Access Control
A key segment of the security industry, access control solutions include those technologies and measures that control access and enable legitimate entry to a physical or logical resource. Many SIA members manufacture, integrate, distribute or service access control technologies, and as such the association places a high priority on following trends, developments and innovations in the area.
SIA Member Exchange: Securing Data Centers with DIRAK
A classified military command center in the Washington, D.C. area faced challenges in securing its data centers. It could not remodel or build more room, so it required a security solution that fit within its current footprint. The command turned to DIRAK, a German company with U.S. headquarters in Sterling, Virginia, to solve the problem.…
Keep Reading »SIA Member Saves Lives: Calpipe Bollards Halted Times Square Rampage
Last week, a driver under the influence drove his car into Times Square in New York City, killing one person and injuring about 20 others. The incident was a chilling reminder of how vulnerable pedestrians are to a vehicle used as a weapon, an avowed tactic of terrorists seeking to kill or injure innocent bystanders.…
Keep Reading »How IoT Allows for Physical Access Integration into 6 Layers of IT Systems
Physical security and IT systems are better together—as explored in this post. But until recently, a specific concept on how to approach the obvious on a technical level was missing. In this blog, we explore the concept of physical security running like an app on the IT infrastructure and what that would mean in terms…
Keep Reading »SIA New Member Profile: VuTeur
VuTeur, based in Austin Texas, offers internal real-time intelligence software using two-way communication and analytics in coordination with existing physical security systems including access control, video surveillance, intercoms, intrusion detection, emergency management systems and more. The software, like the company, is called VuTeur. To learn more about it, SIA caught up with VuTeur CEO Jana Rankin. Visit the company’s…
Keep Reading »By the Power of Ethernet
PoE gives smaller facilities more access control options Physical electronic security for non-enterprise applications is now as simple as tapping into the nearest Ethernet connection to power and control doors via web browser and low-voltage access and egress devices. There are a variety of cost-effective, code-compliant, low-power solutions for electronic access control of door openings…
Keep Reading »More than Just a Silver Lining
Using the cloud for access control enhances scalability, availability, resiliency, flexibility and security The power of the public cloud has become a catalyst for a dramatic shift in the information systems and security worlds. On-premises solutions no longer exist in many domains, from customer relationship management to expense management to human resources systems to learning…
Keep Reading »A Matter of Trust
New digital identity technologies will increase security, functionality, and convenience in many areas A shift in the use of identity technology is leading to increased adoption of mobile devices and the latest smart card technology, a greater emphasis, and reliance on the cloud, and a radical new way of thinking about trust in smart environments…
Keep Reading »Walk this Way, Talk this Way: Using Multiple Biometrics
Combining gait analysis, voice recognition and other biometric identifiers provides a fraud-resistant security solution According to the statistics, terror attacks are continuing to climb as political climates heat up and radicals look for security weaknesses they can exploit to further their messages globally. The list of cities that have fallen victim to major attacks keeps…
Keep Reading »SIA New Member Profile: STid
STid is an internationally recognized company and one of the leading developers of contactless identification solutions using RFID, NFC and Bluetooth® Smart technologies. For over 20 years, STid has been inventing smart solutions designed for secure access control and to provide tracking for assets in extreme environments such as the aerospace, energy and defense industries.…
Keep Reading »How Hackers Attack Physical Access Control Systems
As physical access control system (PACS) technologies continue to advance, so do attackers. While card cloning can be effective, entry isn’t always gained with this method alone. Attackers are beginning to move beyond the card to the technology that supports it. At ISC West on April 6 from 12:30-1:30 p.m., Valerie Thomas, Executive Security Consultant…
Keep Reading »