While the access control continues to play second fiddle to video surveillance in terms of adoption of open standards, the drive to modernize systems is creating a movement toward those open standards in the access control industry — which is forecast to top $2.3 billion worldwide by the end of 2013, according to IMS Research, now part of IHS Inc.
Software House, part of the Security Products Business unit of Tyco, attained the U.S. Government’s Federal Information Processing Standards (FIPS) 197 validation for its complete iSTAR physical access controller family.
Access control solutions provider Lenel Systems International announced flexible migration programs for users of legacy Casi and Infographics systems to move to Lenel’s OnGuard solution.
In July, Evansville, Ind.-based Data Link Communications will begin work on upgrading the existing IP video system at Cincinnati/Northern Kentucky International Airport, which will include replacing an antiquated storage platform that wasn’t working well for the airport with new high-capacity Big Bertha servers from BCDVideo.
In what the company’s president and CEO describes as an “opportunistic and synergistic” move, Avigilon Corp. acquired RedCloud Security Inc., combining Avigilon’s strength in HD and megapixel video with RedCloud’s Web-based physical and virtual access control systems.
As part of its overall security improvements, Radnor Township School District in Pennsylvania is using video intercoms from Aiphone Corp. at the main entrance of four of its schools — three elementary and one middle school.
As a full-service provider of identification and security solutions, Minnesota-based IdentiSys serves more than 28,000 customers in a diverse range of industries.
With the launch of its HID Trusted Tag Services Software Developer Kit (SDK), HID Global is driving an initiative for its partners to develop NFC Trusted Tag applications.
Some of the greatest convergence challenges for IT and physical security integrators do not involve technology or integration details. They center on policies and procedures.
When integrators talk to end users about “convergence” of physical and logical access control, the nature of that conversation hinges on multiple factors. There is no single definition of what that term means, and a government office will have a very different need than, say, a university.