TITLE

Lobby Defense

PUB. DATE
July 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2007, Vol. 44 Issue 7, p44
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the electronic visitor management systems of Easy Lobby software that identify status of company's visitors in U.S. It was informed that the systems is intended for the accessibility of visitors security platform to the security authorities for emergencies. The technology features registering visitors via web, scanning identification cards, printing badges, controlling access and tracking visitation in the company buildings.
ACCESSION #
25774992

 

Related Articles

  • Minor Details Can Lead to Major Expenses. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Nov2010, Vol. 47 Issue 11, p88 

    The article focuses on the risk associated with the duplication of identification (ID) cards incorporating a different facility code. It states that the change or addition of code in the facility code of a person's ID card can cause a flowing effect of non-compatible hardware which could not...

  • LOCK DOWN YOUR PC. Spanbauer, Scott // PCWorld;Apr2004, Vol. 22 Issue 4, p103 

    Provides security measures for computer systems. Protection of the physical integrity of computers; Technique in preventing intruders to boot the system; Procedure in password-protection for the BIOS. INSET: Kill Viruses Before They Get You.

  • The ID Advantage. McNichols, Shawn // Security: Solutions for Enterprise Security Leaders;Jun2001, Vol. 38 Issue 6, p43 

    Discusses security benefits of company identifications (ID). Allowing workers to immediately identify unauthorized persons; General security of the facility; Integrating an employee ID as part of the company's access control system; Multi-purpose uses of employee photo ID.

  • You Need How Many IDs?  // Security: Solutions for Enterprise Security Leaders;Oct2001, Vol. 38 Issue 10, p35 

    Reports on advances in identification card security technologies as of October 2001. Amount of badging considered as high volume; Market segments that have high-volume needs; Cost-effective solutions available to the end user.

  • Preparation is Key to Avoiding Embarrassment. Ohlhausen, Peter E. // Security: Solutions for Enterprise Security Leaders;Jul2000, Vol. 37 Issue 7, p67 

    Focuses on lessons that security directors might culled from so-called tiger team sweeps. Importance of being prepared; Increased attention to badges and other identification cards; Need for employees to speak up and challenge unescorted visitors; Routine activities of official security testers...

  • Pilot ID System Begins Beta Testing. Beneson, Tom; Goyer, Robert // Flying;May2002, Vol. 129 Issue 5, p43 

    Reports on the beta testing of a security system that uses biometrics embedded in an identification smart card at FlightSafety International's training academy in Vero Beach, Florida.

  • Good Looks and Security, Too.  // Security: Solutions for Enterprise Security Leaders;Apr2009, Vol. 46 Issue 4, p54 

    The article discusses the essential elements involve in identification card and badge design. It is noted that it is necessary to consider the use of the cards and the level of security that the company needs, as well as determining the orientation of the cards. In addition, an inexpensive photo...

  • Site visitors get CSCS cards. d'Arcy, John // Contract Journal;5/15/2002, Vol. 413 Issue 6377, p6 

    Presents an update on the Construction Skills Certification Scheme (CSCS) cards for construction site visitors as of May 15, 2002. Description of the different kinds of visitor card; Information on the CSCS supervisor and management cards; Details of the possible affiliation agreement of CSCS...

  • II: SECURITY IN THE EDP CULTURE OF THE CENTRAL BANK OF THE BAHAMAS.  // Cuadernos de Investigacion Nueva Epoca;ene1995, Issue 35, p14 

    The article discusses the security system in place at the Central Bank of the Bahamas. The bank would rather not talk explicitly about their system so as not to compromise it in any way, particularly it's Electronic Data Processing (EDP) system. The paper also intends to review the history of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics