Back in 2004, President George W. Bush issued Homeland Security Presidential Directive 12 (HSPD-12). One of the federal government’s many attempts to tighten security after 9/11, HSPD-12 aimed to eliminate “wide variations in the quality and security of identification used to gain access to secure facilities where there is potential for terrorist attacks” and directed the creation of a standard ID card to be used by federal government employees and contractors for access to both federal buildings and federal computer networks.
In the past few years, some business owners or managers have remotely monitored from the comfort of home and while traveling by using a video system installed by a security integrator or off-the-shelf equipment designed for do-it-yourself installation and management. Many bar and restaurant owners have been doing this for some time.
This year will mark the 10th anniversary of 9/11, and for many high-risk areas, security remains a work in progress. A perfect example is all the hype that various airports are generating for using—or more to the point, how they are using—body scanning equipment.
Whether it’s a church door, an entrance into a high-tech Internet company or admission to a local police station, enterprise security leaders often view the application of access control technology one door at a time.
The term “video verification” generally applies to the use of a camera to verify whether an intrusion alarm is genuine, false, or a nuisance alarm. A false alarm would indicate an alarm generated by a system that is a result of a malfunction in the alarm system. A nuisance alarm is indicative of a system working properly, but is generated by some kind of user (human) error.
A plane flies over the Copenhagen Airport at night. The airport is using thermal imaging to protect its perimeters. Have you ever wondered how people get away with filling their car’s
Enterprise card solutions can enable myriad business applications. One example: Identity cards allow Italians to share and use publicly available bicycles.In enterprise-wide identification card access systems, which came first –
Card access control, especially newer multi-functional approaches, can do more than secure a door or provide entry to a parking garage. Today, a card, sometimes branded to the issuing organization,
Jeff Woodward wanted to do it right the first time. After all, you might only have one chance in your career to build a security system from the ground up.
These days, if you don’t want to be found, or even if you do, there’s a great likelihood that someone will find you. For Jeff Schoepf, CPP, security director for