Door access control - Expert commentary
The biometric card provides an easy, low cost way for facilities to provide a biometric upgrade A convenient way to establish higher security within certain areas of a building is an appealing idea to many security directors. Whether it’s to more highly secure the pharmacy lab at a hospital, the laboratory at a government research facility or the tarmac at a small airport, some locations simply need to have more scrutiny paid to who is entering. Going beyond the card onl...
As security systems age, their components become obsolete, end users outgrow them, or end users may be faced with expensive and time consuming upgrades. Users can spend months researching new solutions or take a chance on a lengthy upgrade with unforeseen challenges and costs. Both options include finding money in the budget for a new system, upgrades or labour expenses that often were not planned for or expected. However, Kim Rahfaldt, Public Relations Manager at AMAG Technology,...
Gates and fencing can keep visitors to one part of a campus away from other parts of the campus The need for more robust security in schools has been brought to the fore by a series of shooting incidents in schools in the US in the last few years. While such incidents are relatively rare, the threat of untoward incidents in schools is real and too serious to be ignored. This article lists some essential steps for school administrators to respond to potential security issues ca...
The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg...
Utilising the principals of IT security can help developers create a secure physical system that meets an organisations needs Secure Systems start with secure design and smart planning. In this article, Albert Derckson, Research and Development Director at Nedap, discusses the necessary design elements for building a more secure system based on security principles. These principles of physical security, many of which can be drawn from proven principles of IT security, su...
Network-enabled "intelligent" security components increasingly have better computational and memory capacity The use of Internet Protocol (IP), or networking, is commonly associated with convergence. In this article, Markus Lahtinen of Lund University's LUSAX project, contends that the shift to network-enabled "intelligent" security components which increasingly have better computational and memory capacity has a significant impact on the present and future dy...
The outlook of the access control is bright despite economic downturn Belying the tough economic environment in which it is operating globally, the security industry is apparently ‘weathering the storm' quite well. Despite some expected adverse impact of the economic downturn, overall the security industry has been relatively immune and resilient compared to some other sectors. This could well be because of the growth in unemployment and higher crime rates necessi...
RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download