Who's Visiting? And Why?

July 2006
Security: Solutions for Enterprise Security Leaders;Jul2006, Vol. 43 Issue 7, p39
Trade Publication
The article describes the capabilities of computerized and secured visitor management systems. The systems are compatible and can be integrated with most information technology infrastructures and databases and other security technologies, such as access control and video surveillance. The Secure Visitor Management System developed by EasyLobby electronically reads information from visitors' ID cards.


Related Articles

  • EasyLobby, Inc.  // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p80 

    The article provides information on the products and services offered by EasyLobby Inc. in the U.S. The firm, which was regarded as the world's top provider of secure visitor management solutions, offers series of products that provide complete secure visitor registration, management and badge...

  • EasyLobby Earns Lenel Certification.  // SDM: Security Distributing & Marketing;Sep2009, Vol. 39 Issue 9, p136 

    The article reports on the Lenel factory certification received by EasyLobby Inc., a provider of secure visitor management software and visitor badge printing solutions in the U.S. The company has granted the certification for the integration of its EasyLobby SVM version 9 with Lenel's OnGuard...

  • Headaches in Parking Lots, Garages. Dingle, Jeffrey // Security: Solutions for Enterprise Security Leaders;Sep2006, Vol. 43 Issue 9, p90 

    The article provides information on the different access control methods that can be utilized to guarantee security. An access card provides a good option but it has disadvantages because anybody holding the card can use it and it can also be lost or stolen. The keypad system is oftentimes used...

  • A Robust Iris Identification System Based on Wavelet Packet Decomposition and Local Comparisons of the Extracted Signatures. Rosant, Florence; Mikovicova, Beata; Adam, Mathieu; Trocan, Maria // EURASIP Journal on Advances in Signal Processing;2010, Special section p1 

    This paper presents a complete iris identification system including three main stages: iris segmentation, signature extraction, and signature comparison. An accurate and robust pupil and iris segmentation process, taking into account eyelid occlusions, is first detailed and evaluated. Then, an...

  • Biometrics Security Technology: The Future Now. Berger, Vic // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p60 

    The article discusses issues related to biometrics security technology in the U.S. It is stated that biometrics is the study of measurable biological characteristics. The paper also discourses the advantages and future of biometrics. The technology includes fingerprint recognition where...

  • Fingerprint Identification Keyless Entry System. Chih-Neng Liang; Huang-Bin Huang; Bo-Chiuan Chen // Proceedings of World Academy of Science: Engineering & Technolog;Oct2008, Vol. 46, p44 

    Nowadays, keyless entry systems are widely adopted for vehicle immobilizer systems due to both advantages of security and convenience. Keyless entry systems could overcome brute-force key guessing attack, statistics attack and masquerade attack, however, they can't prevent from thieves stealing...

  • IDenticard offers access control and badging solutions.  // HS Today;Aug2008, Vol. 5 Issue 8, p52 

    The article evaluates several new access control and badging solutions from IDenticard including the PremiSys access control system and the OmniLife identification cards.

  • reborn identity. Mimoso, Michael S. // Information Security;May2006, Vol. 9 Issue 5, p36 

    Provides information on the overhaul made by General Motors to its identification and access management under the leadership of chief architect Jarrod Jasper. Reason for the overhaul; Steps of the project; Disadvantages of the lack of interoperability. INSET: GM BRINGS SUN, MICROSOFT TO SAME...

  • Biometric ID Authentication Service.  // Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p84 

    The article features the SecureLink System which is an end-to-end biometric identity authentication service. It is capable of providing impervious protection for individual identity for financial transactions, credentialing and access control. The system consists of the identification confirm,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics