Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Physical » Access Management

Access Management
Access Management RSS Feed RSS

Boon Edam Circlelock Security Portal with Internal Biometrics.jpg

Making the Security Case to the C-Suite

Greg Schreiber.jpg
Greg Schreiber
May 27, 2020

Perhaps the most significant security advancement made at the enterprise level over the last two decades has not been technology, but rather its perception.


Read More
The Los Angeles Airport police have a full-time emergency services unit armed with rifles and a tactical team that provides protection in those areas along with patrol officers

Addressing Terrorism and Crime in Your City: Why the Public and Private Sectors Need to Work Together

Giovanni Gaccione
Giovanni Gaccione
May 26, 2020
All too often, business leaders, city planners, fire departments, and law enforcement focus on their mandates to the exclusion of others. Unfortunately, this approach can lead to a breakdown in communication and missed opportunities. In the worst cases, it can create a lapse in security that could make their city and its citizens vulnerable to criminal activity and terrorist attacks. But, by eliminating these silos and fostering strong communication, stakeholders can share information that allows them to quickly address evolving situations.
Read More

Is Your Security Guard Good Enough? Why Many Protection Agents Need More Training

Jonathan McKee
Jonathan McKee
May 26, 2020
What makes a quality security guard? What skills and traits embody someone that you would want to entrust with your life or the lives of your family? Most fail to realize that so much more goes into the making of a true professional protection agent than just an intimidating look and a gun. There is certainly more to it than the minimum standards required for licensure.
Read More
cloud-enews

Haven't Considered Cloud? Now may be the Time

Per Björkdahl
May 26, 2020
Ready or not, cloud is already making its impact on the industry. While it’s not a new technology to the industry, it continues to see growth, driven by growing possibilities in the IoT space. Security end users and their organizations are shifting to truly embrace the cloud, with worldwide spending on public cloud services and infrastructure forecasted to reach $210 billion in 2019 – an increase of 24 percent over 2018. Cloud services can provide benefits not only to large enterprise organizations, but small and mid-sized businesses as well by providing cost-effective solutions and increased flexibility.
Read More
Edgar Rodriguez

Edgar Rodriguez Named Interim AVP for Public Safety and Chief of Police for Oregon State University

May 26, 2020

Edgar Rodriguez has been named Interim AVP for Public Safety and Chief of Police for Oregon State University.


Read More
fingerprint1-900px.jpg

NIST Study Measures Performance Accuracy of Contactless Fingerprinting Tech

May 22, 2020
The National Institute of Standards and Technology (NIST) has evaluated several commercially available contactless fingerprint scanning technologies to compare their performance.
Read More
airport2-900px.jpg

TSA Announces New Security Screening Procedures

May 22, 2020

Scan your own boarding pass, separate your food and practice social distancing are things travelers should expect to do at airport checkpoints in response to the coronavirus pandemic, according to the Transportation Security Administration.

 


Read More
The Future of Mobile Credential Standards

CISA Releases Identity, Credential and Access Management Fact Sheet

May 22, 2020

CISA released the Identity, Credential and Access Management (ICAM) Pilot for Public Safety overview fact sheet to introduce ICAM and provide high-level observations from two 2019 public-safety focused ICAM Demonstrations. 


Read More
Air Canada

AirCanada Introduces CleanCare+ Program

May 22, 2020

Air Canada announced the launch of Air Canada CleanCare+, a program for personal safety and enhanced aircraft grooming.


Read More
Airplane

Bill Would Restrict Purchases of Airport Passenger Boarding Equipment from Chinese Companies

May 20, 2020

Congressmen Ron Wright (TX-06) and Marc Veasey (TX-33) introduced H.R. 6917, the bipartisan Airport Infrastructure Resources (AIR) Security Act to prevent China, and their state-sponsored enterprises to infiltrate critical systems and carry out espionage and intellectual property (IP) theft. 


Read More
Previous 1 2 … 58 59 60 61 62 63 64 65 66 … 176 177 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing