Access Control
The Future Of Electronic Access Control: Two Perspectives
As part of our continuing coverage of the future of access control, Ledger technical editor Jerry Levine asked both a representative from an electronic access control company and an experienced locksmith to share their perspectives on the future of electronic access control (EAC). Following are the Ledger’s questions and answers from Bruce Lindstrom, Northeast regional sales manager for Salto Systems, and Glenn Younger, co-owner of Grah Safe and Lock. Q & A: Bruce Lindstrom What do you see as the future of electronic access control? Please discuss new products, credentials and software. Salto will continue to develop new locking devices to help reduce the number of mechanical keys required in a facility so that everyone uses their credential instead of metal keys. Salto has released a number of new products, which utilize a low- cost electronic cylinder for use in mortise and rim cylinders and electronic padlocks. Recent releases include a wireless cylinder, a rack server handle and an electronic cam lock. Electronic locks have been released for securing many smaller cabinets and lockers. For new credentials, the obvious pick here is the expansion of Near Field Communications (NFC) technology into the U.S. market. This Smartphone technology has been utilized in Europe and the Pacific Rim where Salto has been shipping NFC-capable locks for over half a dozen years. Here in the United States, it means your Smartphones with enabled NFC will replace credentials and credit cards. This is a technology shift. After all, who leaves home without […]
Source www.locksmithledger.com
Washington Naval Yard Shooting – Case Analysis – Utica College
On 16 September 2013, Aaron Alexis conducted a mass shooting in Building 197 at the Washington Navy Yard. He was a lone shooter killed by police after killing 12 and injuring 8. There were former instances of misconduct and mental issues. These are not considered in issuance of Common Access Card (CAC) or clearance. There were poor installation access control and building security procedures seen as contributing factors. The Attack and Defense Scenarios analyze two main issues. Issue 1: • Could the attack have been substantially more lethal if the shooter had pre-planned and preositioned additional key attack elements thereby increasing the efficiency of the attack? • Could the attack be a diversionary tactic to draw attention away from the true reason, data breach of classified information? Issue 2: • Could the risk of an attack been reduced through a layered defense implementation of X-ray machine/metal detector suites, more security cameras with facial recognition capabilities, and increased access controls (biometrics or improved identification badging)? Analysis of the issues result in the following risk assessment values: • Initial Risk Assessment (Baseline) = 18% • Attack Boost (Worst Case) = 12% increase • Defense Boost (Best Case) = 14% decrease • After applying the Ryan-Nichols Equation the NET value requires $2.28Million dollars to mitigate the risk of the attack • Implementation of multilayered defense with enhanced access control systems and procedures are recommended Read the rest in the downloadable PowerPoint show file here: http://treadstone71llc.files.wordpress.com/2013/11/washingtonnavalyardshooting-caseanalysis.ppsx http://programs.online.utica.edu/programs/masters-cybersecurity.asp
Source blogs.csoonline.com
Identive To Hold Third Quarter 2013 Conference Call
SANTA ANA, Calif. and ISMANING, Germany, Oct. 31, 2013 (GLOBE NEWSWIRE) — Identive (Nasdaq: INVE ); (Frankfurt:INV) will hold an audio webcast and conference call to discuss the results of its 2013 third quarter on Thursday, November 7, 2013, at 5:00 PM Eastern time. Jason Hart, CEO, and David Wear, CFO, will host the webcast and conference call for financial analysts and investors, which will be followed by a Q&A. The webcast and conference call will be open to all interested investors . The audio webcast can be accessed by visiting the Investor Relations section of the Company’s website at www.identive-group.com , and clicking on “Presentations, Reports & Webcasts.” The conference call can be accessed by dialing 888.771.4371 (toll free within the U.S.) or +1 847.585.4405 (for international callers) and using passcode 36033941. For those unable to attend the live webcast, it will be archived following the event for 30 days in the Investor Relations section of the Company’s website. A replay of the call will be available for one week and can be accessed by dialing 888.843.7419 (toll free within the U.S.) or +1 630.652.3042 (for international callers) and using passcode 36033941. About Identive Group Identive Group, Inc. (Nasdaq: INVE ); (Frankfurt:INV) provides products and solutions that address the markets for identity management, physical and logical access control, NFC solutions and a host of RFID-enabled applications for customers in the government, enterprise, consumer, education and healthcare sectors. CONTACT: Identive: Darby Dye, +1 949 553 4251, [email protected] Lennart Streibel, […]
Source www.benzinga.com
Diebold Secures Pueblo Viejo Gold Mine
Advanced security solutions protecting one of world’s largest mines October 31, 2013 — NORTH CANTON, Ohio , Oct. 31, 2013 /PRNewswire/ — Diebold, Incorporated (NYSE: DBD) is helping secure one of the largest gold mines in the world. Operated by Pueblo Viejo Dominicana Corporation (PVDC), the Pueblo Viejo mine, located in the Dominican Republic , has proven and probable gold reserves of 25.0 million ounces. To secure this high-value site, Diebold installed and implemented advanced video surveillance , access control , intrusion detection and perimeter monitoring systems. The company integrated these systems via a customized software application, enabling on-site security personnel to efficiently monitor the entire property in real time. (Logo: http://photos.prnewswire.com/prnh/20080725/DIEBOLDLOGO ) PVDC is a joint venture between gold producers Barrick Gold Corporation and Goldcorp Inc. It achieved commercial production in January 2013 and has a projected life of more than 30 years. Diebold Secures Pueblo Viejo Gold Mine “As a vast gold reserve, the Pueblo Viejo mine requires numerous electronic security solutions to protect the site’s assets,” said Marshal Valentine , country security manager. “Diebold’s integrated solutions have provided a way to actively and intelligently monitor the entire site, enhancing security from the perimeter to individual locations inside the property.” For the site’s video surveillance system, Diebold installed more than 300 cameras and multiple digital video recorders. In addition, Diebold created a fully equipped command center where security personnel can monitor video images from across the site and automatically view video feeds associated with any alarm event. […]
Source www.itbusinessnet.com
CSC Continues Acquisition Track With ServiceMesh Deal
John Madden Summary CSC announced more than a year ago that it would reorganize and reinvest in strategic areas to spark additional growth, and the company has been true to its word. The vendor’s recently announced acquisition of ServiceMesh, a 140-person, privately funded cloud management and brokerage company, is CSC’s third deal in a year – made possible by cost-cutting and shedding some business in order to build up resources and free cash. This deal augments CSC’s overall cloud initiatives, particularly in how it accelerates CSC’s internal IP efforts around cloud orchestration and management. Acquisitions focused on building capabilities in strategic growth areas CSC unveiled its acquisition of ServiceMesh as part of its mixed Q2 earnings announcement. This is the second deal for the outsourcer in the last three months, and its third deal in a year – which is notable, as CSC has been very acquisition-averse in the past. All of these deals are to bolster CSC’s IP and capabilities in its strategic growth areas, which include cloud and Big Data/analytics as top priorities. The first two deals were focused on Big Data. First, in October 2012, CSC acquired 42Six Solutions, a software development company specializing in data processing and analytics for US government intelligence agencies and for the US Department of Defense. Secondly, in August 2013, CSC enhanced its Big Data practice with a deal for Infochimps, a small, privately held company known for its automated framework for elastic scaling of Hadoop, NoSQL, and stream processing analytics […]
Source ovum.com
IMRON Corporation Integrates Bosch Security Systems GV4 Series Control Panels
Photo: PRWeb IMRON Corporation proudly announced that IS2000, its powerful access control platform designed to manage different security devices and systems into a single intuitive user interface, now integrates with the Bosch GV4 Series Control Panels. Proving yet again that IMRON Corporation continues to provide comprehensive security solutions. Irvine, California (PRWEB) October 31, 2013 IMRON Corporation , a leading provider of security management solutions, announced the integration with the Bosch GV4 Series Control Panels. IMRON Corporation’s flagship product, IS2000 , integrates with this new platform using its open architecture interface. The G Series Control Panels by Bosch combine intrusion, fire and access control in one system. The hardware flexibility allows users to grow with additional intrusion and fire requirements. The IS2000 integration with the G Series Panels allows users to retain GV3 panels and expand with the newer GV4 control panels. Thus reducing hardware replacement costs of legacy installations. The IS2000 support of the GV4 panels rounds off a complete solution for intrusion/fire that integrates cohesively with access control. IS2000 is a world-class access control platform that offers users many options through integration with the industry’s most trusted brands. Employ comprehensive solutions for access control with features that support sites from office buildings, banks, retail, community facilities to airports, multi-tenant facilities, and hospitals. Use wired or wireless solutions for cost-effective site installation and management. Powerful control with an intuitive interface, IS2000 provides the most extensive integrated platform in the industry. About IMRON Corporation Founded in 1997, IMRON Corporation is […]
Source www.sfgate.com
Oil and Gas Security Market – Including Physical Security Forecasts & Analysis (2013 – 2018)
[October 28, 2013] Oct 28, 2013 (M2 PRESSWIRE via COMTEX) — Oil and gas security market is expected to experience significant growth over the coming years due to the growing demand for energy. It has thus forced the companies to expand their existing infrastructure and also deal with a variety of security challenges such as terrorist attacks, criminal activities and global competition. This report on oil & gas security focuses on such technologies and products that are needed to protect the existing and future infrastructure. Few of the unconventional technologies mapped in this report include over & under water surveillance, long range sonar and radar systems and video surveillance using thermal cameras. Oil & gas pipeline security and the transportation security are required to ensure the smooth operation of energy industry, and are expected to drive the oil & gas market. This report focuses on the protective measures and solutions that need to be taken to protect the energy providers and resources against the threats such as attacks on supply infrastructure, accidents, natural and unnatural disasters and rising terrorism and cyber attacks. It also provides insights into the various intelligent security solutions which enable the providers to integrates collect and analyze the network through the data generated by their Supervisory Control and Data Acquisition (SCADA) networks and grids. The report broadly comprises of oil and gas security segments: physical security solutions, network security solutions; by types of applications: exploration and drilling, refining and storage and transportation, pipeline and distribution; […]
Source www.tmcnet.com
HID Global Sees Gradual Shift From Smart Cards to NFC
With NFC on access control, it will be able to drive to a level of critical acceptance Interviews | by Sharath Kumar BANGALORE, INDIA: We are about to embark on a new generation of access control technology in which mechanical keys – and even plastic smart cards – are either replaced – or at least, augmented — by digital keys and portable digital identity credentials that can be securely provisioned onto NFC-enabled smartphones and other mobile devices. In an interaction with CIOL, Ranjit Nambiar, director of sales, India and SAARC, HID Global shared insights on applications of NFC technology day-to-day businesses that are set to take off in India. Excerpts: CIOL: Can you share with us your journey from RFID cards to NFC Ranjit Nambiar: HID Global comes with an identity security background, which means, we are into the business of basically securing identities. Identities could be in any form. It could be in biometrics, access control, IT authentication, card control. If you look at the core of our technology, most of the solutions of what we have, Radio-frequency identification (RFID) is one of them. We extensively use RFID with respect to secure identity solution. We have other businesses also, which are non RFID centric. It’s a secure identity business with RFID as a core technology is what we use. We have come out with a new series of physical access control readers which are NFC enabled. The platform is called the ICLASS SE. ICLASS is a brand of […]
Source www.ciol.com
Upgrading Access Control At Vanier College
Residential Commercial Product Information eLearning Courses Promotions Archives Newsletter Subscribe INSIDEOUT > Archived Articles > Canadian Architect Newsletter Articles > Upgrading Access Control at Vanier College Upgrading Access Control at Vanier College C.E.G.E.P. Vanier is a junior college in the Montréal area, whose student population numbers over 6,700 full-time diploma students with an additional 4,000 students attending through the Continuing Education Department. Recent security threats at similar schools nearby initiated a request to equip every corridor and classroom with new, improved locks. This is not an easy job with buildings dating back to the 1890s. Situated on an oasis of green in the Borough of Saint-Laurent of the City of Montreal, the College-Ste. Croix Campus occupies property and 11 buildings purchased by the government from the Soeurs de Sainte-Croix who previously operated a convent and a private women’s college in the location. Some of the buildings date back to the nineteenth century and have undergone considerable renovations over the years to accommodate the changing needs of post secondary education. We already had Schlage CL & CM standalone access control locks system in place that read magnetic cards. So, when the request for tighter security came into our office, we responded by bringing in the Schlage AD-400 Series wireless locks. One reason was that the newly adopted (2010) smart cards that we use are open architecture MIFARE® cards. Since the AD-Series is also based on an open architecture, we would not need to switch out our […]
Source www.doorsecurity.ca
NIST Report Reflects Increasing Need for ABAC Then Over-Engineers Its Deployment
by Andy Han The National Institute of Technology and Standards (NIST) held a conference a few months back on Attribute Based Access Control (ABAC). The primary objective of the conference was to promote a special publication on ABAC and the event brought together leaders from various government programs, technology vendors, industry analysts and subject matter experts on authorization and access control. The event and paper are recognition that the adoption of ABAC is accelerating and that we needed to put in writing a shared understanding of when and how to deploy ABAC. There was agreement on the central of the drivers for the adoption of ABAC: Organizations, including the federal government, need to govern how information is shared across systems, applications, and organizations. The document’s purpose is thus to (1) establish a standard definition of ABAC and a description of its functional components and (2) provide “planning, design, implementation, and operational considerations for employing ABAC within a large enterprise with the goal of improving information sharing while maintaining control of that information” (vii). ABAC is endorsed by NIST as the best approach for this particular challenge because of the fundamentals of its design. ABAC allows organizations to pass attributes back and forth as information is shared across application, infrastructure, and organizational boundaries. Access control policies use those attributes to evaluate the relationships between subjects and objects and determine whether to allow an action. One of the core technical benefits of ABAC, according to the report, is “ABAC avoids the […]
Source nextlabs.wordpress.com
Legendary Finis Conner Back With New BluStor Secure Smart Card
BluStor unveiled a mobile security platform that protects the full stream of mobile security: device, user, and data. To share its vision for what’s possible using BluStor, the company has launched a new website and video. Countries in Europe and the Middle East, Asia, India, South America are seeking a platform that can provide secure […]
International City: No Access Card, No Entry
Dubai: A new access system that went live last Sunday in several clusters of Nakheel’s sprawling International City are proving to be a bane rather than a boon, residents told XPRESS. The new security feature, launched by regulatory authority Trakhees earlier this year, is estimated to affect thousands, including residents, restaurant, laundry and grocery delivery boys. Most of them have spoken out in unison against the new restrictions. Syrian Fadi Mohammad, a tenant in the Persia Cluster who owns a fast food joint in the adjoining France Cluster, is ill at ease with the new system on both counts. “I have yet to get an access card. It’s not my fault. My landlord hasn’t paid his service fees. It’s been a struggle to get into my apartment ever since this new system began a few days ago,” he says. “I am also at the receiving end as a service provider. My delivery boys end up spending more time as customers have to come down and open the doors to collect their orders,” he adds. Another Syrian resident, Loy, says his neighbour had to wait for almost 20 minutes for someone to arrive before he could enter the building around midnight after work because there was no watchman on duty at that time. When XPRESS checked, watchmen said they were letting in guests and delivery boys to avoid initial hiccups during their duty hours. Indian Pankaj Kumar who owns a one-bedroom apartment in the England Cluster, says acquiring a card […]
Source gulfnews.com
MasterCard Certifies OTI?s ?Wave? NFC Device, Paving Way Toward Greater NFC Adoption Of Wallet-less World
MasterCard Certifies OTIs Wave NFC Device, Paving Way Toward Greater NFC Adoption and a Wallet less World The Wave is the industry’s first audio jack plug-in NFC payment solution and the only to receive certification from a major payment company like MasterCard. Based on OTI’s patented NFC technology, the compact Wave dongle is device agnostic, easily plugging into any smartphone, tablet or PC, allowing users to pay with their device while enjoying real-time benefits from loyalty programs and other incentives as delivered by the corresponding application. It opens up a whole new world of mobile device applications, while alleviating the burden of a wallet full of credit cards. “Receiving certification from MasterCard provides essential validation of our technology platform and opens up significant greenfield opportunities for our Wave solution,” commented Ofer Tziperman, OTI’s CEO. “We can now begin to target large-scale implementations with banking institutions and payment card providers, as well as projects involving public transportation, institutional memberships, and loyalty and rewards programs. “As the first major player in the payment industry to certify OTI’s Wave, MasterCard provides validation of our NFC solution — now the payment industry’s only certified NFC audio-jack add-on solution. We expect other major payment companies to follow suit and provide certification in the near future. “With NFC-enabled applications expected to grow at a 35% CAGR to $34.5 billion by 2016, it’s clear the payment industry is rapidly adopting NFC technology. NFC is becoming increasingly recognized as the fastest, most efficient, most versatile and secured […]
Source ppinewsagency.com
Access Control Sees Continued Push Towards Mobile Capabilities
Much of the buzz around access control in recent years has centered on the potential held by near field communications-enabled devices, which many people have pegged as the credential of the future. The reason for the excitement around NFC is well-founded as the majority of smartphones already have NFC functionality built into them. And while the viability of the technology has been proven in numerous case studies, widespread adoption has yet to take place. However, manufacturers are continuing to focus much of their efforts on developing products with mobility in mind. Innovation is also continuing to take place at the enterprise-level with advancements in access control management software. Just as video side of the industry has been focused on the migration to IP, access control companies are also looking into how they can make their products more interoperable with the network and with other security devices. There has also been steady demand for managed and hosted access solutions as organizations look to reduce their security infrastructure costs. SIW spoke with several industry experts at this week’s ASIS show in Chicago, to get their take on these and other trends that are currently taking place in the market. SIW: What do you feel are the biggest trends taking place in access control? Peter Boriskin, director of product management, electronic access control, Assa Abloy : The biggest game changer is mobile. We see mobile everywhere, from mobile devices for mobile guard stations to mobile credentials. Security officers are using the corporate […]
Source www.securityinfowatch.com
Heartbeat Biometrics For Human Authentication Access Control
Abstract Automated security is one of the major concerns of modern times. Secure and reliable authentication systems are in great demand. A biometric trait like the electrocardiogram (ECG) of a person is unique and secure. In this paper, we propose an authentication technique based on Radon transform. Here, ECG wave is considered as an image […]
Genetec Demonstrates WiFi And PoE Locks In Latest Version Of Synergis Master Controller At ASIS 2013
Genetec, a global leader in unified IP security systems and 2013 Access Control Product of the Year winner in the UK, will demonstrate new features of its upcoming Synergis Master Controller (SMC) v.2.1 release for the first time at ASIS 2013 (Booth # 1914). The SMC, a key component of the Genetec Synergis IP access […]
HID Global Expands pivCLASS Portfolio To Include Credential Registration And Verification Of FIPS 201-Based Credentials
HID Global?, a worldwide leader in secure identity solutions, today announced it has expanded its pivCLASS? product portfolio with an extensive family of credential authentication solutions that enables customers to comply with government physical access control mandates. The pivCLASS suite now incorporates a comprehensive family of software solutions from Codebench, part of HID Global, with […]
Navy Yard Shooting: US To Review Security At All Military Installations (+video)
Defense Secretary Chuck Hagel is planning to order a review of physical security and access to all US military installations worldwide, a senior Pentagon official said Tuesday, one day after a Navy reservist with a troubled history killed 12 people at the Washington Navy Yard . Skip to next paragraph Secretary Hagel spent much of the day on Tuesday collecting input from senior officials to define the parameters of the review, which could be formally announced as soon as Wednesday, according to the official. Word of the impending review follows news that a previously unreleased Department of Defense Inspector General (DOD IG) report detailed “critical flaws” in base security at Navy installations, including the practice of contracting out base guard duty to nongovernmental personnel. The DOD IG report, dated for release on Sept. 16, the date of the Navy Yard attack, cites instances in which “52 convicted felons received routine, unauthorized installation access, placing military personnel, dependents, civilians, and installations at an increased security risk.” This was the result of efforts on the part of Navy officials “to reduce access control costs,” according to the inspector general report. The report leveled another critique as well – that the commander, Navy Installations Command was “non-responsive” regarding the recommendations of the Pentagon inspector general. These revelations about the DOD IG investigation in turn prompted calls for change. In the wake of the Navy Yard attacks, “I am highly concerned that the access control systems at our nation’s military installations have serious […]
Source www.csmonitor.com
Near Field Communication Forum Announces Paula Hunter As New Executive Director
The NFC Forum, a non-profit industry association that advances the use of Near Field Communication (NFC) technology, today announced that Paula Hunter has been named the organization?s new Executive Director. Elected by a vote of the NFC Forum Board of Directors, Hunter comes to the NFC Forum with more than 18 years of leadership experience […]
A Key For Casinos: Access Control
With so much money flowing throughout casinos, these establishments are a highly-regulated world within themselves when it comes to security. One of the most critical areas of casino security is physical key control because these instruments are used for access to all of the most-sensitive and highly-secured areas, including counting rooms and drop boxes. Therefore, […]