Pinnacle Access Control v5.0 by Sielox

March 2006
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p95
Trade Publication
The article features Sielox's Pinnacle version 5.0 access control software which offers an automatic network reconnect feature along additional upgrades. It also includes an electronic mail report scheduler, alarm notification on start-up, a parity check configuration option for error detection and new mapping feature.


Related Articles

  • SECURE GROWTH.  // Health Facilities Management;Aug2009, Vol. 22 Issue 8, p10 

    The article reports on the modernization of the access control system at Regions Hospital in St. Paul, Minnesota in 2009. It states that as the hospital developed over the past eight years, the facilities' old-fashioned key locks were replaced by a standardized card access control system managed...

  • Email filtering solutions: North American market lead to be challenged.  // MarketWatch: Technology;Nov2005, Vol. 4 Issue 11, p37 

    The article focuses on the global email filtering solutions market. It reports that over 50 percent share of this market has been occupied by the North American region. And it is predicted that the combined markets of Europe, Middle East and Africa region and Asia Pacific will represent just 47%...

  • IT-friendly, But IP-addressable.  // Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p38 

    An interview with Karen Evans, president and general manager of Checkpoint Systems' Access Control Product Group from Sielox, is presented. When ask on how she perceive the future of the access control industry, she refers to it as not only IT-friendly, but most especially IP-addressable. She...

  • Phishing gets savvier. Fisher, Dennis // eWeek;5/3/2004, Vol. 21 Issue 18, p14 

    A new breed of sophisticated e-mail attack that is difficult to detect and defend against is further proof that cyber-criminals and scam artists are getting more serious about their efforts to steal information. The new attack is an enhanced form of phishing, scams that are defined as attempts...

  • IM Security tools.  // SC Magazine: For IT Security Professionals (UK Edition);Sep2004, p51 

    This article reviews the instant messaging (IM) security software SurfControl Instant Message Filter from SurfControl. This product complements the broader Web Filter software from the same company and borrows the basic engine from Akonix. It describes IM as a rogue protocol because it avoids...

  • Companies You Should Know. Gager, Russ // SDM: Security Distributing & Marketing;Apr2007, Vol. 37 Issue 4, p31 

    The article provides information on Sielox, marketer of Pinnacle system software and Mobotix Corp., a manufacturer of Internet Protocol (IP) video camera systems. Sielox is headed by Karen Evans, president and general manager and a 14-year employee of Checkpoint Access Control Group. Mobotix...

  • Prying Eyes in Cyberspace. Alger, Jonathan // Academe;Sep/Oct99, Vol. 85 Issue 5, p95 

    Discusses legal matters regarding the electronic monitoring of Internet and e-mail access in universities and colleges. Legal cases cited; Legal concerns as justification of the monitoring; How faculty members can maintain privacy in their computer use.

  • SUFFOCATING IN PAPER. Wynne-Jones, Melanie // Pulse;4/19/2007, Vol. 67 Issue 15, p31 

    The article focuses on computer usage in avoiding information chaos and paper overload. Central C drive and a separate server for scanning clinical letters are the servers used. They can be accessed from any terminal with linked personal computer in every office. C drive has Practice Information...

  • Mobile devices: You're losing control.  // Network World;2/7/2011, Vol. 28 Issue 3, p20 

    The article discusses the issue regarding the problem in mobile devices. It states that applications on mobile devices are a huge concern as a channel for malware delivery because users can directly download apps from the iTunes store or Android app sites with wild abandon. Moreover, something...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics