Access Control

Primer: What We Talk About When We Talk About Biometric Physical Access Control

ISC West 2014, which is underway in Las Vegas and will be running through Friday, is playing host to a large number of biometrics vendors and professionals involved in physical access control. Now is naturally a great time to explore the exciting and versatile world of biometric physical access control.

Frontier Unveils Major New Version Of Frontier Security Management Solution

Frontier, a developer of integrated enterprise security management solutions for more than thirty-five years, has announced availability of the upgraded version of its security management software, Frontier R4. The new release delivers enhanced functionality and further empowers organizations to achieve higher levels of awareness, security control, and rapid response. The Frontier integrated software suite streamlines […]

FST21, A Leading Biometric Access Solution, Rebrands To FST Biometrics

FST21, a leading biometric access solution provider, announced its rebrand to FST Biometrics. As part of the initiative, the company will further concentrate its efforts on its In Motion Identification (IMID) technology. FST Biometrics? products, including IMID Access, IMID Digital Doorman and IMID Solo, will offer enterprises, campuses, venues and facilities secure access, at the […]

HP Autonomy And VidSys Team To Create Enhanced Physical Security Information Management Solution

HP Autonomy and VidSys today announced a strategic alliance to develop an advanced physical security information management (PSIM) platform powered by next generation video surveillance analytics. The solution will improve the effectiveness of security professionals by augmenting VidSys? industry leading PSIM offering with analytics delivered by HP IDOL?s advanced information analytics platform. The combined platform […]

AMAG Technology Introduces Symmetry EN-2DBC Network Controller

AMAG Technology , the world?s most installed access control and integrated security solution developer, introduces the Symmetry? EN-2DBC Network Controller. The Symmetry EN-2DBC offers a flexible, easy to install controller option for organizations looking to deploy a distributed IP-based access control system, expand their current access control system, secure only a few doors or upgrade their legacy system.

FST21 WELCOMES ITS NEW BABY – SAFEI

FST21, a leading technology company specializing in the field of identification and security, is pleased to announce the arrival of SafeI?, a fully integrated access control controller that delivers the most advanced, secure and convenient In Motion Identification access control on the market. SafeI enables the groundbreaking technological advantages of FST21’s SafeRise? solution (an In […]

Avigilon Adds New Version Of Access Control Solution

A Vancouver, BC, maker of HD video surveillance systems has released a new version of its access control software, which stems from an acquisition last year. Avigilon says Access Control 5.0 seamlessly integrates identity management, video surveillance systems, and physical security. The release makes the completion of the operational integration of RedCloud Security, Inc., which […]

ISONAS Expands Patent Protection Within Pure IP Access Control

In August 2010 ISONAS was issued a patent pivotal to the fast growing and emerging market of IP access control.  Patent 7,775,429 covers aspects relating to one or more of the following features: 1. The ability for a reader/controller to make decisions “locally” at the edge, while still having the ability to program permissions for all access points “centrally”.   This allows the completely panel-less access control system to continue working when the network is down, and it allows a large number of readers to have their permissions determined by rules set up centrally, often by Microsoft Active Directory.  2. Powering the reader, electric strike and other devices at the door via Power over Ethernet.   PoE dramatically reduced cost and complexity of installation because no additional electricity is required at the access point. 3. Managing system configuration via a web interface.   Decentralizing credential management, and creating lock-down scripts accessible to more than just a system administrator requires access via the internet.  We are proud to announce that ISONAS was issued patent #8,662,386 in early March 2014 that significantly expands the reach of our patented Pure IP solution.  ISONAS is the leader and innovator in Pure IP access control.  Visit our website at www.ISONAS.com to learn more about how your organization can be part of the proven revolution. ISONAS.  We’re revolutionizing access control with one simple solution. Come see us at ISC West .  We will be exhibiting and presenting with Milestone in booth 20060 and IP Video in […]

UK Physical Access Control Market Report 2013

(M2 PressWIRE Via Acquire Media NewsEdge) Dublin – Research and Markets ( http://www.researchandmarkets.com/research/fw2rg2/access_control ) has announced the addition of the "Access Control Market Report 2013" report to their offering. This Market Report examines the UK market for physical access control, which is primarily concerned with the restriction of a particular room, structure or site to authorised personnel only, allowing users to restrict or grant access, monitor throughput, and report unauthorised access attempts in certain areas. The types of products covered by this report include audio and video entryphones, keypad systems, biometric systems, and card- or token-based access control systems. Within card- or token-based access control systems there is a range of technology solutions available, including magnetic-stripe cards, Weigand cards, barcode cards, proximity systems, long-range/hands-free systems, vehicle access control systems, smart cards and dual-function cards. The authors estimate the UK access control market to have fallen in value by 5.9% between 2008 and 2012. Sluggish economic growth, low business investment levels, and the struggling construction sector are important factors affecting demand for access control products. Businesses operating in the UK access control industry include: product manufacturers, suppliers, systems designers and installers, and wholesale distributors. The majority of leading manufacturers and suppliers are part of large, foreign-owned multinational companies, although there are also several independent UK companies and subsidiaries of public limited companies (PLCs) that operate in the market. Many of the leading systems designers and installers are also UK subsidiaries of large multinationals, as are some of the leading wholesale […]

Vehicle Recognition Solutions SeeControl Management Suite

Vehicle Recognition Solutions Product Image HTS, a global provider of  image processing and intelligence solutions to identify vehicles  for the transportation, parking, law enforcement, security and data mining  markets, announces VRS –their next generation of Vehicle Recognition Solutions. VRS includes flexible architecture with robust logic for configuration of lanes,  a new line of multi mega pixel high performance, true IP cameras with live video streaming , as well as a proprietary central management software with user interface and web enabled. The VRS SeeControl application is an intelligent vehicle management platform, transforming vehicle and license plate data into valuable information for quick action effective decision-making, be it for law enforcement, security, logistical, or operational purposes. The system helps organizations of all kinds manage, monitor and respond to vehicle-driven events, provide efficiencies for day-to-day operations and strategically plan through real-time vehicle identification and assessment as well as retrospective forensic analysis. The SeeControl management suite provides robust activity reporting, and commands a powerful event and alarm engine for instantaneous exception notification. The system installs, configures and administers HTS Vehicle Recognition Imaging Units, monitors device health, and manages a database of all vehicle collected information. The new flexible architecture enables effective lane configuration  and lane logic depending on customer  needs, easy site set up, and friendly user interface. The first imaging unit  in this new series launched by HTS  is the N50 Imaging Unit for  precision and efficiency in low-speed access control, parking and security applications, including critical facilities. The HTS VRS N50 […]

Assa Abloy IN120 Wi-Fi Lock

Assa Abloy announces the introduction of its IN120 Wi-Fi lock, combining secure wireless electronic access control with a sleek design. Available from Group brands Corbin Russwin and Sargent, the IN120 reportedly provides a cost-effective solution for facilities needing to upgrade access control.Ideal for use in hard-to-wire locations, the IN120 utilizes standard IEEE 802.11b/g/n Wi-Fi connectivity to connect to the access control system, significantly reducing installation costs, and eliminating the need for proprietary equipment, Assa Abloy reports. The IN120’s integrated ANSI/BHMA Grade 1 hardware is available in cylindrical and mortise lock configurations.The IN120 utilizes HID multiCLASS SE technology, which provides heightened security, supports multiple credential types including HID Prox, HID iCLASS, HID iCLASS SE (SIO-enabled), HID iCLASS Seos, HID MIFARE SE, HID iCLASS DESfire EV1 SE, MIFARE Classic, DESfire EV1, and FeliCa, and enables NFC mobile access. The IN120 supports current Wi-Fi security standards including WEP, WPA, WPA2 and 802.1x and utilizes AES 128-bit encryption. In addition, the WiFi radio is field-upgradeable, making it future proof for evolving Wi-Fi standards.“Our new IN120 is ideal for budget-conscious applications. Combining low cost and the ability to interface with a facility’s existing IT infrastructure, the IN120 offers the most economical path to upgrade to electronic access control by leveraging an existing network,” says Peter Boriskin, director of product management, electronic access control, Assa Abloy Americas. The ASSA ABLOY IN120 offers a customizable feature set, allowing building owners to select only the features they need or add features as their requirements grow. The IN120 […]

Allegion Showcasing Healthcare-Inspired Access Control Products At PDC Summit

Mar 10, 2014 10:04 AM, By Jessaca Gutierrez Pesa Xstream Pesa Xstream IP STREAMING APPLIANCE PESA Xstream multi-path IP streaming appliance simultaneously encodes up to five independent video sources and eight audio sources concurrently from live or recorded video for multi-path H.264 IP distribution over six independent video streams with no sync or latency issues, according to the company. Housed in a compact 1RU form factor, it provides a cost-effective, comprehensive package for digital media capture, processing, distribution, and storage. Upgrades for Q1 2014 include onboard storage as well as a USB 2.0 communications interface. “With its synchronized, high-quality video and audio and a low cost per stream, PESA Xstream has caught the attention of government agencies and a number of other vertical markets,” says John T. Wright, PESA senior vice president, sales and business development. “PESA Xstream is already part of VIQ Infinit, a digital media capture and management platform from VIQ Solutions for court systems, and we are working with developers who are tailoring the user experience for other specific applications.” PESA Xstream captures H.264 IP camera streams, NTSC/PAL, or SDI video up to 1080p resolution, stored video content, and computer-based content such as PowerPoint slides or medical patient vital signs, then prepares high-bandwidth MPEG-4/H.264 broadcast streams for enterprise distribution and archive. When multiple sources are captured simultaneously, the streams remain associated and synchronized during the event. With five individually addressable video outputs, as well as an integrated quad-view output, PESA Xstream allows operators to stream live […]

NIST Guide Aims To Ease Access Control

Advice on how to encourage information sharing while preserving control over access to data is provided in a new special publication from the National Institute of Standards and Technology. NIST Special Publication 800-162 is titled Guide to Attribute-Based Access Control Definition and Consideration . Attribute-based access control, or ABAC, is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, such as a user or employee; an object, such as specific computerized resource; and requested operations. The flexibility of the ABAC model allows the greatest breadth of subjects to access the greatest breadth of objects without specifying individual relationships between each subject and each object, according to the NIST guidance. "Access decisions can change between requests by simply changing attribute values, without the need to change the subject/object relationships defining underlying rule sets," says NIST Computer Scientist Vincent Hu, who co-wrote the guidance. "This provides a more dynamic access control management capability and limits long-term maintenance requirements of object protections." Example on How ABAC Works NIST offers the following scenario to describe the workings of ABAC: Nancy Smith, a nurse practitioner in a hospital’s cardiology department, is the subject, and when hired at the medical center, she is assigned a set of attributes: her name, title and department, for instance. She’s assigned access to an object, in this case, medical records of heart patients. Resources may receive their attributes either directly from their creator or as a […]

University of Wisconsin-Milwaukee Art Students Request And Pay For Schlage Biometric HandKey Protection

March 06, 2014 — Hear thought leaders in cybersecurity, biometrics, biodefense, explosive detection and other security issues Investorideas.com Security and Defense Conference; Game Changing Technologies: The Face and Future of Security Key Themes: Biometrics, Biodefense and Cybersecurity New York, NY – March 6, 2014 (www.investorideas.com newswire) Michael Balboni, Former New York State Senator and Founder of RedLand Strategies to Open Investorideas.com Security Conference – March 11th in New York; Mr. Lester Quintana, Senior Vice President of Cellucci Associates, Inc. to Provide Closing Remarks. When /where: Tuesday, March 11, 2014, The New York Hilton Midtown, New York City and Online This is a free event to attend for media. Brokers, investors, industry service providers. Learn more about the Conference: http://www.investorideas.com/Conference/ Register and attend free: (limited seats available so register today!) http://www.investorideas.com/Conference/Conference-Registration.asp Speaker list: includes cybersecurity expert Roger Cressey and Janice Kephart Founder and CEO of The Secure Identity and Biometrics Association (SIBA) See ore at Speaker list: http://www.investorideas.com/Conference/Speakers.asp Presenting Companies: American Public University System (NASDAQ:APEI) – Dr. Clay Wilson is the Program Director for Cybersecurity Dr. Clay Wilson is the Program Director for Cybersecurity graduate studies at the American Public University, where he has responsibility for designing new courses. He is past Program Director for Cybersecurity Policy at the University of Maryland University College (UMUC), where he oversaw development of new graduate-level courses. Dr. Wilson is also a former analyst for national defense policy at the Congressional Research Service where he analyzed cyber intelligence reports for the U.S. Congress and […]

TN State University Requires Students to Wear IDs

Prophecy Sign:  The future global surveillance/police state Governments have become enamoured with the thought of spying on every single person in their sphere of influence.  National governments eaves drop on every form of digital communication, (even to the point of dropping in and recording video conversations ), of nearly every citizen in their respective nations.  Whereas cities and a variety of government funded organizations, (universities and schools), have decided to keep a watch on you by installing an Orwellian spy camera grid system.  Toss in the requirement of trackable ID’s, (biometric ID cards), and you have the makings of a society that will pretty much give itself over to the authority of a one world governmental system, headed by a global world leader, (Antichrist). Tenn. State University Requires Students to Wear Trackable IDs http://www.nationalreview.com/corner/372240/tenn-state-university-requires-students-wear-trackable-ids-alec-torres Police Pushing Access to Security Cameras Inside Public Schools It’s not enough the Austin Police Department has surveillance cameras mounted in nearly every corner of the city. Police are now pushing to gain access to security cameras inside Austin Independent School District public schools. The move comes as the department announces a sprawling surveillance rollout that hopes to add a myriad of cameras to city streets. Predictably, APD purports its efforts will make Austin schools safer. The department already has 39 HALO (High Activity Location Observation) cameras installed throughout Austin , which surreptitiously monitor in real time Austin residents’ mundane routines. But that’s not enough. http://www.infowars.com/austin-police-to-implement-mass-surveillance-of-school-children/ Michigan Township To Put Cameras ‘In Every Neighborhood’ Officials […]

DVTEL Latitude NVMS Announces Integration With Software House C-Cure

RIDGEFIELD PARK, N.J., Mar 03, 2014 (BUSINESS WIRE) — DVTEL, INC. , the video surveillance solutions provider, announces integration of the latest version of the open and scalable Latitude network video management system (NVMS) with the C-CURE 9000 by Software House, part of the Security Products business unit of Tyco /quotes/zigman/542280/delayed/quotes/nls/tyc TYC +2.16% . Latitude NVMS is the choice for corporations and organizations looking for the most effective way to manage video surveillance operations over IP networks while C-CURE 9000’s advanced distributed architecture is designed for enterprise scalability and includes remote management of multiple locations from a central server and global reporting for consolidated data tracking. The integration of these platforms allows enterprise-class customers to take advantage of the feature-rich capabilities of DVTEL and Software House’s latest software platforms. The DVTEL Software House module expands the capabilities of C-CURE 9000 by allowing users to view live and recorded video from DVTEL Latitude-connected cameras within the C-CURE 9000 user interface. The integration also enables users to monitor events such as motion and analytics. The resulting unified operating platform for access control and video can also perform video exports, take snapshots, use on-screen pan-tilt-zoom control, and trigger actions. “Both DVTEL and Software House offer opportunities to expand system functionality and provide greater value to security integrators and enterprise-class end users,” said Cheryl Shea, Sr. Product Manager, Strategic Integrations, Tyco Security Products. “Integration with DVTEL’s Latitude software platform provides large security environments a greater ability to maximize the value and ease-of-use of […]

DHS Awards XTec Contested $103 Million Biometric ID Contract

The Homeland Security Department has switched vendors for a deal inked last September to update an employee badge system with advanced biometric verification features, such as face and iris scans, officials announced late Friday.  DHS originally awarded the $102 million contract to HP Enterprise Services on Sept. 27, 2013, but in November the department notified the Government Accountability Office that it was reevaluating the award after XTec, which had previously provided software for the project, argued  that "the agency did not reasonably evaluate proposals," Ralph White, GAO managing associate general counsel, told Nextgov last month in an email. The value of the new contract, over an anticipated 10-year timeline, will remain the same, Homeland Security officials say. DHS awarded the new contract to XTec Inc., on Feb. 28, officials said in a filing  on FedBizOps.gov, a website for federal business opportunities.  Homeland Security last month temporarily extended  XTec’s expiring contract for one year while reassessing technologies proposed by XTec, HP and other technology firms.  In recent years, GAO attorneys had twice dismissed challenges to contracts brought by XTec. In November 2011, the credentialing firm was unsuccessful in  contesting an award to Secure Mission Solutions for a Secret Service access control and visitor management system. Later that month, XTec lost a  protest  against an order for HP technology to support a General Services Administration system that issued and maintained ID cards for employees governmentwide.  Following the Sept. 11, 2001, terrorist attacks, the government required that all federal employees carry biometric ID badges […]

RFID UHF Tag From DAILY Will Take The Place Of Traditional Admission Tickets

Recently, DAILY RFID has newly released a series of RFID UHF tag based on the latest advanced UHF technology, who is one of the professional RFID product developers and manufacturers in the world. Online PR News – 26-February-2014 –Recently, DAILY RFID has newly released a series of RFID UHF tag based on the latest advanced UHF technology, who is one of the professional RFID product developers and manufacturers in the world. Compared with low frequency RFID tag, this RFID UHF tag has many advantages to ensure the security, such as anti-collision, unique ID number and the time of data saving up to ten years. Taking RFID Windshield Tag-06 for instance, a RFID UHF tag newly released by DAILY RFID working on the frequency of 860-960MHz, it is specially designed for vehicle management. Besides, in virtue of the long reading distance ranging from5mto7m, this RFID UHF tag is suitable for access control applications such as gated communities, parking management and vehicle tracking. With the rapid development of all kinds of info technology, this RFID UHF tag will take the place of the traditional admission tickets which cannot already meet the requirements of consumers. All in all, the RFID UHF tag from DAILY not only strengthens the public safety, but also promotes the beneficial efficiency of enterprises. Please find more info about RFID UHF tag at DAILY RFID website: http://www.rfid-in-china.com/products-42-1.html About DAILY RFID CO., LIMITED DAILY RFID CO., LIMITED (http://www.rfid-in-china.com), which belongs to PAN Group Co., Ltd, is the leading company […]