Access & Identity Multimedia Archive

First 1 2 Next » Last
  • Life Safety Security & Operational Conflicts

    Our world is full of threats. The buildings and systems we interact with everyday are designed to limit our exposure to the risk of fire, bodily harm and other threats. We take many of these safety measures for granted, but they influence our daily...

    Whitepaper • June 4th, 2012

  • What does 'open' access control mean?

    Access control providers discuss open systems and importance of reliable product in these interviews from Mercury Security Corporation

    Video • May 31st, 2012

  • Using FIPS, TWIC and CAC cards with Continental Access CA3000 card access control software

    Scott Schramme, vice president of sales for Continental Access, discusses PIV, FIPS 201, TWIC and CAC card integration and enrollment with Continental's Card Access 3000 (CA3000) access control software

    Video • April 20th, 2012

  • Secure-24 data center security tour

    Take a fascinating tour inside the Secure-24 data center and all of its cutting edge technology complete with retinal eye scans, fingerprint scans, ID verification, video surveillance and fire suppression. The facility uses state-of-the-art technology...

    Video • February 21st, 2012

  • Physical Access Card Systems: Yesterday and Today

    Dave Kearns, an internationally recognized analyst in the field of Identity Management and networking, takes a deep look into Physical Access Card Systems from the past and today. He reviews how your legacy infrastructure may be holding you back, or may...

    Whitepaper • October 5th, 2011

  • Providing Access Control for an Assisted Living Facility

    This whitepaper examines the case study of Valley VNA Senior Services' need for advanced electronic access control at doors and the use of Paxton's devices to assist in securing the assisted living facility.

    Whitepaper • August 29th, 2011

  • Applying OSIPS to ICAM

    This paper from the Security Industry Association (SIA), an ANSI-accredited standards development organization, provides an overview of the development of open standards for systems integration and performance testing for the security industry. The...

    Whitepaper • July 28th, 2011

  • RKDT Dual Technology Proximity Readers and Standalones

    This white paper from SecuraKey details the development of the RKDT (Radio Key Dual Technology) line of HID compatible readers and standalone units. This paper includes information on proprietary protocols, card data formats, standalone and Wiegand output...

    Whitepaper • July 28th, 2011

  • IT Security and Smart Cards

    In this whitepaper, Johl Kennedy examines the IT security risks of smart cards and whether this technology is appropriate for hosting sensitive data.

    Whitepaper • October 4th, 2010

  • ROI Comparison for Embedded Biometric

    Whitepaper produced for e-Data examines embedded biometric devices compared to card-based access control based on return on investment.

    Whitepaper • September 27th, 2010

  • The Impact of the New Credential Systems on the Electronic Security Systems

    Paper authored by government technology systems integrator Condortech Services discusses government access control and identity management changes instituted by HSPD-12, PIV, NIST and the Cyber Security Act of 2009, primarily focused on the PIV employee...

    Whitepaper • November 25th, 2009

First 1 2 Next » Last