Electronic security systems - Expert commentary

High demand for unified solutions and retrofits to continue into 2015

AMAG saw growth across all vertical market segments, making 2014 an incredibly exciting year 2014/2015 AMAG Technology Review and Forecast: AMAG Technology saw growth across all vertical market segments, making 2014 an incredibly exciting year. End users are demanding unified, end-to-end total solutions, and I see that trend continuing into 2015 and beyond. Some users want access control and video management from the same manufacturer to eliminate integration challenges, or...

Costs, usability, and support among access control challenges

Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillanceas it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...

Simplifying interoperability of access control with PLAI specification

Communicating access control information across multiple platforms is simplified with the PSIA's PLAI specification Managing access control across large companies or institutions, including those that span giant campuses or even multiple locations all over the world, is essential to optimum security. Too often, however, the effectiveness of a company’s access control system – or, more likely, of its multiple access systems that were installed in various locations o...

End user security focus: Managing school visitors

The secure inner doors of the vestibule at the front entrance of Park and River Forest High School Most school visitors have legitimate reasons for coming to school. A frightening few, however, show up with violent or other illegal intentions. Today, school security directors are actively managing visitors with secured front door vestibules and visitor management software. Oak Park and River Forest High School, a single-school district serving Oak Park and River Forest, Ill.,...

How cybersecurity impacts the physical security world

Cybersecurity is a critically important aspect in today’s increasingly IP-driven world of physical security The physical security market tends to dismiss issues of cybersecurity as outside its area of expertise, but cyber-threats are a problem that has been ignored for too long. The fact is, cybersecurity is a critically important aspect of the systems our industry provides in the increasingly IP-driven world of physical security. And the risk isn’t just reserved...

Understanding the difference between 900 MHz Wireless vs. 2.4 GHz Wi-Fi

900 MHz wireless and Wi-Fi (2.4 GHz) are sometimes used interchangeably in the access control world to describe solutions that do not require running wires all the way to the opening. It’s true that, as wireless options, both technologies offer some general advantages over traditional hardwired solutions. In this article, Minu Youngkin, Allegion, Integrator Marketing Manager shares her thoughts and knowledge regarding both wireless and Wi-Fi technologies.* First of all, wire...

Optimising business security and processes by implementation of smart reports

At what time of day do you have most people in your building? Do you have enough parking spaces for your employees? Are there always enough first aiders in the building to meet safety requirements? Security systems provide a wealth of data, which can provide the answers to these questions and more. By extracting reports from your system, you can gather valuable information to increase safety or improve business processes.  Wiebe Koopmans, owner of Linked Solutions, advises bus...

Transforming the security industry with open standards

Threats such as Mifare hacking, the General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. Daryn Flynn, Business Development Manager at Nedap Security Management, states that external factors such as these do provoke change in physical security systems, but it’s reactive change. In the...

The importance of electronic key control solutions in casino security

With so much money flowing in and out in the form of cash and chips, casinos are a highly regulated world when it comes to security. One of the most critical areas of casino security is key control. Physical keys are used for access to all of the most sensitive and highly secured areas of the casino, including counting rooms and drop boxes, so the rules and regulations that relate to key control are extremely important to maintain tight control and minimise loss and fraud.&nb...

Improving security system installations with Acceptance Testing

Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from a company’s...

Adopting a multi-layered security strategy by extending the benefits of strong authentication

Enterprises have typically focused on securing the network perimeter and relied on static passwords to authenticate users inside the firewall. This is insufficient, given the nature of today’s Advanced Persistent Threats (APTs) and internal risks associated with Bring Your Own Device (BYOD) adoption. Static passwords can be a potential recipe for a security disaster. In this article Julian Lovelock, Vice President of Product Marketing, Identity Assurance HID Global expl...

Importance of open technology platform for electronic access control

Looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analysing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike. Breaking down individual doors into a series of classifications can be most helpful in assuring that the EAC is performing to the highest standards that the budget allows. Karen Keating, Allegion Portfolio Marketing Manager, Electro...

Intelligent Key Management for Access Control

Intelligent asset management is a natural extension of access control Key and asset management can integrate with other security disciplines to extend beyond the much-hyped vogue for 'convergence' and move towards truly intelligent building management. Brenda Taylor, Sales and Marketing Director of Traka, shows how assets can be protected with an approach that draws on shared data while making its own contribution to enterprise-wide information.  A point for anybody who...

"Access Your World": ASSA ABLOY shares its thoughts on IFSEC 2013 and new developments in access control - Part II

At this year's IFSEC 2013, ASSA ABLOY willoffer a complete range of door solutions focusing on the slogan "Access Your World" To discuss broader issues within access control and the security industry in general, Tzachi Wiesenfeld, Executive Vice President and Head of ASSA ABLOY EMEA division, gave us his take on new trends in access control, the effects of the world economy on the industry and the role ASSA ABLOY EMEA plays within the security industry. ASSA ABLOY E...

"Access Your World": ASSA ABLOY shares its thoughts on IFSEC 2013 and new developments in access control - Part I

At this year's IFSEC 2013, ASSA ABLOY willoffer a complete range of door solutions focusing on the slogan "Access Your World" In a wide-ranging interview with SourceSecurity.com, Chris Bone, VP Access Control, ASSA ABLOY EMEA, discussed ASSA ABLOY’s product roadmap and outlook on technology trends in access control. Besides shedding light on the main product lines that it will be showcasing at IFSEC 2013, including the Seos ecosystem and Aperio range, he indicated that d...

Automated key control and management systems boost electronic access control

  An automated key control system bridges the gap between mechanical and electronic access control systems The vast array of doors, entrances and restricted areas securing semi-public locales are increasingly demanding the need for effective and easy access control management. In this article, Fernando Pires, VP Sales and Marketing at Morse Watchmans, highlights the effectiveness and convenience offered by automated key control systems that have narrowed the gap...

Interoperability of building security systems: Protocols and standards

   XML, API and web server offer the ability for interoperability between proprietary software Today's facility executive wants to purchase systems and components from various manufacturers and have those components work together as one system. They want "open systems" that allow the manufacturers to offer new features and add value without locking the owner into a single vendor's proprietary protocols. In short, they want Interoperability.Hirsch Electronics...

Thermal imaging cameras: a cost effective solution for perimeter protection

  To obtain complete security on sites night time surveillance must factor as high priority Today, the challenge to video surveillance professionals is to make sure that the CCTV video footage is effective on a 24/7 basis throughout the year. Securing an area during the daytime is one thing. But what happens during the night? And in weather conditions like fog, rain and snow? What can be detected if the sun blinds CCTV cameras? Flir Systems explains.As CCTV systems be...

Interfaces, integration and interoperability of CCTV security systems

Integrated systems solution - The future proof option Does the key to a successful long-term investment in security systems reside in integration? Patric Meyer, SDK support manager, Geutebruck answers 'yes'.If you are only interested in a stand-alone CCTV system for screening and recording video - full stop - then this article is probably not for you. However, most CCTV users these days want much more for their money. Many want their video surveillance system to communicate wi...

Contactless smart cards in health care institutions: Considerations for entering the health care market

   Hospitals need stronger 'in-depth' physical security at different entry points Within the course of any given day, a hospital or health care chief security officer (CSO) faces the task of not only protecting multiple points of access but also doing so in a way that enables movement and activity, is convenient for staff and patients and does not impede the facility's primary function: saving lives. Health care facilities exist in a wide variety of medical focus, adm...

Tightening cruise ships’ security: State of access control solutions onboard passenger ships

  Cruise ships need stringent security measures Baggage x-rays, archway metal detectors, body checks, swipe card readers and more... Michael Lawton for ASSA ABLOY Future Lab delves into the world of access control security onboard cruise ships as they are subjected to the tighter security norms of the IMO and ISPS code.If you wanted to describe the security challenges of a cruise liner, you could think of a hotel inside an airport. When it comes to the...

Access control - the key to integrated security systems for businesses

  Integrated access control solutions have become easier to apply Leading integrated security solutions provider Honeywell explains the importance and benefits of implementing an integrated access control solution for businesses. An access control solution can be as simple as the use of electronic or magnetic swipe cards instead of keys to unlock a front door. This limited functionality still retains a considerable level of value. In most cases, businesses can limit...

Museum security: integrated security systems to protect the priceless

  Museums facing growing security challenge with rise of armed robbery  It only takes a shocking 58 seconds to steal a painting. Jonas Rehnberg, writer at Assa Abloy Future labs, speaks to former museum security chief Ton Cremers about the safe-keeping of precious artefacts in museums and art galleries. In 2004, armed, masked robbers stormed into the Munch Museum in Oslo and stole two masterpieces - "The Scream" and "Madonna" - before the eyes of shocked spectators....