Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.
Unlike other standard reader products, the 82 series from RF Ideas does not use key stroking to send the card’s data. Instead, it uses a callable DLL for non-key stroking so that you can integrate reader functions into existing software programs.
The C•CURE 9000 SiteServer from Software House is a compact, network device that provides a full-featured, low-cost access control solution for small applications, such as K-12 schools, satellite offices and retail stores.
I love tailgating. I tailgate at my own institution and try to tailgate at others, even at corporate sites. Yet, I strongly disapprove of tailgaters and the practice in general. Of course, I’m referring to the practice of tailgating into a secured space or building, whether it’s a facility protected by standard locks and keys, guard stations, or electronic card access. Tailgating is the act of following an authorized individual into a protected/secured space by one who is not authorized to enter that space or perhaps, just that particular entrance or space.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!