Access Control


Reducing the Risk of Cyberattacks on Public-Sector Security Systems

Reducing the Risk of Cyberattacks on Public-Sector Security Systems

Recent statistics highlight the rise of cyberattacks in the public sector. In its latest Internet Crime Report, the FBI stated that they received nearly 2,500 ransomware complaints in 2020.

Who Is Using Mobile Data Access Control?

Who Is Using Mobile Data Access Control?

One of the leading adopters of mobile access control systems is the multi-family residential industry: for example, the high-rise, luxury condominium in downtown Sarasota, Fla., recently upgraded by Quantuum Energy Products.



Teachers, Books and Clouds: 5 Ways the Cloud is Revolutionizing School Security

Teachers, Books and Clouds: 5 Ways the Cloud is Revolutionizing School Security

For so many schools today, math and spelling tests serve as accountability to ensure students work hard and concentrate on learning.

Hardware-Encrypted USB Flash Drives Stop BadUSB Before It Starts

Hardware-Encrypted USB Flash Drives Stop BadUSB Before It Starts

It stands to reason that any problem with the word “bad” in its name will not be fun to deal with. However, when the solution for the said problem is a multi-tasker that solves multiple issues, that goes beyond being a good thing—maybe bordering on amazing.

Smart Access: The Next Security Evolution?

Smart Access: The Next Security Evolution?

Smart access and automated entry could become a common feature of smart-building infrastructure over the next five years. This is due to smart credentials and contactless technology enhancing how people enter buildings and grant access.

Access Control and Visitor Management: The Power of Integration

Access Control and Visitor Management: The Power of Integration

The pandemic significantly accelerated the worldwide digital transformation we see across various markets. Fortunately, this transformation has also made way for innovative products that have reduced the need for physical devices and in-person contact.

Physical Identity and Access Management

Physical Identity and Access Management

Whether you’re responsible for the security of an office campus, college campus or office complex, one thing is for sure: Ensuring employees, students and visitors can move through the building without unnecessary barriers or delay is a must.

Digital Visitor Management Systems Keep Schools Safe

Digital Visitor Management Systems Keep Schools Safe

Antiquated methods for tracking visitors on a school campus can create added risk for staff and students. With one million registered sex offenders in the United States, schools that rely on handwritten visitor logs are putting their students and staff at risk.

UW-Madison to Test AI-Powered Security System

Liberty Defense Holdings Ltd. recently announced that it has signed an agreement with the University of Wisconsin Police Department (UWPD) to test a new security detection walkthrough portal on campus.

Getting High Marks

Getting High Marks

Access control technology has been a security staple at Clemson University for over 20 years. In the late 90s, the housing department implemented access control to secure its residence halls. Over time, other academic and administrative departments followed to enhance facility security.

Featured

  • Student Centered Solutions

    In early 2023, John Diemer Elementary School, located in an east Kansas suburb, was transformed into a facility that embodies the idea that learning happens everywhere. The new facilities feature innovative classroom designs that balance flexibility and security—a plan that had been developed collaboratively between the architects and project owners. Read Now

  • Three Killed in Shooting at UNLV, Suspect Also Dead

    Three people were killed and another injured in a shooting at UNLV Wednesday afternoon in Las Vegas. The suspected gunman was killed in a shootout with law enforcement. Read Now

  • Understanding the Differences

    When it comes to video security systems in schools, there are many misconceptions about how AI, analytics, and facial recognition intersect and overlap. Where does one technology end and the next begin? Which ones raise more privacy concerns on campuses? In this article, we will examine the differences between these technologies and address privacy issues as we aim to protect students, staff and property. Read Now

  • Better Today

    Physical security software and hardware have come a long way in recent years. Yet while systems like access control, intrusion monitoring, and video management are powerful tools, it is how we use them that matters. Read Now

Webinars