Access Management

Tailgating: A Common Courtesy and a Common Risk

 Tailgating is one of the most common and innocent security breaches – an employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker. The problem with these lax situations and common courtesy is that they open your building to undocumented and unauthorized entry by individuals who could intend harm to your property and employees.  


Read More

Access Control: What’s on the Horizon

To find out what’s happening currently and what to expect on the horizon for the access control industry, Jason Ouellette, Tyco Security Products’ Product Line Director for Access Control, answers some questions about whether these general trends toward adaptability, interoperability, unification and integration are infiltrating the access control world and talks about what we can expect to see next in access control.
Read More

Using Smartphone-Based Access Control to Keep Students Happy

 Vanderbilt University has earned many distinctions, including Princeton Review’s top ranking for colleges with the happiest students. The school’s latest endeavor is taking the plunge and going mobile with access control.  


Read More

Starwood Rolls Out Smartphone Hotel Key

Starwood Hotels and Resorts became the first chain to let guests bypass the desk and unlock their room doors with their phones.


Read More

Upgrading Security by Migrating from Keys to Cards, Apps and More

Imagine the day when you can check-in and choose your hotel room using your mobile phone. You may soon be able to do that at Hilton hotels, as the chain says it will offer digital check-in and room selection at 11 of its brands, across more than 4,000 properties.


Read More

TV Station Upgrades with Visitor Management System

Over the past 15 years the visitor management market has evolved from a simple “hello my name is” label to roaming officers processing visitors with 4G-enabled tablets and evacuation systems

Employees are currently able to pre-register guests both from their desktop and from their home computer or laptop. KGW is collaborating with Veristream to work on an app that will also allow them to do it from their cellphones in the near future.


Read More

5 Categories for Better Individual Door Choices

By looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analyzing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike.
Read More

Hilton to Replace Hotel Room Keys with Smartphones

Hilton announced an initiative that will let guests access their rooms using their smartphones instead of key cards.


Read More

Securing Prisons with Unified Access Control

For most people, prison ranks high on the list of places that you’d like to avoid. But

Security enterprise leaders are looking for the most simple, cost-effective manner to accomplish this, including finding a stable and cost-effective platform to move towards.


Read More

Protecting SMB Investments with Electronic Access Control

Keys can be copied, codes can be shared, and investments can be lost

With programmable automatic locking from RS2 and local integrator Kendell Doors, however, Shanks can program the building’s doors to lock and unlock during various community or extracurricular events on the campus.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

security 2015 january cover

2015 January

In the January 2015 issue of Security, learn how PTZ and fixed dome cameras do dual duty in video production and surveillance applications, improve security on college campuses, and how to better cope with harsh environments in surveillance. 

Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.