Auto-Dialer Mounts in Tight Spaces

March 2006
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p82
Trade Publication
The article features Trigon Electronics' two-inch Miniguard HF-2 Slim-line auto-dialer which mounts on any narrow installation area, such as those found on glass entries. It also eliminates the need for custom mounting plates. The unit becomes access control with the addition of a proximity reader.


Related Articles

  • ACCESS CONTROLS and LOCKS.  // SDM: Security Distributing & Marketing;Jun2004 Part 2 of 2, Vol. 34 Issue 7, p43 

    Presents a list of access controls and locks. Electronic access controls; Card access control systems; Card and card reader equipment.

  • A REAL-TIME LICENSE PLATE DETECTION SYSTEM FOR PARKING ACCESS. Hermawati, Fajar Astuti; Koesdijarto, Roenadi // Telkomnika;2010, Vol. 8 Issue 2, p97 

    The automatic and real-time license plate detection system can be used as an access control entry of vehicles into the parking area. The problem is how to recognize the vehicles that will go into the parking lot and how to recognize various types of license plates in various light conditions...

  • GROWING INTELLIGENCE. Steinman, Bob // American School & University;Oct2003, Vol. 76 Issue 2, p29 

    Explores the functions and benefits of the choices available in electronic access control. Role of electronics in managing a building's entrances; Advantages of an electronic access-control system; Role of biometrics applications in security and efficiency; Benefits in the use of biometrics.

  • 12345 Asking the 'Top 5' Questions. Hodgson, Karyn // SDM: Security Distributing & Marketing;Aug2012, Vol. 42 Issue 8, p91 

    The article presents questions and answers related to visitor management systems including how to integrate a visitor management system, what are the reporting capabilities of a visitor management system, and what are the software licensing, update, and support policies for a visitor management...

  • Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment. Kaur, Supreet; Singh, Kawaljeet // International Journal of Computer Applications;Jul2013, Vol. 73 Issue 1-22, p26 

    Ubiquitous computing environment demands a dynamic access control mechanism that can adapt to the changing security requirement of the computing environment. In this paper an authorization model for ubiquitous computing environment is proposed and a formal approach is adopted to design a...

  • Migrating from Keys: It's All in the Journey. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Nov2013, Vol. 50 Issue 11, p122 

    The article discusses the migration from keys and locks into electronic access controls. It mentions that such move involves the focus of enterprise security leaders and their integrators on the security and business benefits of electronic access controls. It notes that the improvement...

  • WHAT CUSTOMERS WANT. Maddry, Terry // SDM: Security Distributing & Marketing;Mar2004, Vol. 34 Issue 3, p61 

    Shares insights on customer's preferences for access control systems. Attribution of changing access needs of the organization and problems with a current system as the two most important reasons why a buyer purchases a different electronic access control system; Factors affecting the...

  • 'Velvet Hammer' Welcome Better Secures Facilities. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Mar2011, Vol. 48 Issue 3, p86 

    The article focuses on the move of several establishments for more advanced system to manage their property in the U.S. It mentions that establishments emphasize electronic access control and often integrated with other systems such as management and security video. It several establishments,...

  • ELECTRONIC VISITOR MANAGEMENT INTEGRATES WITH EXISTING ACCESS CONTROL SYSTEMS.  // SDM: Security Distributing & Marketing;Mar2006, Vol. 36 Issue 3, p158 

    The article introduces GE Security's Visitor Central electronic visitor management systems integrated with installed access control systems. It discusses how users can create professional, customized photo visitor badges that give companies more control over visitor access than manual,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics