Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Keywords: » electronic access control

Items Tagged with 'electronic access control'

ARTICLES

reader-enews

4 Cross-Departmental Benefits of Electronic Access Control

Greg Rewers
August 15, 2017
To date, the shift from traditional locks and keys to electronic access control systems for cabinets has focused on mitigating security vulnerabilities and risks.
Read More
Electronic Access Control Tailors Security Protocols, Boosts User-Friendliness

Electronic Access Control Tailors Security Protocols, Boosts User-Friendliness

Facilities of all stripes, ranging from churches and school districts, to healthcare centers to manufacturing plants, continue to move from hard keys to electronic access, or to upgrade their existing electronic access systems.
Ed Finkel
January 1, 2017

Along with the holy grail of tighter overall security, the benefits of electronic access control systems include a better handle on who’s coming and going, the ability to restrict access to certain times and places depending on a person’s function in the organization, the ability to remotely control access, the extra assurance a company or organization can give its customers, and the lack of need for rekeying doors or replacing lost keys.


Read More
IP Feature

Gaining Value Through IP Access Control Upgrades

zalud-2016-200px.jpg
Bill Zalud
October 1, 2015

Wait no longer – Proven IP access management solutions are becoming more available and practical.


Read More
door_900

5 Common Types of Unauthorized Access and How to Combat Them

Robert Laughlin
September 15, 2015
Before you evaluate or purchase an access control system, it is critical to have a good understanding of what you need such a system to do.
Read More
School shooting security

Using Automation for Improved Lockdown Abilities

Claire Meyer
February 1, 2015

Of the hundreds of school shootings that have taken place in the last 50 years, only a few have involved the attacker having to physically break into the building, either through a window or – as in the case of the Sandy Hook Elementary School shooting – through a glass door. While there is technology available to mitigate that risk even further (including several brands of bullet- and impact-resistant glass), Advanced Data Risk Management LLC President and school security consultant Dan O’Neill says that perimeter security should only be one factor in eliminating easy targets for active shooters.


Read More
Mike Grupe, Director of Security at Williamson Medical Center in Franklin, Tennessee.

Upgrading Security by Migrating from Keys to Cards, Apps and More

Sarah Ludwig
October 1, 2014

Imagine the day when you can check-in and choose your hotel room using your mobile phone. You may soon be able to do that at Hilton hotels, as the chain says it will offer digital check-in and room selection at 11 of its brands, across more than 4,000 properties.


Read More
accesscontroldoors

5 Categories for Better Individual Door Choices

Karen Keating
August 12, 2014
By looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analyzing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike.
Read More
ASSA ABLOY

Offers Keyless Alternative for Glass Openings

From Adams Rite, an ASSA ABLOY Group Company
July 1, 2014

Installation does not require any holes or modifications to the door, and the lock offers flexible access control with single or double glass door compatibility and dual credential access control via card reader or personal PIN code.


Read More
Smart Cards

Future-Proofing with Smart Card Investments

The buzz around the Vanderbilt University Medical Center was that proximity cards were the next step in hospital security and data protection
Claire Meyer
June 1, 2014

While the system is indeed better protecting patient information, enabling students to access dormitories and laundry rooms, and even presents the possibility of connecting with point of sale systems across both the university and hospital campuses, one measurable impact of swapping technologies is the reduction in maintenance. 


Read More
migrating feat

Migrating from Keys: It’s All in the Journey

When “Do Not Duplicate” is not working as a key control strategy, perhaps it’s time to consider switching to electronic access control solutions.
zalud-2016-200px.jpg
Bill Zalud
November 5, 2013

 Among the worst things to hear: “I can’t find the master key.” Whether lost or stolen, that situation triggers a long and expensive process of rekeying. Perhaps this is the last straw pushing your enterprise toward an electronic access control solution. 


Read More
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing