Technology & Trends - Access Control

Do’s and Don’ts of managing legacy systems – Migration better than rip-and-replace for enhancing security control system functionality

Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also li...

Top trends driving expansion of home automation in the security industry and beyond

It’s the 21st century already. Isn’t it time we all lived in smart homes? For technophiles everywhere, the smart home can’t come soon enough. The same might be said for the security marketplace, which is well positioned to thrive in the coming era of home automation. The wait could be shorter than we think, given some recent trends and events we are seeing in the home automation market. Let’s consider several of them: 1. Home automation is getting attention from Silic...

Next generation PSIM solutions widen scope for traditional command and control systems

 PSIM systems extend their value beyond emergencies by including routinemanagement tools, that provide value during daily operations, such as automatingmaintenance activities Physical Security Information Management (PSIM), an acronym termed to describe a family of software platforms that claim to replace traditional command and control (C&C) systems, primarily used to provide situation awareness in control and monitoring centres of Critical Facilities. Traditional C...

Manned guarding equipped with latest technology improves security and threat detection

Technology solutions enhance and make manned guarding moreeffective and efficient the quickest way Most companies believe manned guards can help mitigate disturbances and neutralise situations, while at the same time reducing the chance of criminal activities and/or accidents occurring. However, people cannot be omnipresent or always be in the right place at the right time. When combining manned guards with the power of today’s technology, the results are unmatched. Dev...

Importance of tender evaluation in getting high ROI and value from your security system

The right security system can add great value when used as anintegral part of business processes When buying a security system, primary consideration is often given to short-term issues such as technical capability and how current risks are covered. However, this approach doesn’t account for a security system being a longer-term investment, often spanning around ten years. During this time a lot can change, both in terms of technical development and an organisation&rsquo...

Modern mass notification systems adapt to evolving technological innovations

If anyone tells you that the use of Mass Notification Systems (MNS) is a new trend, it is likely that they do not fully understand it. You have been impacted by mass notification your whole life. Surprised? Every time there is a fire drill at an elementary school, or a bell chimes noon or a blinking light announces a snow-related parking ban, an MNS is being deployed. Ultimately, mass notification is just mass communications. What has changed is the distribution methodology, the granularity and...

Developing effective security applications for the operational technology environment

Many operators don’t know what’s actually transpiring on their OT networkand,even if hacked, have no knowledge of the assault Innovation in the oil and gas, utility, healthcare and transportation industries is heavily reliant on connectivity - between devices and systems, machines and data, people and processes. This connectivity is great for productivity upstream, mid-stream and downstream, but is also exposes these systems to greater cyber threat. Furthermore, as...

The all-IP future of public transport surveillance networks shows a growing demand for video analytics for better incident management

The report says almost 50% of the public transport organisations are willingto broaden the type of video analytics used A detailed survey of public transport operators shows a growing demand for networked/IP systems and video analytics to help cope with the requirements of large surveillance systems. The report, Video Surveillance in Public Transport, published by the international public transport association UITP and Axis Communications, is based on 74 respondents across 30...

Live finger detection technology reinforces future of advanced biometric authentication

Awareness against fake fingerprints prevent fingerprint from becomingthe choice of biometrics despite their benefits Apple’s refusal to the US government’s request to unlock Syed Rizwan Farook’s iPhone has triggered public interests in personal and information security. Ever since the introduction of Touch ID by Apple, fingerprint technology has been implemented into more and more mobile devices by different manufacturers. It is being adopted as the authentic...

How smartphone access control credentials strengthen security and minimise risk to organisations

PIAM solutions ensure that credentials are onboarded to all the right systems The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they...

Misguided trust leads to increase in security risks and potential attack from intruders

Stringent security policies are necessary in an organisation to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...

Developing innovative aviation security technologies to prevent future terrorist attacks

What effect will the attacks in Brussels have on aviation security? Screenings inpre-security airport areas have been uncommon, but may become standard practice Will the Brussels airport attack herald a new era of aviation security? Like the bombing of Moscow’s Domodedovo Airport in 2011, the Brussels attack took place “landside”, meaning that security precautions would have been low-key and limited to spot checks and the general watchfulness of police office...

ISE emphasise need for improved hospital security programme to avoid attacks on specific targets

ISE’s research shows that healthcare facilities & hospitals security programmesto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security programme can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see...

New technologies empower visitor management systems to improve physical security efficiency and cost-effectiveness

Access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical sec...

Top 4 indicators that an access control vendor is customer-service-centric

Customer service is a vital part of any vendor’s business approach – from theplanning stages, to installation to maintenance of the access control system In today’s highly competitive and technology-rich security marketplace, an organisation’s customer service is as important as the product solution they offer. Let’s face it, you will always remember if the customer service was terrible – or if it was great. Do they go the extra mile or do t...

High-security portable crash barriers offer security integrators and dealers new expansion opportunities

Portable crash barriers & traffic access control systems allow security integrators to expand their deployments for municipal surveillance and critical infrastructure The Pope does it. The Democratic and Republican National Conventions do it. Leading universities and police departments do it. Just what does this diverse list of people and organisations have in common? They have all used high-security portable barriers at their events with good success. According to manufa...

Access control challenges in a changing world - from managing nurse servers in hospitals to securing sterile facilities

ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...

Biometric authentication offers greater security advantages over traditional identity verification systems

Accurately confirming a person’s identity is one key to improving security forour workplaces, communities, and our nation Perhaps I’m sensitised to the term, but it seems to me that I’m hearing the word “identity” a lot lately.   Identity comes up in current news stories about Syrian refugees, for example. Candidates for the U.S. presidency debate how long it should take to confirm the identity of immigrants before allowing them to ent...

ISONAS Global VP of Sales Robert Lydic highlights importance of IP open platforms for access control

IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends in access control technology SourceSec...

ISC West 2016: Physical security industry focuses on incorporating audio, video and other safeguards in an integrated approach

Access control now includes a strong focus on the data integration side ofthe business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...

Top 4 trends shaping the future of Physical Security Information Management (PSIM)

Many transformations have occurred that have caused PSIM’s true definition to be misunderstood and miscategorised The evolution of Physical Security Information Management (PSIM) over the past ten years has been rapid and transformative. In fact, according to a recent report from marketsandmarkets.com, the global physical security market, estimated to be $65.41 billion in 2015, is expected to reach $105.26 billion by the year 2020. At the forefront of this movement...

Impact of the UK’s ‘Brexit’ EU referendum on European border control and other security measures

UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks o...

ISC West 2016 - Educational sessions and opportunity to grasp new security trends attracts systems integrators

ISC West educational sessions bring into focus some of the challenges, issues and opportunities faced by systems integrators What will be the hot technology at ISC West 2016 this year? Devices to detect drones, more affordable biometrics, or cameras with 360 degrees of clear vision? You’ll probably see some of the above and much more if you’re attending the security industry’s largest trade show, scheduled for April 6 through 8 at the Sands Expo Center in Las...

Why employing a software system is a smart way to enhance data accuracy and business profitability

Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labour costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...

Adopting smart security operational methods for greener businesses

Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...

Vehicle barrier certification sets new standards for vendors with stringent testing measures

Barriers certified by the US Department of State can be trusted to withstand specified weights and speeds This time of year, in the early spring, there pops up a plethora of trade shows in which security vendors can present their newest marvels to potential customers. Not to be outdone are the barriers manufacturers. Their products will range from a large metal planter to be placed in an area where no traffic is allowed to movable barriers which lower to let a car drive over...

Security measures for hardening access against unauthorised visitors

Organisations need to protect their properties and people by securing entranceswith security systems and policies Most criminals gain access to a business or organisation the same way honest people do – they walk through a door. That door may be left unlocked. It may be propped open. Poor locks may be easily defeated or the door may be inadequately constructed and offer little resistance when attacked. Focus on multiple-layered security It seems obvious the path to...

Merit LILIN highlights Middle East focus and innovative upcoming products in the Year of the Monkey

According to Merit LILIN, the UAE will be a thriving new and potential market in 2016since Europe’s economy is still sluggish The global Chinese community recently welcomed the year of the Fire Monkey with a two-week celebration, concluding with the lantern festival at the end of February. According to Chinese astrology, we are now in the year of the Fire Monkey. What’s in store for businesses around the world?  Global economic growth is predicted for the ye...

The rise of specialist distributors and smart strategies disrupting the traditional security distribution market

The established security distribution channel is being disrupted by a new trend towardsspecialist distributors – who offer more a more focused range of products andsupport services In the last 10 years a lot has changed within UK security distribution, but on the surface everything would appear to be the same. The top two distributors remain the same, despite creditors at one and talk of a looming sale at another. However, they’re operating with a slightly reduced...

Festival security – combining security personnel and security structures

Festivals bring together a huge number of people, often to large open areas andvenues, which requires a high level of security and protection fromthe organisers Festivals might be all about fun, but the fact that festival goers are out for a good time is an extra reason why the responsibility for safety and security lies predominantly with the organisers. Security during festivals plays an important role in ensuring safety of citizens. Since festivals witness congregation of...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems