Access Management

Information related to the system that enables a security leader to control access to areas and resources in their enterprise.

ARTICLES

5 Categories for Better Individual Door Choices

By Karen Keating
No Comments
By looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analyzing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike.
Read More

Hilton to Replace Hotel Room Keys with Smartphones

No Comments

Hilton announced an initiative that will let guests access their rooms using their smartphones instead of key cards.


Read More

Securing Prisons with Unified Access Control

For most people, prison ranks high on the list of places that you’d like to avoid. But
By Diane Ritchey
No Comments

Security enterprise leaders are looking for the most simple, cost-effective manner to accomplish this, including finding a stable and cost-effective platform to move towards.


Read More

Protecting SMB Investments with Electronic Access Control

Keys can be copied, codes can be shared, and investments can be lost
By Claire Meyer
No Comments

With programmable automatic locking from RS2 and local integrator Kendell Doors, however, Shanks can program the building’s doors to lock and unlock during various community or extracurricular events on the campus.


Read More

How to Protect an Ever-Expanding Perimeter

Four New York-area men were arrested after a BASE jumping stunt from atop One World Trade Center.
By Diane Ritchey
No Comments

The museum’s exhibits guide visitors along an interactive walk that reveals the unique influences and challenges that shaped George Bush’s life and presidency. Visitors can explore and learn about the most important events of the 20th century, from World War II through the Persian Gulf War.


Read More

AG Holder Wants Gun Owners to Wear Tracking Bracelets

No Comments

Attorney General Eric Holder said that gun tracking bracelets are something the Justice Department (DOJ) wants to "explore" as part of its gun control efforts.


Read More

Banking Battlegrounds: Cyber and Physical Security Risks Today

What reporting strategies should your enterprise adopt?
By Ed Finkel
One Comment

How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.


Read More

To Build or To Buy: Solutions to Access Management Software Dilemmas

By Ajay Jain
No Comments
To build or to buy is a question that must be answered when an enterprise contemplates new technology to gain efficiency, improve productivity, bring down the cost of operation or improve their strategic advantage.
Read More

Building Improved Value through Access Control Innovations

By Robert Laughlin
No Comments
The landscape for professional security systems continues to change rather rapidly. Network platforms have driven demand for new systems that are more highly integrated and scalable and provide users with new and exciting functionality designed to improve overall situational awareness and security.
Read More

4 Stages to Evaluating and Choosing a New Security System

By Kim Rahfaldt
No Comments
It’s time to invest in a security system or upgrade that legacy system from 1990. How does an organization decide what system to choose? What are the steps to take? Who should be involved?
Read More

EVENTS

Best practices for creating a safe campus environment using Integrated Surveillance Technology

8/19/14
Online!
Contact: Adam Thomas

On Demand Sprawling, campus-like properties pose unique security challenges. This webinar will address why a layered approach is best when addressing the needs of campus security, as it relates to a wide range of verticals, including corporate, municipal, healthcare, hospitality and education.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

August 2014

2014 August

In the August issue of Security Magazine, read about the public-private partnerships and the future of DHS with Frank Taylor, sneak a peek at the ASIS 2014 security products, and read a special report on cyber risk and security. Also in this issue find out why America is in desperate need of a CSO and the most common mistakes in Cyber incident response. The security game has dramatically changed since September 11th, read about what enterprises are doing to keep Americans safe and sound.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+