Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Access Management

Information related to the system that enables a security leader to control access to areas and resources in their enterprise.

ARTICLES

Upgrading Security by Migrating from Keys to Cards, Apps and More

Imagine the day when you can check-in and choose your hotel room using your mobile phone. You may soon be able to do that at Hilton hotels, as the chain says it will offer digital check-in and room selection at 11 of its brands, across more than 4,000 properties.


Read More

TV Station Upgrades with Visitor Management System

Over the past 15 years the visitor management market has evolved from a simple “hello my name is” label to roaming officers processing visitors with 4G-enabled tablets and evacuation systems

Employees are currently able to pre-register guests both from their desktop and from their home computer or laptop. KGW is collaborating with Veristream to work on an app that will also allow them to do it from their cellphones in the near future.


Read More

5 Categories for Better Individual Door Choices

By looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analyzing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike.
Read More

Hilton to Replace Hotel Room Keys with Smartphones

Hilton announced an initiative that will let guests access their rooms using their smartphones instead of key cards.


Read More

Securing Prisons with Unified Access Control

For most people, prison ranks high on the list of places that you’d like to avoid. But

Security enterprise leaders are looking for the most simple, cost-effective manner to accomplish this, including finding a stable and cost-effective platform to move towards.


Read More

Protecting SMB Investments with Electronic Access Control

Keys can be copied, codes can be shared, and investments can be lost

With programmable automatic locking from RS2 and local integrator Kendell Doors, however, Shanks can program the building’s doors to lock and unlock during various community or extracurricular events on the campus.


Read More

How to Protect an Ever-Expanding Perimeter

Four New York-area men were arrested after a BASE jumping stunt from atop One World Trade Center.

The museum’s exhibits guide visitors along an interactive walk that reveals the unique influences and challenges that shaped George Bush’s life and presidency. Visitors can explore and learn about the most important events of the 20th century, from World War II through the Persian Gulf War.


Read More

AG Holder Wants Gun Owners to Wear Tracking Bracelets

Attorney General Eric Holder said that gun tracking bracelets are something the Justice Department (DOJ) wants to "explore" as part of its gun control efforts.


Read More

Banking Battlegrounds: Cyber and Physical Security Risks Today

What reporting strategies should your enterprise adopt?

How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.


Read More

To Build or To Buy: Solutions to Access Management Software Dilemmas

To build or to buy is a question that must be answered when an enterprise contemplates new technology to gain efficiency, improve productivity, bring down the cost of operation or improve their strategic advantage.
Read More

EVENTS

Webinar

Best practices for creating a safe campus environment using Integrated Surveillance Technology

8/19/14
Online!
Contact: Adam Thomas

On Demand Sprawling, campus-like properties pose unique security challenges. This webinar will address why a layered approach is best when addressing the needs of campus security, as it relates to a wide range of verticals, including corporate, municipal, healthcare, hospitality and education.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security Magazine 2014 September cover

2014 October

Security takes a look at safety and preparedness for the harshest of weather phenomena in this October 2014 edition of the magazine. Also, we investigate supply chain security and the many benefits of PSIM. 

Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.