Site Map - Access Control

Company Deals Itself Better Cards

- Find out how one company upgraded its ID and badging to improve efficiency and reduce costs.


- The book is heavily weighted toward town center CCTV usage, and while chapter nine reveals the impact of monitored CCTV in a retail environment and highlights the need to train those monitoring the system, there is a noticeable absence of contributions from private sector security practitioners. With CCTV so ubiquitous, it would have been useful to record the experiences, views, and research of security professionals working with video.

Jargon Watch: Geofencing

- A method for restricting movement into or outside of a designated zone by use of electronic tracking and alarm technology.

Using the Common Criteria for IT Security Evaluation

- How trustworthy is a computer system? The answer depends on what the system's owner wants in terms of security performance. Usually in a business, governmental, or academic setting, the owner wants the system to enforce certain access rules to restrict users from reading, writing to, or executing certain data elements. How well a system enforces various access controls determines its trustworthiness.

Quick Bytes: Michigan IT has the blues

- Michigan's Department of State runs several large IT systems to manage driver and vehicle information, and it collects nearly $2 billion annually in revenue from vehicle violations and fee collections. However, a recent audit of the IT infrastructure of the department by Michigan's Office of the Auditor General found that the "general controls over security, access, program and data changes, segregation of duties, and service continuity that support mainframe information systems were not effective." As a result, the report concluded that there was "significant risk" that unauthorized access to the systems could compromise the data on these systems. @ The Performance Audit of the Automated Information Systems is at SM Online.    

The Buzz Over ZigBee

- Focusing on the short range may be bad for business--unless you're talking about remote control technology. The latest short-range wireless option is known as ZigBee, an open standard created by a nonprofit consortium of companies called the ZigBee Alliance.

Stopping Home Invasions at the Door

- Physical security measures, such as door reinforcements and security glazing, are more effective than electronic security solutions, says police officer and ASIS member.

Laptops Don't Have Legs

- How one facility in New York City managed to stop its laptops from walking away by updating its access control system.

Security plans

- A new Wisconsin law (formerly S.B. 8) allows state utility authorities to withhold access to their security plans if they determine that the subject of the plan is so vital to the state that its incapacitation or destruction would have a debilitating effect on the state's physical or economic security, or on public health, safety, or welfare.

Fence and Sensibility

- Find out what to consider before deciding to have sensored fencing installed on company property.

The Smart Cards Are Coming...Really

- You've heard it before, but this time advances in technology and security demands in a post 9-11 world make it more likely.

What's Best for Alarm Response Policies?

- For more information on reducing alarm dispatches visit the SIAC Web site

Centralizing Card Control

- Find out how one company instituted an enterprisewide card solution for its headquarters office and 40 field offices.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.