Technology & Trends - Access Control

How cybersecurity impacts the physical security world

Cybersecurity is a critically important aspect in today’s increasingly IP-driven world of physical security The physical security market tends to dismiss issues of cybersecurity as outside its area of expertise, but cyber-threats are a problem that has been ignored for too long. The fact is, cybersecurity is a critically important aspect of the systems our industry provides in the increasingly IP-driven world of physical security. And the risk isn’t just reserved...

Understanding the difference between 900 MHz Wireless vs. 2.4 GHz Wi-Fi

900 MHz wireless and Wi-Fi (2.4 GHz) are sometimes used interchangeably in the access control world to describe solutions that do not require running wires all the way to the opening. It’s true that, as wireless options, both technologies offer some general advantages over traditional hardwired solutions. In this article, Minu Youngkin, Allegion, Integrator Marketing Manager shares her thoughts and knowledge regarding both wireless and Wi-Fi technologies.* First of all, wire...

Key trends driving access control growth

Access Control is the second-fastest growing area in the security market. A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are just a few factors driving access control adoption both across the residential and commercial markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these factors and how they contribute to the future of access control...

Optimising business security and processes by implementation of smart reports

At what time of day do you have most people in your building? Do you have enough parking spaces for your employees? Are there always enough first aiders in the building to meet safety requirements? Security systems provide a wealth of data, which can provide the answers to these questions and more. By extracting reports from your system, you can gather valuable information to increase safety or improve business processes.  Wiebe Koopmans, owner of Linked Solutions, advises bus...

Role of Bluetooth Smart and NFC in access control

Bluetooth Smart creates new ways to open doors and gates The latest generation of access control systems offers more secure and sophisticated credentials, and new credential form factors including mobile devices that offer a more secure and convenient way to open doors and parking gates. Mobile access control also delivers a simple and user-friendly secure identity management process, and a platform for integrated, multi-layered physical access control (PACS) and IT security s...

Professionalising security management by challenging established notions

Law enforcement and pure problem-solvingskills will play less of a role for the futuresecurity director Much effort has been put down in the professionalisation of security work. Not only is it a recurring topic of conversation at events for security professionals, but also a formal topic of concern for ASIS – having active task forces devoted to the promotion of professionalisation and academisation of security practice as well as a recently updated standard (ANSI/ASIS...

Analysing effectiveness of security operations with security metrics

The ability to measure and analyse the effectiveness of security operations is extremely useful – not only for identifying and addressing an organisation’s vulnerabilities, but also for demonstrating security’s mitigating impact on overall risk levels along with the higher-level value security delivers to a business. Brian McIlravey, Co-CEO at PPM, explains how security metrics can provide a powerful toolset for accomplishing these objectives. By quantifyi...

Significance of data protection in physical security systems

In the digital world, people own personal information just like they own physical assets such as cash, keys and clothes in the real world. But because personal information is intangible, its value has been overlooked by many for a very long time. With the increase in cyber crimes on personal data and the infamous Snowden affair, this issue has become more prominent. Fei Liu from Nedap Security Management Research & Development informs that to improve the transparency of data collection and p...

Optimising hospital security with physical access and identity management software

Similar to schools, airports and other semi-public facilities, hospitals and other healthcare facilities are grappling with the new reality that dictates stronger and more enforceable access restrictions. In these new circumstances, the need for security must be balanced with the individual’s need to easily move about the hospital by allowing medical staff, visitors or contract workers to go about their business with relative ease. In this article, Ajay Jain, President and CE...

Key control and management for emergency situations at educational facilities

It used to be that the word “lockdown” was only ever used in reference to an emergency protocol to restrict movement in a prison environment. Today however, the term is in common usage in educational and other environments to describe measures taken under certain conditions of threat. In this article, Fernando Pires, VP of Sales and Marketing at Morse Watchmans, explains that lockdowns, along with building evacuation and sheltering procedures, are an integral part of a...

Transforming the security industry with open standards

Threats such as Mifare hacking, the General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. Daryn Flynn, Business Development Manager at Nedap Security Management, states that external factors such as these do provoke change in physical security systems, but it’s reactive change. In the...

The importance of electronic key control solutions in casino security

With so much money flowing in and out in the form of cash and chips, casinos are a highly regulated world when it comes to security. One of the most critical areas of casino security is key control. Physical keys are used for access to all of the most sensitive and highly secured areas of the casino, including counting rooms and drop boxes, so the rules and regulations that relate to key control are extremely important to maintain tight control and minimise loss and fraud.&nb...

New NERC standard to guide security of bulk power systems

On April 16, 2013, snipers fired for 19 minutes on PG&E Corp.'s Metcalf electric power transmission station near San Diego, California, knocking out 17 giant transformers that supply electricity to Silicon Valley. At least 100 rounds were fired from at least one high-powered rifle. The power grid was rerouted to avoid a blackout, but it took 27 days to make repairs and get the substation back up and running. The incident got the attention of regulators and security prof...

Significance of value management process

In a highly competitive marketplace, where organisations need to ensure they are contracting for the best possible services, value must be visible. This starts with aligning with the right service provider – one that is dedicated to the organisation’s success and has the people and processes to make an impact. Certainly most, if not all, service organisations say that they strive to exceed client expectations and meet the highest standards in their industry &ndash...

Corporate data security and access control needs evolving with growth of BYOD and cloud applications

Applications that reside in the cloud offer enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprise cloud deployments now successfully up and running, plus the integration of the Bring-Your-Own-Device (BYOD) culture into the workplace, the complex issue of data security and access control have leapt to the fore. Ian Lowe, Senior Product Marketing Manager...

Improving security system installations with Acceptance Testing

Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from a company’s...

Integrating biometrics with an organisation's existing access control system

The biometric card provides an easy, low cost way for facilities to provide a biometric upgrade A convenient way to establish higher security within certain areas of a building is an appealing idea to many security directors. Whether it’s to more highly secure the pharmacy lab at a hospital, the laboratory at a government research facility or the tarmac at a small airport, some locations simply need to have more scrutiny paid to who is entering. Going beyond the card onl...

VMS or PSIM? Weighing the options

New security technologies have dramatically changed the security landscape over the last decade The security landscape has changed dramatically in the last decade with the introduction of numerous new security technologies to detect crime and deter criminal activity. With a long list of new tools, professionals now need to process vast amounts of information within seconds from many different security systems and then make important decisions about how to respond to an inc...

Security Industry Association builds on historic role developing security industry standards

The best standards are often baseline, common-denominator standards that leave room for innovation The collaboration between ONVIF and SIA to develop new access control standards is just the latest standards-related news from the Security Industry Association (SIA), the American trade association headquartered in Silver Spring, Md., near Washington, D.C.  In fact, SIA has a long history and tradition of standards development, dating back to the 1980s. SIA has produced 1...

Hydraulic and electrical/mechanical power units for vehicle access control: Pros and Cons

When specifying the vehicle access control system you need to stop a truck-bomber, errant driver or vehicle not authorised to enter your facility, you have to decide among bollards, barriers or barricades. Once you have decided the type you will use, you then have to pick the model to use. Finally, you then need to select the type of power unit you are going to deploy. And, going green is important to many companies and organisations worldwide who are trying to minimise their carbo...

Impact of managed service methodologies on security and fire safety industries

A Managed Service solution ensures continuous system availability and functionality Managed Service methodologies have a proven record of improved operations, reduced ownership costs and the ability to migrate technology over time. Head of Enterprise Solutions for Siemens Building Technologies, Tony O’Brien, examines how this approach could impact the security and fire safety industries. How robust is your security and fire safety technology roadmap? A recent global sur...

Adopting a multi-layered security strategy by extending the benefits of strong authentication

Enterprises have typically focused on securing the network perimeter and relied on static passwords to authenticate users inside the firewall. This is insufficient, given the nature of today’s Advanced Persistent Threats (APTs) and internal risks associated with Bring Your Own Device (BYOD) adoption. Static passwords can be a potential recipe for a security disaster. In this article Julian Lovelock, Vice President of Product Marketing, Identity Assurance HID Global expl...

Biometric technology - Identifying values and benefits

What is it about biometrics that triggers so much worry?  Initial resistance gives way to mainstream acceptance when biometric technology allows convenient and secure access to healthcare, banking services, amusement parks, office buildings. What is it about biometrics that triggers so much worry? In the past, concerns seemed to have their foundation in the use of fingerprints in law enforcement; the association between fingerprints and criminality was strong.&n...

Advantages of choosing retrofit security solutions

As security systems age, their components become obsolete, end users outgrow them, or end users may be faced with expensive and time consuming upgrades. Users can spend months researching new solutions or take a chance on a lengthy upgrade with unforeseen challenges and costs. Both options include finding money in the budget for a new system, upgrades or labour expenses that often were not planned for or expected. However, Kim Rahfaldt, Public Relations Manager at AMAG Technology,...

Importance of open technology platform for electronic access control

Looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analysing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike. Breaking down individual doors into a series of classifications can be most helpful in assuring that the EAC is performing to the highest standards that the budget allows. Karen Keating, Allegion Portfolio Marketing Manager, Electro...

Optimising Effectiveness and ROI for Physical Identity and Access Management Software

Ideal COTS solutions take cost, customisation and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronised and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...

Seeing success reflected in the marketplace, ONVIF expands its vision beyond video

In China and Russia ONVIF Profile S compliance is becoming mandatory for smaller systems The familiarity and widespread use of ONVIF interfaces in the market are evidence of the success of ONVIF, which was created in 2008 by three manufacturers, Axis, Sony and Bosch. More evidence of success is a growing number of new members and compliant products. All over the world, ONVIF is being embraced – in China and Russia, as examples, ONVIF Profile S compliance is becoming mand...

Genetec plans “continuous integration” approach to manage changes to cloud services

The impact of the IT department on physical security has been a source of discussion for years. Generally, the influence of IT on purchasing and technology decisions related to physical security systems has been seen as increasing with no end in sight. One industry leader thinks otherwise. Pierre Racz, president, CEO and founder of Genetec, sees the clout of the IT department waning in the age of “bring you own device,” cloud services and greater intelligence at...

K-12 Security: What school administrators need to know

Gates and fencing can keep visitors to one part of a campus away from other parts of the campus The need for more robust security in schools has been brought to the fore by a series of shooting incidents in schools in the US in the last few years. While such incidents are relatively rare, the threat of untoward incidents in schools is real and too serious to be ignored. This article lists some essential steps for school administrators to respond to potential security issues ca...

SourceSecurity.com Technology Report highlights remote business management platform

A new Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management. Combining inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others, the OnVu360 management platform has applications in remote business management and secur...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems