shutterstock_399288955

IT Security for Physical Security

Target, one of the nation’s largest retailers with over $70B in annual revenue, was hacked in 2013 and their customers credit card information was stolen. This cost them $100M+ in settlements alone. How did the hackers get in? Through a … Read More

shutterstock_512845519

A Foolproof Strategy to Prevent Tailgating in your Building

Tailgating or piggybacking is the most common form of security breach that happens across residential buildings and office complexes. It starts out innocently – an employee opening a door and holding it open for others, visitors without badges, or the … Read More

shutterstock_517737856

Your Face is your Badge: Introducing new Access Credential Identity

Facial recognition technology is no longer confined to the world of sci-fi movies. There has been significant development in recent years in the use of computer vision systems for automatic face recognition. Systems now exists that can scan people’s faces … Read More

shutterstock_270471761

Keeping your Workplace Secure in a Dynamic Environment: The Case for Multifactor Authentication in Access Control

More security with far less hassles Having an access control system that requires a unique credential to be presented every time to grant access to a secure location makes businesses feel they have all the bases covered when it comes … Read More

Cloud Video Surveillance

Cloudastructure Introduces Industry’s First Rack-Mount Access Control Solution

Traditional access control systems involve legacy door controllers mounted on the walls near the door with wires running for the reader, strike plate, sensor switches as well as REX sensors. Even though traditionally systems started with one controller-one door configuration, … Read More

A Fail Proof Strategy to Prevent Tailgating in your Building

Tailgating or piggybacking is the most common form of security breach that happens across many residential buildings and office complexes. It starts out innocently – an employee opening a door and holding it open for others, visitors without badges, or … Read More

facial-recognition-markers-640x353

Securing through Computer Vision: Connecting your Face to your Badge

Facial recognition technology is no longer confined to the world of sci-fi movies. There has been significant development in recent years in the use of computer vision systems for automatic face recognition. Software now exists that can scan people’s faces … Read More

Property Management Industry

Top 5 Things to Secure your Smart Buildings

Today a Smart Building is the one that is a Secure Building. Infact, security perimeter is key to the very definition of “being in or having left the building”. All amenities associated with the building are provided for the benefit … Read More

iPhone2

The ‘Credential’ for Unlocking Doors Moves to your Smartphone

In the physical access control world, the key that has traditionally been used to open doors is called a “credential”. In commercial buildings, where multiple people need to go through multiple doors to access the shared facilities, there was clearly … Read More

Web Based Access Control System

Mobile Physical Access Control: A new Approach for Opening Doors

Physical Access Control technology has begun moving into the cloud over the last 2-3 years, which has revolutionized backend facility management operations and maintenance. Now it’s time to adapt the front end to this reality, where Mobility is taking over … Read More