Business & Marketing
Written by Staff
Despite the exciting trends and industry buzz surrounding mobile technologies, wireless locks and hosted access control, more long-standing and less sensational trends such as encryption and multi-technology readers are taking center stage in the access control market.
Written by Damon Dageenakis
The physical security and access control market is undergoing a major transition to IP-based solutions that deliver ease of operation, simplified expansion and customization, and the ability to integrate a physical access control system (PACS) with many other solutions sharing the same network.
Written by Debra Spitler
The move to a more “frictionless” security experience, meaning a security experience that does not slow users down, is one of the key trends HID Global anticipates will drive the industry in 2013.
Written by Staff
ADI Canada's new GM talks about immediate plans, his interest in the security business, his experience in the retail business, and what big box stores are doing to the market.
Written by Alan Fontanella
Optimal access card security requires a multi-dimensional approach for identity validation, and a multi-layered approach for the systems that are used to issue them.  The latest advances enable issuers to better protect the integrity of each credential, cardholder, and the overall issuance system.
Written by Dave Adams
The access control industry’s move to open standards is cultivating a broad range of interoperable products with enhanced features and security.  Open standards also ensure that solutions can be easily upgraded to support changes in technology and applications, and give users the confidence that investments in today’s technologies can be leveraged in the future.
Written by Tam Hulusi
The bring your own device (BYOD) mobility deployment phenomenon — where you’re allowed to use your smartphone for work —  is growing in popularity as today’s smartphones simultaneously grow in capabilities. We can use our phones to access computers, networks and associated information assets and to open doors and enter secured areas. Deploying these applications in a BYOD environment requires security assessment, proper planning and the right technology and provisioning infrastructure.
Written by Nick Stoner
The ability to combine physical and logical access control on a single credential improves user convenience while increasing security and reducing deployment and operational costs.  Convergence solutions enable organizations to leverage their existing credential investment to seamlessly add logical access control for network log-on and create a fully interoperable, multi-layered security solution across company networks, systems and facilities.  Converged solutions also help organizations enforce more consistent policies, while facilitating the use of consolidated audit logs throughout the enterprise.
Written by Debra Spitler
Organizations have traditionally had two badging choices: establish an in-house printing operation using the latest direct-to-card or high-definition card printers, or use a web-based service to simplify project management while accessing specialized expertise and more extensive contactless card technology options. With the advent of mobile access solutions, there now is a third option: over-the-air credential provisioning to smartphones and other mobile electronic devices.
Written by Rhonda Downey
What is the purpose of a letter of intent?The typical process for selling a company involves the seller disclosing general information about their company, and if an agreement can be reached on the price and terms of the business sale, then one buyer moves on to due diligence where intimate details of the company are released to the buyer. The Letter of Intent (LOI) is a written document outlining the major terms in an agreement between a buyer and a seller, in order to establish a “meeting of the minds.”
Written by Neil Sutton
The last time SP&T News spoke to Aimetis CEO and Director Marc Holtenhoff at length was in 2008. The company has experienced considerable growth since then on the strength of its intelligent video management software Symphony, and its video analytics products. Holtenhoff discusses the company’s recent customer wins, plans for growth and why video analytics haven’t quite yet made it to the promised land.
Written by Rob Colman
In my last column, we discussed the increasing interest in centrally managed systems and hosted services. The potential value of such offerings is closely tied to the technology behind it. This time, we'll go over some of the technological aspects of hosted solutions and discuss some of the requirements vendors and manufacturers need to take into account when designing an access control or video solution to operate in this environment.
Written by Rob Colman
There are many applications for which a police force can use video surveillance. Historically, there may have been several different surveillance systems associated with various aspects of the job.
Written by Victor Harding
Most alarm dealers are reminded over and over again that, when it comes time to sell, it’s all about the recurring monthly revenue (RMR).
Written by Victor Harding
Not allowing for increased attrition levels in an account base after buying it is a lesson that many of the buyers in Canada learned the hard way back in the late 1990s. It nearly bankrupted some.
Written by Neil Sutton
There are two indicators that a trade show has gone well: 1. Attendance numbers are up from last year and 2. There’s a positive buzz on the show floor.
Written by Rob Colman
The staff at CANASA regularly talks to members of the public about their security needs.
Written by Rob Colman
You have honed your management and leadership skills. You have done the research to develop a winning Strategic Plan. You bring your enthusiasm, vision and deep personal commitment to succeed.But all of that time and effort has the value of a bell without a clapper if you cannot find and develop the staff you need to implement your genius.
Written by Rob Colman
Software-based video management solutions have become a big part of the security industry in the last five years.
Written by Rob Colman
Centrally managed or hosted services have been getting a lot of press over the last few years.Borrowing from the recurrent monthly revenue model of central stations that monitor residential and commercial intrusion systems, the concept is gaining traction within the access control and video segments. It represents a shift from the traditional security system deployment where a customer purchases and installs an access control or video solution for their organization to one where the customer purchases one or more services to accomplish the same goal. The advent of the “cloud” and the benefits espoused by many in the IT world have helped fuel further interest in these non-traditional services.

We are using cookies to give you the best experience on our website. By continuing to use the site, you agree to the use of cookies. To find out more, read our Privacy Policy.