Door access control - Expert commentary
Prevention makes tailgating impossible or extremely difficult due to the full height of an entrance Findings from the 2014 Tailgating Survey by Boon Edam Inc., Lillington, North Carolina, found that more than 85 percent of the 250 integrator and end-user respondents were not tracking the number of tailgating incidents. In the access control industry, tailgating is when an unauthorised person follows an authorised personnel through a controlled entrance. More than 50 percent...
Dortronics continues to focus on custom solutions in addition to its line of standard devices Security installers have new ways to add value to their specifications with switches and door controls that can be deployed in a wide range of applications to meet emerging needs of end-users. John FitzPatrick, president of Dortronics Systems Inc., Sag Harbor, New York, says the company continues to work closely with security integrators and their end-user customers to provide co...
Home security devices are evolving and expanding their offered features, providing new opportunities for the security industry Home security isn’t just home security anymore. These days cameras, door and window alarms are just pieces of the web–enabled “smart home.” And, the home is getting smarter, as service providers begin to merge home security systems with home automation. The added value of these additional features is now drawing more potential c...
IP is here and is continuing to proliferate in the security industry and its next major advancement is in pure IP access control IP technologies in the security industry are nearly ubiquitous today. End users and integrators have adopted and embraced IP cameras, building automation systems, wireless mesh networks, alarms, monitoring, and regularly view all of these technologies from the palm of their hand, on their smart phone. The technologies are easier to install, oft...
The Protection Bureau is one of the top-10 security integrators in the US You really can’t talk about The Protection Bureau without discussing its founder, the late Keith Ladd. If you’ve been in the industry any length of time, you probably had a chance to meet him. I certainly did. In fact, when I was a cub reporter with one of the first security publications I ever worked for, my inaugural visit to a customer and central station was to The Protection Bureau. That...
More and more commercial buildings today are replacing mechanical keyed locks with card access systems. The basic reason is familiar to security professionals: card systems, once installed, cost less to manage and maintain. “When people are let go, if you don’t get their keys back, you have to rekey the locks and give everyone new keys,” says Brett St. Pierre, director, education solutions with Austin, Texas-based HID Global. “With a card system, all y...
Airport security has tightened ever since the September 9/11 catastrophic event. Post-incident investigation of such events often brings to light a particular weakness in security. As a result, security and safety protocols are developed in reaction to such traumatic events. Similar to the security measures adopted by airlines, school safety systems have also undergone major changes with a variety of electronic and mechanical access control products that prevent assailants fr...
Many security dealers and installers are expanding their offerings to include home automation equipment The growth of home automation and “smart home” technology has created a unique opportunity for security companies of all kinds. With security systems already in about 20 percent of American homes, many security dealers and installers are expanding their offerings to include home automation equipment. Internet connected devices After all, why just offer monitori...
Suffering a breach is probably something that companies won’t admit to unless they must As the world has grown more and more interconnected through the Internet and company networks, cybercrime has grown at an alarming rate. According to the Federal Trade Commission, 783 businesses reported IT breaches in 2014, up 27.5 percent from 2013. “There were probably many more, but most go unreported,” says Kim Phan, of council with the Washington, D.C., law offices o...
Security is a big concern for local government buildings, but there are measures that can make a difference Back in August of 2013, Rockne Warren Newell, armed with a rifle and a handgun, stormed a township meeting in the Ross Township Municipal Building in Saylorsburg, Pa. Witnesses say he fired through a wall into the meeting room and then burst into the room itself, guns blazing. Three people died, and two sustained wounds before citizens attending the meeting restrained hi...
Michael Byrden, Sales Director of ACT, considers the convergence of facility management. He describes how ACT, the access control manufacturer, has acquired a VMS and analytics development house in order to unify security solutions and bring customers nearer to the goal of a truly intelligent building. Desire for open systems Major acquisitions have been dominating the news recently and, even if this lays me open to a charge of naivety, I genuinely believe that they aren’t predatory. As...
ASSA ABLOY discussed the importance of securing the critical infrastructure, the building and beyond, at a media press conference April 15 on the opening day of ISC West 2015 in Las Vegas. Martin Huddart, president of ASSA ABLOY’s Access and Egress Hardware Group, based in New Haven, Conn., outlined some of the current and future objectives of the company, which continues to fine-tune its global leadership in door opening solutions while playing a significant role in the future of access...
Online wireless locks enable real-time online access control functionality Organisations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customised system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...
According to ASSA ABLOY the market knows less about wireless locks Let’s begin with something that’s hardly front-page news: the market potential for wireless access control is huge. At January’s Intersec exhibition forecasts of 15% annual growth in the Middle East region alone were suggested. ASSA ABLOY’s own data predicts that wireless locks could make up 30% of the total market within a decade. The potential is there. Market knows less about wirele...
Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...
Questions surrounding the Germanwings Airbus A320 air crash centre not just on mental health, but on a topic we deal with daily – access control. According to the flight recorder, the co-pilot of the doomed aircraft locked himself alone in the cockpit and deliberately slammed the plane into the side of a mountain in the French Alps, killing himself and 149 people. Early in the investigation and based on incontrovertible evidence from the flight recorder, Brice Robin (a prose...
According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal 22 percent or so. According to research firm IHS, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015. Perhaps this increase is due in part to the rise of interactive ser...
CPTED focuses on designing crime prevention into buildings and campuses In recent years, jurisdictions across the United States have enacted ordinances or codes requiring the use of Crime Prevention Through Environmental Design (CPTED). Enforcement of these measures arises through required jurisdictional review and approval of CPTED measures in the design drawings. CPTED has emerged in recent years as an effective crime prevention and security technique that focuses on design...
Airports, metro systems and other transportation centres must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to match specific risk levels by incorporating PIN and biometric verification for higher security. HID Global’s IP-based networ...
Suffice it to say 2014 was a pivotal year for the majority of alarm dealers and installers. Many have had to change their way of thinking and their method of doing business, while adapting to ever-changing technology. But those who continue to reinvent their go-to-market model prove that the integration business is the place to be – and there’s money to be made, albeit it not in simply installing boxes and hardware. In fact, that mind-set changed several years ago, and...
The growing market for legal marijuana (now available in some form in 24 states) has also generated a demand for security products and service to protect the industry from illegal activities. “For the most part, companies are looking for what we call the traditional surveillance systems whereby you have visible deterrence,” says Monty Henry, president of DPL-Surveillance-Equipment.com LLC in Ventura, Calif. Many companies are seeking more sophisticated systems t...
Emerging trends include cyber security, mobile, physical access control and The Internet of Things Viscount 2014/2015 Review and Forecast: At the enterprise level, spending on physical security continues to be a challenge. Companies have to do more with less, become more strategic about security investments, focus on better situational intelligence, predictive analytics, better utilisation of IT resources and infrastructure, and shift from just integration strategies to more...
Credential form factors include mobile devices that provide a better way to open doors HID Global 2014/2015 Review and Forecast: High-profile credit card breaches during 2014 raised the profile of low-security solutions while highlighting the need for more secure smart cards. There were no real surprises, as the industry steadily continued its large-scale transition to access control platforms based on open standards. This transition sets the stage for unprecedented innovatio...
Big Data is a challenge that emerging technologies are working to address Quantum Secure 2014/2015 Review and Forecast: As demonstrated by end users’ continued desire to identify and implement technologies that provide the greatest level of protection for people, property and assets, it’s clear that security will always be a necessity. Today, customers demand strong, demonstrable ROI from those technologies and expect solutions to align with their overall business...
2014 saw more organisations making data-driven decisions with insight or foresight provided by intelligent analysis of the data Morse Watchmans 2014/2015 Review and Forecast: 2014 saw a year of continued change in the security marketplace. A healthier economy triggered growth in new projects and helped loosen the purse strings for capital expenditures. From a technology standpoint, the industry evolution to a more network-centric environment created additional opportunitie...
Open standards for access control and integration will offer end users far greater levels of choice ASSA ABLOY 2014/2015 Review and Forecast: Editor’s Note: This article is based on Mr. Bone’s answers to several questions about the 2014/2015 Review and Forecast posed by SourceSecurity.com. We will continue to see a two-speed economy in general terms in Europe in the New Year, with the northern countries doing well and the southern countries continuing to be d...
Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillanceas it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...
The Security Girl has become much more than a brand for American Fire & Security In the security industry, you want to be different, and what’s more memorable than a company avatar turned ambassador that sports some rockin’ pink hair? Only The Security Girl’s hairdresser knows for sure! Erica Wood, chief security officer and co-owner of American Fire & Security (AF&S) in Dayton, Ohio, is a mover and shaker of the security industry in many ways. S...
It used to be that the word “lockdown” was only ever used in reference to an emergency protocol to restrict movement in a prison environment. Today however, the term is in common usage in educational and other environments to describe measures taken under certain conditions of threat. In this article, Fernando Pires, VP of Sales and Marketing at Morse Watchmans, explains that lockdowns, along with building evacuation and sheltering procedures, are an integral part of a...
The biometric card provides an easy, low cost way for facilities to provide a biometric upgrade A convenient way to establish higher security within certain areas of a building is an appealing idea to many security directors. Whether it’s to more highly secure the pharmacy lab at a hospital, the laboratory at a government research facility or the tarmac at a small airport, some locations simply need to have more scrutiny paid to who is entering. Going beyond the card onl...
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download