Technology & Trends - Access Control

Seeing success reflected in the marketplace, ONVIF expands its vision beyond video

In China and Russia ONVIF Profile S compliance is becoming mandatory for smaller systems The familiarity and widespread use of ONVIF interfaces in the market are evidence of the success of ONVIF, which was created in 2008 by three manufacturers, Axis, Sony and Bosch. More evidence of success is a growing number of new members and compliant products. All over the world, ONVIF is being embraced – in China and Russia, as examples, ONVIF Profile S compliance is becoming mand...

Genetec plans “continuous integration” approach to manage changes to cloud services

The impact of the IT department on physical security has been a source of discussion for years. Generally, the influence of IT on purchasing and technology decisions related to physical security systems has been seen as increasing with no end in sight. One industry leader thinks otherwise. Pierre Racz, president, CEO and founder of Genetec, sees the clout of the IT department waning in the age of “bring you own device,” cloud services and greater intelligence at...

K-12 Security: What school administrators need to know

Gates and fencing can keep visitors to one part of a campus away from other parts of the campus The need for more robust security in schools has been brought to the fore by a series of shooting incidents in schools in the US in the last few years. While such incidents are relatively rare, the threat of untoward incidents in schools is real and too serious to be ignored. This article lists some essential steps for school administrators to respond to potential security issues ca...

SourceSecurity.com Technology Report highlights remote business management platform

A new Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management. Combining inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others, the OnVu360 management platform has applications in remote business management and secur...

Energy efficiency in access control: Why does it matter?

Adopting an energy efficiency access control solution can provide significant cost savings At a time when electricity prices are going up and sustainability is high priority in the world as a whole, energy efficiency should be a key consideration when upgrading to any electronic access control solution. To highlight the key benefits of energy efficiency in access control ASSA ABLOY have released a case study about cost savings with wireless battery powered access control. As a...

“Soft” biometrics among the next wave of innovation under study

 “Soft” biometric measurements, such as gait, gender, and ethnicity offer new possibility for biometric solutions What is the next wave of biometrics? The Center for Identification Technology and Research (CITeR) is looking at the possibilities. New developments include consideration of new “soft” biometric measurements, such as gait, gender, and ethnicity. Although not accurate enough to identify a specific person, the capture and analysis of such...

CITeR working to make face, iris and fingerprint recognition systems better

There are new biometrics on the horizon, but much of current biometrics research centres on improving the biometrics we have, especially the face, iris and fingerprint recognition systems commonly deployed in the field. These systems are effective and provide good accuracy, but their usefulness is often limited by the conditions under which data is captured. Research is looking for ways to make face, iris and fingerprint biometrics more accurate in more real-world situations....

Security officer productivity & loyalty with effective employee engagement programmes

Security officers work diligently to protect people and property and are often first on the scene of an emergency. Working alongside police, paramedics and firefighters, security officers demand our collective respect. The Freedonia Group reports that the demand for security officer and patrol services is forecast to rise at an annual rate of 4.6 percent through 2014 to $25 billion and the number of officers employed by private security firms is expected to increase 2.6 perce...

Positive economic outlook for security market in 2014

A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...

Fault tolerant access control for business continuity

The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg...

Redefining access control with NFC-enabled smartphones

Comprehensive and robust security programmes and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device.  Fur...

Security by design or designed for security?

Utilising the principals of IT security can help developers create a secure physical system that meets an organisations needs Secure Systems start with secure design and smart planning. In this article, Albert Derckson, Research and Development Director at Nedap, discusses the necessary design elements for building a more secure system based on security principles.  These principles of physical security, many of which can be drawn from proven principles of IT security, su...

Creating a safe and secure workplace environment using a culture of openness

Companies that have developed a culture of openness can provide and receive feedback at all levels The nail that sticks out gets hammered down” is an old Japanese saying that encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Brent O’Bryan, SPHR at AlliedBarton Security Services, explains that a winning formula for both the organisation and an individual is a culture actively exhibiting healthy behaviours and practi...

Intelligent Key Management for Access Control

Intelligent asset management is a natural extension of access control Key and asset management can integrate with other security disciplines to extend beyond the much-hyped vogue for 'convergence' and move towards truly intelligent building management. Brenda Taylor, Sales and Marketing Director of Traka, shows how assets can be protected with an approach that draws on shared data while making its own contribution to enterprise-wide information.  A point for anybody who...

Unifying identity management and access control

For many companies, the current state of their access control infrastructure is best described as being fractured Identity management has now become a very important requirement for companies. The challenge, of course, lies in proper integration of different physical access control systems with an identity management system. Sophisticated security software can help overcome this challenge, says Ajay Jain, President and CEO of Quantum Secure, who adds that increasing regulatory...

"Access Your World": ASSA ABLOY shares its thoughts on IFSEC 2013 and new developments in access control - Part II

At this year's IFSEC 2013, ASSA ABLOY willoffer a complete range of door solutions focusing on the slogan "Access Your World" To discuss broader issues within access control and the security industry in general, Tzachi Wiesenfeld, Executive Vice President and Head of ASSA ABLOY EMEA division, gave us his take on new trends in access control, the effects of the world economy on the industry and the role ASSA ABLOY EMEA plays within the security industry. ASSA ABLOY E...

"Access Your World": ASSA ABLOY shares its thoughts on IFSEC 2013 and new developments in access control - Part I

At this year's IFSEC 2013, ASSA ABLOY willoffer a complete range of door solutions focusing on the slogan "Access Your World" In a wide-ranging interview with SourceSecurity.com, Chris Bone, VP Access Control, ASSA ABLOY EMEA, discussed ASSA ABLOY’s product roadmap and outlook on technology trends in access control. Besides shedding light on the main product lines that it will be showcasing at IFSEC 2013, including the Seos ecosystem and Aperio range, he indicated that d...

Biometrics security solutions- everything you need to know

Many forward-thinking organisations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively, discuss the benefits of biometric technology in the protection of people, businesses and assets. Highlighting the many...

Addressing school security challenges with access control systems

There are many factors that have an impact on the security of students, staff and the public In this article, Matt Thomas Managing Director of ASSA ABLOY Access Control discusses the safety and security of schools and universities in the UK. There are many factors, such as the rise in tuition fees and the development of free schools, that have an impact on the security of students, staff and the public. The failure to protect and secure people and physical assets has serious a...

Security guard company selection - a checklist

The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services.  In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...

Security management system’s usability key to easy adoption

The usability revolution that took place several years ago on the consumer market is breaking into the field of security management. Wouter Kersteman, Interaction Designer at Nedap, explains in this article that intuitive user interfaces with attractive apps and widgets - similar to those found on modern mobile phones and tablets - are the standard of the future; usability is the latest buzzword and may even be a pre-requisite for security management systems.   Rec...

Security software for identity management – A flexible, scalable and secure approach to manage enterprise risk

Software can combine information from various systems to create a single identity across the organisation In today's enterprise business environment, the best approach to managing risk for a known scenario is to both prepare for it and guard against it.  Effective security management necessitates credible real-time information about risk and the ability to respond to that information in a timely manner. However, that information is often not available in real-time or ma...

New Norbain’s differential treatment of manufacturer creditors

New Norbain paying "compensation" to a select number of creditors Following the Administration and pre-pack sale of Norbain, it is now apparent that the new company (also called “Norbain”) has been paying “compensation” to some suppliers for the debts owed by the old company.  However, it is cherry picking which suppliers it chooses to compensate – some have received a significant proportion of their debt with old Norbain, while others have...

Power supply requirements and options for access control systems

The power supply is the key driving force for access control systems Power plays a crucial role in the effective functioning of any access control system and the choice of the right power system to suit specific requirements is important. In this article, Ronnie Pennington, National Accounts Manager of Altronix Corporation explains various ways to determine and meet the power requirements for access control systems. Usually, an access control system itself acts as the main so...

Norbain goes bust?

The lights are turned out at Norbain - momentarily The mysterious demise of UK distributor NorbainOn Monday 2 July Norbain issued a cryptic press release.  Apparently, “the UK business and assets of Norbain” – the largest distributor in the UK – have been sold to Newbury Investments (UK) Limited by “the Administrators, KPMG”.  Norbain In Administration – this is news to the security industry! Administrators are typically ap...

IP technologies fuel global expansion and standardisation of security systems

Networking is a powerful way to effectively converge and integrate security In an ever-changing world, business organisations require efficient security partners in order to focus their expansion towards growing economies. This physical expansion leads to a need for expanded and enhanced security programs to protect a growing network of people and facilities. In this article, Renae Leary, Senior Director, Global Accounts, at ADT Worldwide, provides an insight into cost-effecti...

Benefits of a modern access control system go beyond security

An access control system can be an excellent and an invaluable tool for enhancing business efficiency The picture that comes into most people’s minds when thinking about access control systems is someone offering a badge up to a card reader to unlock a door or release a barrier so that they can get into or out of a building. And, of course, this is a primary function for most installations. The capabilities of modern access control systems extend far beyond simply contro...

Security consultants get tech-savvy, redefine role

The intertwining of security and IT is requiring consultants to redefine their role Security consultants have traditionally operated inconspicuously while providing quality, independent advice to customers around their security requirements. However, the relentless intertwining of IT and security in the form of IP technology has required consultants to adapt, and consequently redefine their role within the space. In this article Daniel Wan, Channel Marketing Leader UK at Honey...

Automated key control and management systems boost electronic access control

  An automated key control system bridges the gap between mechanical and electronic access control systems The vast array of doors, entrances and restricted areas securing semi-public locales are increasingly demanding the need for effective and easy access control management. In this article, Fernando Pires, VP Sales and Marketing at Morse Watchmans, highlights the effectiveness and convenience offered by automated key control systems that have narrowed the gap...

Open standards in physical access control gain momentum as ONVIF adoption grows

 The outlook of the access control is bright despite economic downturn Belying the tough economic environment in which it is operating globally, the security industry is apparently ‘weathering the storm' quite well. Despite some expected adverse impact of the economic downturn, overall the security industry has been relatively immune and resilient compared to some other sectors. This could well be because of the growth in unemployment and higher crime rates necessi...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?