Pilot programs at Netflix and Good Technologies have proved successful for Near-Field Communication technology, including access control via smartphone.
Building on their widespread use and popularity as a security management tool, key control systems’ functionality has been expanded to include custom modules and lockers that can accommodate plastic card keys or other valuable items.
Two topics that I can never discuss enough are the reduction of violence and the use of access control and identification as a major component utilized to reduce violence. A few months ago there was another devastating shooting in the U.S.: the Aurora, Colo., movie theater shooting that killed 12 people and injured more than 50.
After a young man shot more than 70 people in a Colorado movie theater in July, many companies of all types and sizes have since re-evaluated their access control systems. And for businesses deemed “challenging to control,” finding the right solution can make all the difference in protecting your assets – whether property or people.
It was about 4:30 a.m. in Oak Ridge, Tenn., when sensors on the perimeter intrusion detection and assessment system alarmed. There was an unauthorized entry into a high-security, protected area. A well-trained and heavily armed guard force responded.
The Portsmouth Naval Shipyard is getting a state-of-the-art security gate to blend into the environs and control inbound and outbound traffic to the high-security facility.
In August 2010, the International Association for Healthcare Security & Safety (IAHSS) published a survey of healthcare security executives which revealed an increase in violent crimes within the reporting hospitals.