<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Access Management</title>
    <description>
      <![CDATA[Information related to the system that enables a security leader to control access to areas and resources in their enterprise.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2232-access-management</link>
    <language>en-us</language>
    <item>
      <title>Beyond Locking Doors</title>
      <description>
        <![CDATA[<p>How access control data can support operational improvements.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102197</guid>
      <pubDate>Mon, 30 Mar 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102197-beyond-locking-doors</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-F3-Feat-Slide1-1170x658.webp?t=1774442739" type="image/jpeg" length="75767"/>
    </item>
    <item>
      <title>Enhancing Incident Response with Integrated Access Control and Video Verification</title>
      <description>
        <![CDATA[<p>Evolving threats have security teams on alert to integrate solutions that both mitigate and combat different scenarios.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102145</guid>
      <pubDate>Fri, 27 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102145-enhancing-incident-response-with-integrated-access-control-and-video-verification</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F3-Feat-Slide1-1170x658.webp?t=1772642385" type="image/jpeg" length="161473"/>
    </item>
    <item>
      <title>From the Outside In: A Smarter Approach to Vendor Access</title>
      <description>
        <![CDATA[<p>Modern access control strategies are shifting focus to vendors, contractors, and the perimeter itself.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102141</guid>
      <pubDate>Wed, 25 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102141-from-the-outside-in-a-smarter-approach-to-vendor-access</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0226-F4-Feat-Slide1-1170x658.webp?t=1772642386" type="image/jpeg" length="72673"/>
    </item>
    <item>
      <title>How to Ensure Security Barriers Don't Become Guest Barriers</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Balancing security and the guest experience can be difficult. But, if implemented effectively, visitor management systems and processes can benefit the guest experience rather than hinder it.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102031</guid>
      <pubDate>Fri, 05 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102031-how-to-ensure-security-barriers-dont-become-guest-barriers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Edu-Feat-Slide1-1170x658.webp?t=1768469521" type="image/jpeg" length="133142"/>
    </item>
    <item>
      <title>What Can Security Leaders Learn from Charlie Kirk’s Shooting?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>The killing of Charlie Kirk shocked the nation, and many leaders are sharing their thoughts from the perspective of event security and executive protection. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101931</guid>
      <pubDate>Thu, 25 Sep 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101931-what-can-security-leaders-learn-from-charlie-kirks-shooting</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/24/Officers-at-an-event-by-Illumination-Marketing.webp?t=1761294785" type="image/png" length="475324"/>
    </item>
    <item>
      <title>How AI-Driven PIAM+ Unlocks Predictive Intelligence for the Modern Enterprise </title>
      <description>
        <![CDATA[<p>AI-powered PIAM+ helps security teams stay ahead, not just keep up.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101897</guid>
      <pubDate>Wed, 10 Sep 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101897-how-ai-driven-piam-unlocks-predictive-intelligence-for-the-modern-enterprise</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/09-September/SEC-0925-F4-Feat-Slide1-1170x658.webp?t=1757439561" type="image/jpeg" length="101913"/>
    </item>
    <item>
      <title>Why It’s Time to Move on From Legacy Access Control Systems</title>
      <description>
        <![CDATA[<p>Upgrading to a modern, unified access control system isn’t just about keeping pace with technology — it’s about building a security foundation that can adapt as your organization grows and changes.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101895</guid>
      <pubDate>Wed, 10 Sep 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101895-why-its-time-to-move-on-from-legacy-access-control-systems</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/09/bernard-hermant-Hd0m_5-OyCw-unsplash.webp?t=1757440293" type="image/jpeg" length="209362"/>
    </item>
    <item>
      <title>Transforming Higher Ed Safety and Efficiency with Cloud-Based Access Control</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">As colleges and universities look for ways to streamline operations and better protect students and faculty, it’s clear that fragmented, manually intensive access control systems are no longer sustainable.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101811</guid>
      <pubDate>Mon, 11 Aug 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101811-transforming-higher-ed-safety-and-efficiency-with-cloud-based-access-control</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/07/31/University-classroom-by-Changbok-Ko.webp?t=1755104662" type="image/png" length="480255"/>
    </item>
    <item>
      <title>No Smoke, Just Signals: Iris Recognition for Cannabis Compliance</title>
      <description>
        <![CDATA[<p>How biometric access delivers airtight control and audit-ready visibility in the tightly regulated cannabis industry.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101813</guid>
      <pubDate>Wed, 06 Aug 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101813-no-smoke-just-signals-iris-recognition-for-cannabis-compliance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/08-August/SEC-0825-F2-Feat-Slide1-1170x658.webp?t=1755104663" type="image/jpeg" length="147155"/>
    </item>
    <item>
      <title>The Key to Efficient Hospitality Operations</title>
      <description>
        <![CDATA[<p>Rather than relying on outdated systems like peg boards and handwritten logs, hospitality managers are increasingly adopting intelligent key cabinets integrated with centralized access control platforms.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101767</guid>
      <pubDate>Fri, 18 Jul 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101767-the-key-to-efficient-hospitality-operations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/07-July/SEC-0725-Edu-Feat-Slide1-1170x658.webp?t=1753309214" type="image/jpeg" length="122541"/>
    </item>
    <item>
      <title>Pushing Mobile Access to New Levels of Operational Efficiency</title>
      <description>
        <![CDATA[<p>It has been over a decade since the first mobile access solutions began transforming how the world operates — including how people gain access to secured doors, gates, networks, services and more.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101771</guid>
      <pubDate>Thu, 17 Jul 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101771-pushing-mobile-access-to-new-levels-of-operational-efficiency</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/07/16/Silhouette-of-hand-holding-phone-by-Lorin-Both.webp?t=1753309213" type="image/png" length="182978"/>
    </item>
    <item>
      <title>Product Spotlight on Risk Monitoring</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine has highlighted a few recently released risk management products.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101714</guid>
      <pubDate>Mon, 23 Jun 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101714-product-spotlight-on-risk-monitoring</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/06-June/SEC-0625-ProdSpot-Feat-Slide1_1170x658.webp?t=1755104664" type="image/jpeg" length="93654"/>
    </item>
    <item>
      <title>Why Visitor and Contractor Management is Critical in Busy Facilities</title>
      <description>
        <![CDATA[<p>Though essential to daily operations, temporary populations can become a security blind spot.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101666</guid>
      <pubDate>Wed, 04 Jun 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101666-why-visitor-and-contractor-management-is-critical-in-busy-facilities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/06-June/SEC-0625-F2-Feat-Slide1-1170x658.webp?t=1749783377" type="image/jpeg" length="72626"/>
    </item>
    <item>
      <title>Outdated Security, Overlooked Costs: Why Multifamily Properties Must Modernize Now</title>
      <description>
        <![CDATA[<p>Many properties still rely on brass keys, manual processes, and disconnected digital tools, all of which appear functional but quietly create operational drag.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101654</guid>
      <pubDate>Thu, 29 May 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101654-outdated-security-overlooked-costs-why-multifamily-properties-must-modernize-now</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/05/28/Apartment-building-by-Sigmund.webp?t=1749783376" type="image/png" length="637335"/>
    </item>
    <item>
      <title>Protecting 14 Campuses, All With Different Needs</title>
      <author></author>
      <description>
        <![CDATA[<p>Protecting 14 campuses and learning centers is almost herculean. But that’s what the security team of Portland Community College (PCC) in Portland, Oregon does for one of the Northwest’s largest college systems.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101640</guid>
      <pubDate>Fri, 23 May 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101640-protecting-14-campuses-all-with-different-needs</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/05/19/Campus-building-Courtesy-of-AMAG-Technology.webp?t=1748510906" type="image/png" length="729420"/>
    </item>
    <item>
      <title>Product Spotlight on Access Control</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a variety of access control products.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101602</guid>
      <pubDate>Fri, 09 May 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101602-product-spotlight-on-access-control</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/05-May/SEC-0525-ProdSpot-Feat-Slide1_1170x658.webp?t=1746459405" type="image/jpeg" length="126885"/>
    </item>
    <item>
      <title>Bored locks with visual status indicators: Elevating security and privacy in 7 key everyday spaces</title>
      <description>
        <![CDATA[<p>Bored locks with visual status indicators elevate security and privacy in everyday spaces.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101458</guid>
      <pubDate>Tue, 11 Mar 2025 23:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101458-bored-locks-with-visual-status-indicators-elevating-security-and-privacy-in-7-key-everyday-spaces</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/03-March/SEC-0325-Bored-Feat-Slide1-1170x658.webp?t=1742174588" type="image/jpeg" length="37104"/>
    </item>
    <item>
      <title>Manage external and internal threats to commercial spaces</title>
      <description>
        <![CDATA[<p>An extensive security strategy for commercial buildings must balance defenses against external vulnerabilities with targeted measures to neutralize internal risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101454</guid>
      <pubDate>Mon, 10 Mar 2025 23:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101454-manage-external-and-internal-threats-to-commercial-spaces</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/03-March/SEC-0325-Buildings-Feat-Slide1-1170x658.webp?t=1741621173" type="image/jpeg" length="193226"/>
    </item>
    <item>
      <title>The new standard in facility protection: Enhancing perimeter security</title>
      <description>
        <![CDATA[<p>Perimeter protection is essential for organizations across all sectors, serving as the first line of defense against potential threats.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101425</guid>
      <pubDate>Fri, 28 Feb 2025 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101425-the-new-standard-in-facility-protection-enhancing-perimeter-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/02/26/martin-olsen-szfPB4X-FWk-unsplash.webp?t=1740802514" type="image/jpeg" length="143936"/>
    </item>
    <item>
      <title>Top challenge for 57% of end users is outdated physical security or IT</title>
      <author></author>
      <description>
        <![CDATA[<p>A new report&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">details shifts in the physical security industry, especially in regard to priorities and challenges.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101304</guid>
      <pubDate>Mon, 20 Jan 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101304-top-challenge-for-57-of-end-users-is-outdated-physical-security-or-it</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/01/17/Security-guard-in-hallway-by-Izzuddin-Azzam.webp?t=1739985925" type="image/png" length="320589"/>
    </item>
    <item>
      <title>Keys and vehicle barriers: A unified approach to protection</title>
      <description>
        <![CDATA[<p>Evaluating and updating vehicle barriers mitigates risk and provides peace of mind.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101273</guid>
      <pubDate>Thu, 09 Jan 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101273-keys-and-vehicle-barriers-a-unified-approach-to-protection</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/01-January/SEC-0125-Vehicle-Feat-Slide1-1170x658.webp?t=1737205399" type="image/jpeg" length="160459"/>
    </item>
    <item>
      <title>Security design: Important points of protection in a building</title>
      <description>
        <![CDATA[<p>Just as a chain is only as strong as its weakest link, a building with a single unaddressed weak point is vulnerable no matter how well fortified it is everywhere else.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101169</guid>
      <pubDate>Wed, 06 Nov 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101169-security-design-important-points-of-protection-in-a-building</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/31/Rows-of-cubicles-UNSPLASH.webp?t=1731098762" type="image/png" length="640466"/>
    </item>
    <item>
      <title>60% of organizations manually gather employee data</title>
      <author></author>
      <description>
        <![CDATA[<p>According to a recent Envoy report, shifting workplace dynamics such as hybrid work policies have led to outdated data management processes. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101090</guid>
      <pubDate>Fri, 11 Oct 2024 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101090-60-of-organizations-manually-gather-employee-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/10/03/nelly-antoniadou-9X1P46Y2KJo-unsplash.webp?t=1727963779" type="image/jpeg" length="162413"/>
    </item>
    <item>
      <title>Four cybersecurity best practices for keeping heads above the cloud</title>
      <description>
        <![CDATA[<p>When organizations rely heavily on their cloud providers’ security controls, IT leaders need a way to decrease the likelihood of a cloud-based breach.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101019</guid>
      <pubDate>Fri, 06 Sep 2024 08:57:10 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101019-four-cybersecurity-best-practices-for-keeping-heads-above-the-cloud</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/09/06/luca-bravo-9l_326FISzk-unsplash.webp?t=1725768074" type="image/jpeg" length="86056"/>
    </item>
    <item>
      <title>Managing the invisible risk of non-human identities</title>
      <description>
        <![CDATA[<p>While organizations often excel at managing human identities, many need to pay more attention to a growing and potentially more hazardous category of digital actors known as non-human identities. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101001</guid>
      <pubDate>Wed, 04 Sep 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101001-managing-the-invisible-risk-of-non-human-identities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/09/03/Man-working-on-computer-at-sunrise-UNSPLASH.webp?t=1725768076" type="image/png" length="456952"/>
    </item>
    <item>
      <title>The future of security and access control for office spaces</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security </em>talks with Andrew Campagnola about emerging threats in office building security and how security leaders can address these concerns. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100929</guid>
      <pubDate>Mon, 19 Aug 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100929-the-future-of-security-and-access-control-for-office-spaces</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/08/06/SEC_Web_5Minutes-Campagnola-0824_1170x658.webp?t=1724459677" type="image/jpeg" length="96084"/>
    </item>
    <item>
      <title>Why insider attacks are indicative of a need for security convergence</title>
      <description>
        <![CDATA[<p>In order to use security convergence to combat the growing threat of insider attacks, one must first understand key facts about the issue. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100891</guid>
      <pubDate>Tue, 13 Aug 2024 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100891-why-insider-attacks-are-indicative-of-a-need-for-security-convergence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/07/29/Single-jigsaw-piece-UNSPLASH.webp?t=1726354283" type="image/png" length="358575"/>
    </item>
    <item>
      <title>The imperative of fortifying police stations with secured entry solutions</title>
      <description>
        <![CDATA[<p>Law enforcement agencies must prioritize the implementation of tailored solutions to safeguard their personnel, assets and the communities they serve.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100900</guid>
      <pubDate>Tue, 06 Aug 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100900-the-imperative-of-fortifying-police-stations-with-secured-entry-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/08-August/SEC-0824-Solutions-Feat-Slide1-1170x658.webp?t=1723450274" type="image/jpeg" length="83411"/>
    </item>
    <item>
      <title>New report identifies top 5 trends in physical access control </title>
      <author></author>
      <description>
        <![CDATA[<p> A new report reveals five notable trends that may indicate the future of access control technology. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100905</guid>
      <pubDate>Fri, 02 Aug 2024 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100905-new-report-identifies-top-5-trends-in-physical-access-control</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/08/01/Do-not-enter-sign-UNSPLASH-.webp?t=1722522435" type="image/png" length="608820"/>
    </item>
    <item>
      <title>AI is coming for company credentials — Here’s how to fight back</title>
      <description>
        <![CDATA[<p>Where businesses see AI as a tool for efficiency and market differentiation, cyber attackers are devising new schemes to exploit undefined learning curves. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/100874</guid>
      <pubDate>Wed, 24 Jul 2024 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/100874-ai-is-coming-for-company-credentials-heres-how-to-fight-back</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/07/23/Blue-lightbulbs-with-one-red-UNSPLASH.webp?t=1721758957" type="image/png" length="231077"/>
    </item>
  </channel>
</rss>
