Subscribe to RSS - access control

access control

Security industry goes virtual during crisis

 - 
03/25/2020

YARMOUTH, Maine—As more and more city-based governments across the U.S. order residents to “shelter in place” and “non-essential” businesses to close, it is refreshing to see security considered an “essential” business, and to see how the industry has transitioned, almost seamlessly, to the virtual world.

HID Global unveils signature line of readers

 - 
03/03/2020

AUSTIN, Texas—HID Global today announced the launch of HID Signo, its signature line of adaptable, interoperable readers that create a secure approach to access control.

Access control in the cloud with IMRON Corp.’s UnityIS

 - 
02/28/2020

IRVINE, Calif.—As companies continue to migrate their applications more and more into the cloud from on-prem, finding the right cloud provider to work with is imperative for security integrators to stay up-to-date and relevant to their customers.

RS2 steps into the spotlight

Company making waves following the ACRE acquisition in 2019
 - 
02/21/2020

MUNSTER, Ind.—Following the ACRE acquisition in 2019, RS2 Technologies is finally stepping into the spotlight as a leading access control software company, after spending decades successfully growing the business and making a name for itself within the security industry.

TSA’s quest to merge cybersecurity and information technology

 - 
Wednesday, January 15, 2020

We’re about two weeks into the new year, and suffice to say, gearing up for travel is top of mind for security professionals. The “big” industry shows always seem so far away at this point, but before we know it, ISC West will be here in March, followed by ESX in June; GSX in September; ISC East in partnership with ASIS NYC in November; and more. In addition to these, are the smaller, boutique-type events, such as our SecurityNext conference in February (It’s not too late to register, btw!), not to mention all the companies that host events throughout the year. This puts you and your personal data in quite a few airports’ computer systems, screening technologies, etc., which can be a hacker’s paradise. 

Fortunately, while you’re on your yearly security quests, TSA is on a “quest” of its own: “to merge cybersecurity and information technology,” according to a special notice issued on January 7, 2020. And, they aren’t going at it alone. The agency has the support of America’s airport facilities, working together to create a cybersecurity culture by adopting the requirement “cybersecurity by design” to ensure cybersecurity is at for forefront, as opposed to being an add-on or afterthought. 

In addition to merging cyber and information technology, there are other “requirements for the information security and security screening technologies industry to ensure everyone is working towards a common goal,” it said in the notice. Other requirements include: 

  • Implementation of adequate access control and account management practices by enabling multi-level access to equipment sources and the ability to restrict users;
  • The ability for airport operators to change system level passwords;
  • Use of unique identification of individuals, activity and access to security equipment; 
  • Protection of screening algorithms form compromise, modification and rendering equipment inoperable, and provide immediate alert when algorithms have been accessed;
  • Covering USB ports are covered and access to ports, cables and other peripherals are protected from unauthorized use;
  • Employing automated measures to maintain baseline configurations and ensure systems protections;
  • Proper management of internal and external interfaces and encryption of ingress and egress traffic;
  • Implementing methods to update security equipment affected by software flaws; 
  • Running security assessment tools on devices to ensure appropriate configuration and patch levels, and that no indicators of compromise are present; 
  • Full support to ensure security equipment hardware, software and operating system vulnerabilities are identified and remediated; 
  • Use of an approved encryption method to ensure integrity of all data at rest on security equipment; 
  • Providing comprehensive list of all software and hardware that compromise security equipment; 
  • Demonstrating the ability to update equipment design and capabilities to align with changing cyber intelligence and threat reporting; and 
  • Vetting all local or remote maintenance personnel with the inclusion of background checks. 

TSA hopes that these requirements will “increase security levels; raise the bar of cybersecurity across screening solutions; provide vendors an opportunity to demonstrate their cybersecurity credentials; and provide an aligned approach across the industry—making it easier for vendors to adapt to end user requirement.”

Sounds like a win for anyone involved in travel. 

 

MedixSafe now offers Bluetooth-enabled mobile readers on cabinets

 - 
12/13/2019

MEMPHIS, Tenn.—MedixSafe, a leader in the access control market, announced that its Key Access Ready Enclosure (KARE) key control cabinets are now available with Bluetooth format card readers.

U.S. International Trade Commission rules in favor of Nortek

 - 
12/06/2019

CARLSBAD, Calif.—Nortek Security & Control, a global leader in wireless security, home automation, access control, and health and wellness technology, announced that an administrative law judge (ALJ) of the U.S.

Q&A with new Boon Edam President Valerie Anderson

 - 
11/05/2019

Security Systems News (SSN) recently sat down with Anderson to discuss her role with the company, industry trends and the expanding diversity of the security industry workforce.

Arcules and Siemens partner

Alliance provides organizations with next-generation cloud video solutions
 - 
11/05/2019

IRVINE, Calif.—Arcules, an innovator of integrated cloud-based video and access control services, announced their partnership with Siemens Smart Infrastructure (SI) to provide its Integrated Video Surveillance Service to modern enterprises.

State of the physical access control market, part II

Market gaps and strengths, and a future look into physical access control
 - 
10/02/2019

YARMOUTH, Maine—Security brands and companies offer varying technologies, products and services within the physical access control (PAC) market today; therefore, all security companies and professionals must work extra hard to stay relevant.

Pages