Brivo Systems Access Control Panel 

Brivo’s ACS5008 panel is an addition to the company’s ACS5000 line of control panels, which can accommodate up to 30 doors for each main panel connection. The new panel offers more flexibility to users with four to eight readers. ...

Biometric Software Secures Credit Card Purchases 

Trying to remember dozens of Personal Identification Numbers (PINs), passwords and credit card numbers could soon become a thing of the past, thanks to...

One-of-A-Kind Keys 

Maintaining building security for the large and growing University of North Carolina's historic Chapel Hill (UNC-CH) campus is a continuing job that requires...

Access (And Cost) Control 

When Parkadon Management Inc., a property management company specializing in Federal Section 8 housing, was looking to upgrade its access control management...

Business Management Botching Access Control, Survey Says 

Polled about their organization's approaches to identity and access management, audit and compliance professionals in industry and government expressed a high level of frustration with how their IT and business management units are managing IAM.
Almost half (45 percent) of the 845 respondents questioned by the Ponemon Institute for the research study released today said their own organization does not effectively focus its IAM policies and controls on areas of business risk.
The compliance professionals, 68 percent of whom said IAM products were in use in their organizations, also expressed frustration that IT and business management groups weren't collaborating well in deploying IAM....

Dortronics Standalone Access Control System 

The EZ-Access Control System from Dortronics Systems Inc. is a door/gate access control system with audit trail that is suitable for in/out control of two independent doors with one reader each or one door with two readers. It is equipped with two heavy-duty SPDT 10-amp relays, one for each controlled door or gate. ...

SimonsVoss Biometric Transponder 

The BT1 Biometric Transponder from SimonsVoss Technologies is an RF-based transponder that replaces mechanical keys by requiring a fingerprint to unlock a door. It can store up to six authorized fingerprints. For authentication, users push the button and swipe a finger across the sensor. ...

Sagem Morpho Biometric Smart Card Reader  

The MorphoAccess 120 W (MA120 W) contactless smart card reader from Sagem Morpho Inc. is capable of reading and processing the entire Card Holder Unique Identifier (CHUID). It can operate in a variety of identification modes, including non-PIV environments or multifactor authentication, offering a storage capacity of two biometric templates per person. ...

Smart Technology In The Office Opens Back Doors 

Information is routed in huge amounts through networked printers, copiers and scanners every day, moving hard-copy data into information technology systems and putting digital data onto paper. And although most federal agencies have been working hard to secure their systems, little thought has been put into securing these devices, according to Government Computer News.
The potential problem of smart peripherals has developed gradually, as stand-alone scanners, faxes and copiers have been integrated into online printers. Not only are these peripherals privy to sensitive information, they often have their own IP addresses and can be vulnerable to network attacks. ...

Day-Care Centers Look To Security 

Biometrics is being used in at least two Broward County day-care centers, reports the South Florida Sun-Sentinel.
"Parents love it," says Renee Johnson, district manager of Tutor Time Child Care, which uses the biometric system in its centers in Pembroke Pines and Plantation, Fla. "The parents say, 'This is technology beyond belief.' When we get phone call inquiries or give tours, the biggest question parents ask, 'Is my child safe?'"
Security is a growing concern at day-care centers, which confront issues ranging from custody disputes to the threat of child abductions and terrorism. Today, many day-care centers monitor or restrict access to their buildings by using digital keypads or swipe cards, door buzzers and surveillance cameras, features rarely seen a decade ago....

How Vulnerable Are Access Card Systems? 

According to a researcher who spoke and demonstrated his methods at the DEF CON hacker conference last weekend, a range of access card readers designed to grant or deny entry to office buildings, airport terminals and other sensitive areas are inherently insecure and easy to hack, reports The Washington Post.
Researcher Zac Franken showed how to use an ordinary proximity card -- a common ID access card that transmits encoded data as a radio frequency signal when waved in front of a reader -- in combination with a tiny programmable chip to gain access to restricted areas protected by any card reader that uses a Wiegand communications standard, according to The Washington Post....

Technology Gets Wired 

By Stephanie Silk

A large water treatment facility in Southern California has to protect a 25-million-gallon reservoir with three drinking water walls, 7 tons of chlorine...

An ROI On Wireless 

By Lester Lapierre

The value proposition for implementing wireless access control systems in a variety of applications is compelling. Wireless systems use less hardware...

New System Identifies Handwriting 

Whether its perfect penmanship or chicken-scratch, handwriting could provide an effective form of online security.
With a new authentication program called Dynahand, users are not required to remember passwords or invest in costly biometric devices, such as a fingerprint scanner. They just need to be able to recognize their own handwriting.
"I know it's my handwriting, but I don't know how I know. I can't explain to somebody else how I do it," says Karen Renaud, a computer scientist and lecturer at Glasgow University in the U.K....

Easy Access A Top Reason For Employee Fraud 

More than half of financial institutions surveyed see organized crime, increased employee access to technology and poor hiring/screening practices as the main contributors to employee fraud, according to a peer-review survey from Actimize, provider of transactional risk management software for the financial services industry.
Seventy-seven percent of respondents see employee fraud becoming more sophisticated while almost the same number, 73 percent of respondents, rate the finance industry's readiness to tackle the employee fraud problem as poor to somewhat acceptable. Of those who knew, 50 percent said they have had a case of data theft in the last year and their average "largest employee fraud" incident uncovered in the last five years was $874,961, while the single largest theft reported was $6,000,000....

Reports Show Electronic Access Control, Biometric Sales To Grow 

Driven by the threat of terrorism, the need for securing business assets and employees and a stringent legislative environment, the market for electronic access control systems is set to reach $6.1 billion by 2010, according to a report by Global Industry Analysts Inc.
Even with maturity in the industrial, residential and commercial sectors, sales of electronic access control systems is one of the fastest growing sectors of the security industry. There is also a growing demand for heterogeneous technologies for security applications, and RFID technology is expected to contribute to market expansion. ...

The Essentials of Badging and ID Solutions 

By Bill Kiechafer

Much has been said and written recently about emerging technologies in the security industry, including the convergence of physical security and information...

Help When It's Needed 

Among the areas of highest risk for violence in hospitals are mental health units, emergency departments, waiting areas and geriatric units, according...

The Danger of (In)destruction 

By Ashley Roe

A year ago, electronic data disposal at Memorial Hospital in Pawtucket, R.I., was rather primitive in light of current Health Insurance Portability and...

RFID Awakens 

By Michael Fickes

Radio Frequency Identification (RFID) technology isn't just for paying highway tolls anymore. A new RFID world is emerging, and it may offer a host of...

Extreme Locking 

In the aftermath of Hurricane Katrina, many vending machines in New Orleans belonging to Whitener Snacks Inc., Norco, La., were under water for three...

Smart Card Alliance To Address Effects Of HSPD-12 at ISC 

The impact of the federal government's Homeland Security Presidential Directive 12 (HSPD-12) on identity management systems and physical access control will be the focus of the Smart Card Alliance's presence at this week's ISC West Conference, taking place Wednesday through Friday at the Sands Expo and Convention Center in Las Vegas
Members of the Smart Card Alliance Physical Access Council will present a panel discussion titled "Migration of Physical Access Control Systems Based on the Impact of Government HSPD-12" on Wednesday from 10 a.m. to noon.
The panelists include Bob Gilson, Department of Defense (DoD) Manpower Data Center (DMDC) Access Card Office; Patrick Hearn, Oberthur Card Systems; Dwayne Pfeiffer, Northrop Grumman Corp.; Roger Roehr, Tyco Fire & Security; and Lars Suneborn, Hirsch Electronics....

Identity Management Suite from Lenel Systems International Inc. 

The IdentityDefender from Lenel Systems International Inc. issues identity credentials ...

Interoperable Smart Card Readers from HID Global 

The FlexSmart Series from HID Global is an ISO 14443A-compliant series of contactless smart card readers that includes three lines. ...

Contactless Smart Cards from IDenticard Systems 

The IDentiSMART smart cards from IDenticard Systems use MIFARE contactless smart card standard technology and can be combined with biometric readers, magnetic stripe or barcode technologies. The cards have a memory and read/write capability to store photos, names, employee numbers, access codes, biometric templates and other data. They are available in a variety of sizes and can be produced on inkjet or laser printers. The cards can also be integrated into existing access control systems without the need to rebadge users. ...

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next

Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top