Who's Visiting? And Why?

July 2006
Security: Solutions for Enterprise Security Leaders;Jul2006, Vol. 43 Issue 7, p39
Trade Publication
The article describes the capabilities of computerized and secured visitor management systems. The systems are compatible and can be integrated with most information technology infrastructures and databases and other security technologies, such as access control and video surveillance. The Secure Visitor Management System developed by EasyLobby electronically reads information from visitors' ID cards.


Related Articles

  • EasyLobby, Inc.  // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p80 

    The article provides information on the products and services offered by EasyLobby Inc. in the U.S. The firm, which was regarded as the world's top provider of secure visitor management solutions, offers series of products that provide complete secure visitor registration, management and badge...

  • EasyLobby Earns Lenel Certification.  // SDM: Security Distributing & Marketing;Sep2009, Vol. 39 Issue 9, p136 

    The article reports on the Lenel factory certification received by EasyLobby Inc., a provider of secure visitor management software and visitor badge printing solutions in the U.S. The company has granted the certification for the integration of its EasyLobby SVM version 9 with Lenel's OnGuard...

  • Headaches in Parking Lots, Garages. Dingle, Jeffrey // Security: Solutions for Enterprise Security Leaders;Sep2006, Vol. 43 Issue 9, p90 

    The article provides information on the different access control methods that can be utilized to guarantee security. An access card provides a good option but it has disadvantages because anybody holding the card can use it and it can also be lost or stolen. The keypad system is oftentimes used...

  • A Robust Iris Identification System Based on Wavelet Packet Decomposition and Local Comparisons of the Extracted Signatures. Rosant, Florence; Mikovicova, Beata; Adam, Mathieu; Trocan, Maria // EURASIP Journal on Advances in Signal Processing;2010, Special section p1 

    This paper presents a complete iris identification system including three main stages: iris segmentation, signature extraction, and signature comparison. An accurate and robust pupil and iris segmentation process, taking into account eyelid occlusions, is first detailed and evaluated. Then, an...

  • Biometrics Security Technology: The Future Now. Berger, Vic // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p60 

    The article discusses issues related to biometrics security technology in the U.S. It is stated that biometrics is the study of measurable biological characteristics. The paper also discourses the advantages and future of biometrics. The technology includes fingerprint recognition where...

  • Fingerprint Identification Keyless Entry System. Chih-Neng Liang; Huang-Bin Huang; Bo-Chiuan Chen // Proceedings of World Academy of Science: Engineering & Technolog;Oct2008, Vol. 46, p44 

    Nowadays, keyless entry systems are widely adopted for vehicle immobilizer systems due to both advantages of security and convenience. Keyless entry systems could overcome brute-force key guessing attack, statistics attack and masquerade attack, however, they can't prevent from thieves stealing...

  • IDenticard offers access control and badging solutions.  // HS Today;Aug2008, Vol. 5 Issue 8, p52 

    The article evaluates several new access control and badging solutions from IDenticard including the PremiSys access control system and the OmniLife identification cards.

  • The Private Sector Tackles Public Access control. Fickes, Michael // Government Security;Mar2006, Vol. 5 Issue 2, p20 

    The article describes the ClearLanes service introduced by Verified Identity Pass Inc., which uses biometric technology in providing security access to users in the U.S. The service has been popular among frequent travelers. Upon registration, fingerprints and iris pattern of the users are...

  • Researchers Show On-card Fingerprint Match Is Secure, Speedy.  // Airport Security Report;4/10/2008, Vol. 16 Issue 7, p8 

    The article reports that a fingerprint identification technology for use in Personal Identification Verification (PIV) cards meets the standardized accuracy criteria for federal identification cards, according to researchers at the National Institute of Standards and Technology in the U.S. PIV...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics