Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Physical » Access Management

Access Management
Access Management RSS Feed RSS

Cultural site in China installs Bosch intrusion detection system for added security without taking away cultural integrity of site

One of China's most visited cultural sites installs high-tech intrusion system

March 11, 2021

One of China's most visited cultural sites: the Mausoleum of Qin Shihuangdi in the city of Xi'an needed a comprehensive security alarm upgrade. The site is visited by thousands of people each day and call for an unobtrusive, yet effective intrusion detection system that reliably alerts security staff to potential incidents, while still allowing tourists to see the integrity of the site.


Read More
identity management freepik

Moving from ‘working at from home’ to a hybrid work experience

Nelson Cicchitto
Nelson Cicchitto
March 11, 2021
Identity management has become a focal point for enterprise security. With the 2020 COVID-19 pandemic and the scramble to support work-from-home employees, the real threat to business data assets, whether in the enterprise or the cloud, has become unsecured remote access.
Read More
ASSA ABLOY supplies rugged pdlocks to protect BP alternative energy critical infrastructure locations

BP Alternative Energy wind farms install rugged padlocks to protect critical infrastructure

March 10, 2021

bp Alternative Energy wind farms have implemented a number of rugged padlocks to protect the turbines themselves and the junction boxes that house power cables. But not all padlocks are created equal, especially for these critical infrastructure locations which have several challenges, including extreme elements and remote locations.


Read More
mass notification- freepik

Saving time and effort during lockdowns with mass notification

PatScheckel
Pat Scheckel
March 9, 2021
The risks that come with having an ineffective lockdown plan became painfully evident following the events at the U.S. Capitol building on Jan. 6. While the people inside the building were ushered to safety, the building itself was breached and overrun resulting in theft, building damage, injury and even death. It was clear that while the notification side of an emergency plan can be useful, its effectiveness only goes so far if it is not working in tandem with other physical security measures.
Read More
Aiphone installed at new jersey catholic school

Roselle Catholic High School in New Jersey installs new intercom system with emergency communications and lockdown features.

March 5, 2021

Roselle Catholic High School in Roselle, New Jersey recently received a grant to upgrade security measures, allowing the school to implement a new intercom system with emergency communications and lockdown features.


Read More
Montgomery County EOC-1

Delivering an effective emergency operations center

Jon Litt
Jon Litt
March 2, 2021
Emergency operations centers (EOCs) are critical decision-making environments. It is vital that these centers have effective, reliable, intuitive technology to allow organizations to collate and interpret data, as well as plan and execute an appropriate emergency response to situations that can pose a danger to life, often with multi-agency involvement. So, when carrying out systems integration in an EOC space where the stakes are so high, how do you ensure you make the correct technology choices? Jon Litt, Senior Manager, Business Development, Government Solutions (US) at Christie highlights how the mission of the EOC is the number one factor to keep in mind.
Read More
Phoenix Suns Arena deploys x-ray technology for added security layer

Phoenix Suns Arena deploying x-ray tech for added security

February 24, 2021

The Phoenix Suns Arena will install 26 X-ray inspection systems, adding a new layer of protection to attendees against potential threats such as weapons and explosives. It also will help intercept other prohibited items, and reduce hands-on searches.


Read More
us-capitol

Family affiliated extremism and the siege at the U.S. Capitol

Dean C. Alexander
February 22, 2021

Some 200 individuals have been charged with federal offenses connected to the siege at the U.S. Capitol on January 6, 2021. Among them are at least 15 examples of family affiliated extremism. These instances include: five sets of husbands and wives; two cases of fathers and sons, mothers and sons, brothers, and cousins; and an instance of father/daughter and brother/sister participation. Although of a different strain and less serious offenses—none specifically terrorism nor involving murder —such kin-connected radicalism is neither a new phenomenon nor one unique to the United States or elsewhere. 


Read More
video collaboration

Effective video collaboration: What you need to consider before investing in a system

Jon Litt, Senior Manager, Government Solutions (US) at Christie shares his five key considerations to ensuring an impactful, efficient professional video collaboration solution.
Jon Litt
Jon Litt
February 22, 2021
Having a secure and efficient video collaboration system has evolved from a ‘useful to have’ technology to an indispensable capability in 2020, allowing teams to feel more connected to remote locations and distributed team members. With travel restrictions and social distancing limiting in-person meetings, remote face-to-face video communication is more imperative than ever in security environments. Systems integrators around the globe have been upgrading technologies to support the mission of operators. Before you work with an integrator to either upgrade an existing video collaboration system or invest in a new one, there are a host of considerations. Below are the key ones that will help you with your conversations with the systems integrator.
Read More
Neiman Marcus Group upgrades access control software platform

Neiman Marcus Group implements cloud-based access management software solution

February 18, 2021

The Neiman Marcus Group Inc., needed an access management software solution that could work with the retailer's existing access control technology, while allowing it to add new technology and sites into the future.


Read More
Previous 1 2 … 41 42 43 44 45 46 47 48 49 … 176 177 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing