone will have been fully charged. After all, we live in a mode...

Protecting cultural and hospitality venues from terrorist attacks

Cultural and hospitality venues are attractive targets for terrorists due to their public accessibility Over the past 40 years there have been numerous attacks carried out against cultural and hospitality venues in the furtherance of religious, ideological, criminal or political beliefs. By default, cultural and hospitality venues are attractive targets for terrorists due to their public accessibility, the volumes of visitors and guests or because of what the venue represents;...

Combining mechanical and electronic systems to enhance door security

Customers are increasingly requesting both mechanical and electronic services for their doors In most buildings, security is a hybrid solution of both mechanical and electronic security products. Locksmiths take care of the mechanical door hardware and the integrators focus on the electronic security technology. However, for consumers, this traditional division of labour means they must deal with two different companies for the same door - one to design, install and service a...

What will Donald Trump's presidency mean for the security industry?

The border with Mexico is an obvious starting point for the security community. Many had assumed that 'wall' would mean a high-tech fence or possibly just a virtual barrier of perimeter intrusion detection systems (PIDS), video surveillance with analytics and thermal imaging. However, during a press conference shortly before inauguration, Mr Trump put journalists straight. Unless there is a mountain or river already doing the work along the 2,000 miles to be protected, this really...

Physical security evolves to protect mobile workers

Many employees who once commuted to on-site corporate offices now spend their time working remotely or travelling between sites Over the past two decades, the workforce has drastically changed. As mobile devices became increasingly affordable and the demand for multiple offices, distributed campuses and globalisation has increased, many employees who once commuted to on-site corporate offices now spend their time working remotely or travelling between sites. In 1997, only 9.2...

Related videos

Time challenge: installation of battery powered Aperio cylinder

IDIS launches efficient AI-powered security camera range

Hikvision introduces DS-K1T342-E1 Series PoE power supply