Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Physical » Access Management

Access Management
Access Management RSS Feed RSS

The Identification and Control of Fraudulent Behavior

Bernard Scaglione
September 6, 2011
The Association of Certified Fraud Examiner’s (ACFE) 2010 Report to the Nations on Occupational Fraud and Abusecompiled 1,843 cases of occupational fraud worldwide between January 2008 and December 2009. The survey estimated that a typical organization lost 5 percent of its annual revenue to fraud with a median loss of $160,000; nearly one-quarter of the frauds involved losses of at least $1 million.
Read More

Tech’s Yesterday, Today and Tomorrow

zalud-2016-200px.jpg
Bill Zalud
September 1, 2011
Pastor Darryn Scheske welcomes most everyone to his Heartland Church in Indianapolis, everyone except troublemakers. So working with a parishioner, the Church mixed tried and true with newer access technologies to make the campus safe and secure as well as caring.


Read More

Safety in the Cloud - Best Practices for Private and Public Models

Lucas Roh
August 8, 2011
With market analysis firm International Data Corporation (IDC) predicting $72.9 billion in cloud-related revenues by 2015, the cloud as the preferred storage and application environment is the future. Additionally, the IDC study indicates that by 2015, spending on public cloud services will account for nearly half of the net new growth in overall IT spending. This spending includes money spent on application development and deployment, infrastructure, storage, and servers.
Read More

Hybrid Portable Access Control

August 3, 2011

Smarti® Hybrid is a portable access control, presence tracking and building automation solution. 


Read More

Not KIDding About Security

Sophisticated access control systems are increasingly becoming a first line of defense when protecting children in hospitals and schools.
Cindy H. Dubin
August 1, 2011

This September will mark the 10th anniversary of 9/11 and some security pros fear that the worst could be yet to come. “Our view is that the goal of terrorists is to beat the devastation they caused on September 11, 2001, and one way to do that is to go after our children,” says Alan J. Robinson, director, Protection and Security Services/CSO, Atlantic Health, Morristown, NJ. “Topping the events of 9/11 is difficult to replicate; unfortunately, in order to exceed or even match the shock and awe of 9/11, terrorists must target a population so vulnerable it restores their reputation as a terrorist organization.”


Read More

Solves Access Control Problems in Parking Garages

July 19, 2011

Create an access management system that is tailored to the exact requirements of each area of your operation, whether on or off site…from protecting parking meter cash to auditing collection routes to controlling traffic to your buildings. 


Read More

Losing $2 Billion

Bernard J. Scaglione
July 1, 2011

Sony’s PlayStation Network is reported to have 70 million registered users worldwide. On May 2, 2011, Sony issued a statement that 12,700 credit cards and 24.6 million user accounts were compromised. The stolen data included names, addresses, dates of birth, passwords, security questions and answers and credit card information. This compromise is said to be one of the largest and most high-profile online data thefts to date.


Read More

High Tech Security That Fits in A Wallet

Sue Marquette Poremba
July 1, 2011

The University of Arizona, like major research universities across the country, found that many of its grants and contracts were tied to higher levels of access security. Access to buildings with old-fashioned keys and locks or cards with magnetic strips swiped into pin pads didn’t provide the amount of security the University was looking for. So the school made the switch to smart cards.


Read More

Sentries to Officers: Guardhouses Diversify

zalud-2016-200px.jpg
Bill Zalud
July 1, 2011

Do you think that keys and locks are the oldest man-made security tool? Forget it. Guardhouses go back hundreds, if not thousands of years as a place a person would sit or stand, observe, control access, alert others and take occasional action such as dumping hot oil over the wall. These permanent and temporary structures, built in or brought in, are used in most every country. 


Read More

Workplace Violence Prevention Revisited

Bernard J. Scaglione
June 6, 2011

In July 2010 I wrote about workplace violence within the healthcare industry in this column. The main focus was a document that was published by The Joint Commission titled, “Preventing violence in the health care setting.” I also discussed OSHA document 3148, “Guide for Preventing Workplace Violence for Healthcare Workers and Social Service Workers.” Both documents serve as a guide in the implementation of a workplace violence reduction program. In the column I stressed the need to install physical barriers in order to control access within specific areas of the facility. In addition, I emphasized the need to control visitors into the facility through the use of a visitor management system.


Read More
Previous 1 2 … 169 170 171 172 173 174 175 176 177 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing