ACCESS ALTERNATIVES: From Phone to Wireless Locksets

November 2005
Security: Solutions for Enterprise Security Leaders;Nov2005, Vol. 42 Issue 11, p23
Trade Publication
Introduces technologies aimed to implement access controls over doors. Infocom and telephone entry systems designed for variety of doors; Significance of Internet Protocol on the access control systems; Phone telephone system which is available in a flush mount design by DoorKing Inc.


Related Articles

  • Best of Both Worlds. Rice, Derek // SDM: Security Distributing & Marketing;Jun2015, Vol. 45 Issue 6, p89 

    The article discusses ideas for security system operators on how to effectively use hybrid solutions in the migration process from analog to Internet Protocol (IP) platforms. Discussion of the important role played by integrators in helping end users determine the best migration strategy using...

  • A Sound Opportunity. Anderson, Larry // SDM: Security Distributing & Marketing;Nov2013, Vol. 43 Issue 11, p77 

    The article focuses on the growing popularity of residential intercoms and audio systems as the part of Internet Protocol systems in the U.S. It mentions that aiphone offers video intercoms for applications including JO (touch button) and the JM series (touch screen) video intercoms. It offers...

  • Globe Trotting. Hodgson, Karyn // SDM: Security Distributing & Marketing;Jan2009, Vol. 39 Issue 1, p49 

    The article talks about the factors which drive the demand for global access control systems and also about designing, deploying and maintaining access control solutions. It is stated that in order to operate globally the security industry wants a uniform way of protecting their investments....

  • Access Control: Proprietary or Network? Gager, Russ // SDM: Security Distributing & Marketing;Feb2008, Vol. 38 Issue 2, p48 

    The article provides information on different levels of Internet protocol (IP) in the U.S. There are three levels of access control systems which include, the first generation access control that are proprietary to specific manufacturers and not interoperable. The second generation IP-based aces...

  • Access control systems keep pace with convergence. Ziobron, Betsy // Cabling Installation & Maintenance;Dec2007, Vol. 15 Issue 12, p27 

    The article focuses on the significant development in access control systems. The security and information-technology (IT) industries are pushing each other due to Internet Protocol (IP) convergence. This could be attributed to the advent of and consumption of IP video surveillance solutions....

  • Extended ACLs.  // Network Dictionary;2007, p185 

    A definition of the term "Extended ACLs" is presented. It refers to a better form of Standard Access Control Lists (ACLs) on Cisco routers. Extended ACLs are able to make filtering decisions based on ports, protocols and Internet protocol (IP) addresses. IP addresses are either the source or...

  • Leveraging Internal and External Partnerships. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Oct2009, Vol. 46 Issue 10, p36 

    The article offers ideas on how to choose security integrators with considering flexibility for deployment. It notes that security integrators are partners, thus emphasizing on the importance of the partnership. It mentions the new wave of integrators which has the capability to take over all of...

  • Call It a Transition.  // Security: Solutions for Enterprise Security Leaders;Aug2008, Vol. 45 Issue 8, p54 

    The article reports on the transitions faced by the security industry in the U.S. It states that the transition to networked video surveillance is driving a proliferation of product categories in the digital video surveillance market. MultiMedia Intelligence expects the hybrid digital-network...

  • VoIP team ventures into new terrain. Newman, David // Network World;5/1/2006, Vol. 23 Issue 17, p46 

    The article offers information about the experiments done by the InteropLabs Voice-Over Internet Protocol (VoIP) team in its venture for new breakthroughs. The team's experiment set up consists of complex test bed connecting VoIP phones of five enterprises across a vast network of firewalls,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics