Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Physical » Access Management

Access Management
Access Management RSS Feed RSS

Why Two-Factor Authentication is a Statistical Necessity

Greg Sarrail
June 25, 2013
To minimize risk, two-factor authentication has become a necessity and is now generally being adopted. Two-factor authentication is the combination of two out of the three possible methods (something you know, something you have, something you are).
Read More

19th Century Courthouse Goes Digital with Cloud-Based Access Control

June 20, 2013

The Old Lake County Courthouse (or "The Grand Old Lady") was erected in 1878, but recent renovations led to the space's use as retail and offices, as well as a functioning courtroom, all operating with standard locks and keys. This is where the problems began.


Read More
Security key pad

Vancouver Reviews School Access Control after Newtown

June 12, 2013

Locking all exterior doors, even excepting the main entrance, is a bad move from a first responder standpoint, says the Vancouver report.


Read More

How GTRI Practices Could Protect Schools from Violence

Bernard Scaglione
June 11, 2013
As all security experts know, one of the basic principles utilized in securing buildings or institutions is controlling access onto the property and into building by using basic security measures such as security officers, fencing, bars on windows or electronic access control systems.
Read More
Security key pad

How to Converge PSIM and PIAM for Total Situational Awareness

Ajay Jain
May 14, 2013
As companies grow, security becomes both a bigger challenge and a more urgent concern. Companies typically add new security systems as they grow, often resulting in an assortment of disparate systems that lack centralized management.
Read More
No Nuclear Power Plant Incident is Minor

Lemonade Pitcher of Goldfish in Security Breach

Now Reviewing Video in Investigation
May 7, 2013

They did not swim in. Two goldfish have been found swimming in slightly radioactive water in a lemonade pitcher inside a secure area of the Perry nuclear power plant, Perry, Ohio.


Read More

How Australia’s Westfield Shopping Centers Control and Monitor Key Access

April 25, 2013

The Westfield name in retail is synonymous with high quality properties that offer an efficient and dynamic environment for retailers and a quality shopping experience for consumers.


Read More

Adding Value with RFID, Prox, Contactless Innovations

zalud-2016-200px.jpg
Bill Zalud
April 1, 2013

Beyond physical access control, technology that includes proximity, RFID and contactless smartcards, readers and their system platforms is moving outward to a diversity of business missions.


Read More

Getting Buy-In for Remote Access

Claire Meyer
April 1, 2013
What do a small, private college in New England and a multi-airport department in Florida have in common? Remote Access Control.
Read More

Bill Introduced to Improve Courthouse Security

March 25, 2013

U.S. Sen. Angus S. King Jr. is cosponsoring bipartisan legislation to improve security at smaller courthouses.


Read More
Previous 1 2 … 159 160 161 162 163 164 165 166 167 … 176 177 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing