Technology & Trends - Barriers

How effective is physical security technology amid Europe’s current migrant crisis?

Millions of dollars are spent annually at border crossings on technology such as buried volumetric sensors Border control forces, train operators, ferry companies and humanitarian organisations have spent much of 2015 concerned with people trafficking between the northern coast of France and the United Kingdom. Now the focus has switched to migrants fleeing civil war in Syria. It is one of the biggest migrant crisis that Europe has witnessed so far, with hundreds of refugees s...

Executive protection boosts corporate security, productivity; secures people & property

Executive protection can be costly, but it isa fraction of the loss that protecting a topexecutive could prevent  Corporate security departments work hard to protect people and property. Executive protection is one of the key components of corporate security services. In fact, many corporate security departments are now taking on this new responsibility. “We are seeing more companies adopting executive protection as a normal part of corporate security,” says B...

Aviation security and counter terrorism since 9-11 terrorist attacks

Preventive security measures and security training of personnel in the line of fire have improved dramatically Aviation security has significantly intensified since 9-11, and we’re making it more and more difficult for terrorists to get to us on the ground and in the air. In February the FBI arrested three men in Brooklyn plotting to hijack an airliner, and in the 14 years since the terrorist attacks of 9-11, officials have foiled dozens of plots against airlines, buildi...

Physical security solution buying guide: 7 things to consider

All seven decision factors contribute to an effective physical security solution Installation of an effective physical security solution can enable end users to avoid serious mistakes. This article presents a comprehensive and consultative decision methodology to help end users make the best decisions about security entrance products for the long term. The decision-making process is based on Boon Edam’s more than 100 years of experience in installing thousands of entry s...

Laser scanning technology for perimeter protection, building security applications

When it comes to protecting buildings and property, traditional methods of security—such as structural barriers, security guards, and security cameras—have their limitations.  Advanced laser scanning technology can overcome many of these limitations and provide a safe, reliable, and easy-to-use solution. Overview of laser scanning technology Laser scanning technology for building security applications utilises the time-of-flight method, in which a sensor em...

Long range identification - 3rd major contactless access control

Recently there has been great interest in long range reading (433 MHz technology) For the last two decades, the primary contactless technology used in access control systems has been the proximity card (125 kHz technology). In the last decade, proximity cards have been augmented by the smart card (13.56 MHz technology). And that's the way it has been until just recently. All of a sudden, there has been great interest in long range reading (433 MHz technology). Merging traditi...

From barriers to Bluetooth at ISC West: Reinventing the door opening category

ASSA ABLOY discussed the importance of securing the critical infrastructure, the building and beyond, at a media press conference April 15 on the opening day of ISC West 2015 in Las Vegas. Martin Huddart, president of ASSA ABLOY’s Access and Egress Hardware Group, based in New Haven, Conn., outlined some of the current and future objectives of the company, which continues to fine-tune its global leadership in door opening solutions while playing a significant role in the future of access...

Sports security: Ensuring safety at sports venues a continuing challenge

Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across several countries during a week when UBM announced that Protection & Management 2015 (which includes the IFSEC International trade fair) will feature Karren Brady (Baroness Brady), a career soccer executive, as one of its inspirational keynote speakers. As I type, inquests are being held into the deaths of some of the 96 people who were kill...

Q&A: Integrator weighs in on the security of web-based services

Installers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input. SourceSecurity.com: What is your opinion of the security of cloud-based services? Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-security can always be improved in the cloud. The continued trend to SaaS (Software as a Serv...

More interest in physical entrance and mass notification systems for 2015

Interest in mass notification systems appears to be growing in the security community as a response to active shootings and workplace violence 2014/2015 Boon Edam Review and Forecast: The security industry seems very healthy and continues to experience solid growth. We have observed an increased level of corporate and government expenditures, which allows for expanding security upgrades in general. Looking ahead to 2015, I see interest in mass notification systems appears to...

Terrorist threats increase need to protect soft targets

With a growing threat from home-grown terrorists, there will be a greater need to protect soft targets as well as to use portable barriers Delta Scientific 2014/2015 Review & Forecast:In 2014, hard targets, such as government facilities, airports, refineries and similar installations continued to boost sales for Delta Scientific by protecting themselves from car- and truck bombers using crash-rated vehicle access control equipment including bollards, barriers, barricades a...

Key trends driving access control growth

Access Control is the second-fastest growing area in the security market. A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are just a few factors driving access control adoption both across the residential and commercial markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these factors and how they contribute to the future of access control...

Hydraulic and electrical/mechanical power units for vehicle access control: Pros and Cons

When specifying the vehicle access control system you need to stop a truck-bomber, errant driver or vehicle not authorised to enter your facility, you have to decide among bollards, barriers or barricades. Once you have decided the type you will use, you then have to pick the model to use. Finally, you then need to select the type of power unit you are going to deploy. And, going green is important to many companies and organisations worldwide who are trying to minimise their carbo...

K-12 Security: What school administrators need to know

Gates and fencing can keep visitors to one part of a campus away from other parts of the campus The need for more robust security in schools has been brought to the fore by a series of shooting incidents in schools in the US in the last few years. While such incidents are relatively rare, the threat of untoward incidents in schools is real and too serious to be ignored. This article lists some essential steps for school administrators to respond to potential security issues ca...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems