This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Building on their widespread use and popularity as a security management tool, key control systems’ functionality has been expanded to include custom modules and lockers that can accommodate plastic card keys or other valuable items.
Two topics that I can never discuss enough are the reduction of violence and the use of access control and identification as a major component utilized to reduce violence. A few months ago there was another devastating shooting in the U.S.: the Aurora, Colo., movie theater shooting that killed 12 people and injured more than 50.
After a young man shot more than 70 people in a Colorado movie theater in July, many companies of all types and sizes have since re-evaluated their access control systems. And for businesses deemed “challenging to control,” finding the right solution can make all the difference in protecting your assets – whether property or people.
It was about 4:30 a.m. in Oak Ridge, Tenn., when sensors on the perimeter intrusion detection and assessment system alarmed. There was an unauthorized entry into a high-security, protected area. A well-trained and heavily armed guard force responded.
In August 2010, the International Association for Healthcare Security & Safety (IAHSS) published a survey of healthcare security executives which revealed an increase in violent crimes within the reporting hospitals.
The problem is ageless – you want outstanding security to protect your organization’s assets, but where does the money come from? CSOs across the globe have to petition their CFOs and other C-suite executives for appropriate funding to meet compliance requirements, keep software up to date and, generally, keep the right doors closed.