Technology & Trends - Access control systems & kits
RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...
Poorly maintained environments send messages that undesirable behaviour will be tolerated Crime prevention is not solely the job of locks on doors or security cameras scanning entranceways. The makeup of a physical environment can influence where crimes are committed. That's why Crime Prevention Through Environmental Design (CPTED) should be an essential component to the crime prevention strategy of any building or area. In this article ASSA ABLOY Future Labs ...
Globalisation and new technologies have led to increased threats for financial organisations The banking and financial sector needs to be constantly prepared to manage an increasing range of security risks, from fraud and anti-social behaviour to data mismanagement. Organisations must anticipate such potential risks and have well-established plans in place to address them. Honeywell, with more than 50 years of experience in the security industry, is helpin...
Cutting costs on security investments puts small businesses at the risk of criminal activity During tough economic times, many small businesses can be found guilty of neglecting investment in their on-going security protection. Naturally, this can prove to be problematic as the impact of break-ins and criminal activity greatly affect the accounts and day-to-day running of the business. Luke Martyn, SMB specialist at ADT Fire and Security provides practical, cost-ef...
Consumers prefer voice recognition technology for biometric identification Voice recognition is the most preferred form of biometric identification among consumers. Derek Scheips for ASSA ABLOY Future Labs outlines the concept behind this technology and some of its uses and drawbacks. With all types of biometric applications on the rise, voice-based authentication is one approach that seems to engender less resistance among users than other biometric forms of s...
Hoteliers don't give security a high enough priority Security is not as high on the hotel agenda as it should be according to Michael Hartmann, Senior Vice President for Hospitality Solutions with Siemens Building Technologies. Here he looks at the reluctance to invest in the latest security systems, the different levels of security typically employed and the benefits of an integrated approach. The contribution to profit, or the perceived lack of it, is one of the major...
Examining the road to convergence The use of Internet Protocol (IP) in the security industry is increasing but little is known about the relationship between end users and the merger of traditional physical security and IT otherwise referred to as convergence in the security trade press. Markus Lahtinen of the LUSAX project examines the growth of convergence in the security industry and discusses complexities of this relationship. The LUSAX project at Lund Universit...
PoE technology allows for safer environments through better security systems Power over Ethernet is both convenient and affordable, says Jonas Rehnberg of ASSA ABLOY Future Labs. The benefits to network security are immense, be it in powering security cameras with added features or enabling better access control systems and intruder deterrents. Hailed as a watershed innovation when first standardized in 2003, Power over Ethernet (PoE) offers a way of supplying electricity to n...
HID and Abloy UK are creating the future of intelligent doors At IFSEC 2009, ASSA Abloy launched Hi-O, a new concept for electronic door solutions that improves and simplifies the installation, service and upgrade of access control systems and allows end users to create the first truly "intelligent doors". SourceSecurity.com spoke with Matt Thomas, Managing Director of Abloy UK, and Ian Compton, Director of Sales for UK, IE and Nordics for HID Global, to find out more ab...
Key to stability during economic downturn is investment in partners and product innovation If we are to believe the words of the Bank of England's Mervyn King, the recession may be coming to an end. No longer are we to fear the shouts of the dreaded "credit crunch" resonating from our TV screens. While green shoots of economic recovery spring up around the world, there is still enough uncertainty to warrant the question: How is the security industry...
Cruise ships need stringent security measures Baggage x-rays, archway metal detectors, body checks, swipe card readers and more... Michael Lawton for ASSA ABLOY Future Lab delves into the world of access control security onboard cruise ships as they are subjected to the tighter security norms of the IMO and ISPS code.If you wanted to describe the security challenges of a cruise liner, you could think of a hotel inside an airport. When it comes to the...
Jeremy Kimber, Honeywell's EMEA Marketing Leader, lays out the key points to consider when choosing a converged access control solution. In the past few years, perhaps no security industry buzzword has been defined in articles and promotional materials as many times as 'convergence'. These definitions have most commonly referred to the integration of physical Convergence of physical and traditional IT systems can provide compelling security benefits for an enterprise securit...
Browse expert commentaries
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
Dahua 4MP WizColor Bullet Camera with Fixed-Focal and WizSense AI
Hikvision WonderHub: Interactive Displays for Collaboration
Verkada GC31 Cellular Gateway for Seamless Device Connectivity
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download