Consistency Adds to Access Effectiveness

Dingle, Jeffrey
April 2008
Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p52
Trade Publication
The article reports on the implications of an access control system. Access control varies from specifically controlling access to assuring that people entering a facility do not have weapons or explosives. The U.S. government has developed an access control system that requires positive identification of a person, known as the Transportation Worker Identification Credential (TWIC).


Related Articles

  • HSPD-12 AWARENESS LAGGING.  // Government Security;Dec2005, Vol. 4 Issue 8, p8 

    This article presents information on issues related to the compliance with the Homeland Security Presidential Directive 12 (HSPD-12) standard in the U.S. It is informed that about half of federal government information technology professionals are not aware of HSPD-12. In addition to creating...

  • HOMELAND SECURITY FOCUS. McHale, John // Military & Aerospace Electronics;Mar2005, Vol. 16 Issue 3, p20 

    Reports developments related to the homeland security and management in the U.S. Creation of Additional Seattle to the U.S. Department of Homeland Security's Regional Technology Integration initiative; Supply of the U.S. military with 14 portable walk-through metal detectors for the elections in...

  • Intrusion secures status for U.S. Army at Fort Huachuca. McHale, John // Military & Aerospace Electronics;Mar2005, Vol. 16 Issue 3, p20 

    Reports on the completion of information security project of Intrusion Detection Inc. officials with the U.S. Army's Directorate of Information Technology (DOIM) in Fort Huachuca, Arizona. Inclusion of the project; Purpose of the security project; Recognition of the Fort Huachuca DOIM on the new...

  • Foiling the Future Burglar: A Scenario for 2008. Stephens, Gene // Futurist;Mar/Apr88, Vol. 22 Issue 2, p28 

    Presents a fictional scenario illustrating a potential future of technologies designed to prevent crime in the home. Use of lasers in homes as a form of burglary prevention; Description of Conrad, a computer security system that operates on voice recognition technology; Features of Conrad;...

  • The Bs: Barriers, Booths, Badges. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;May2005, Vol. 42 Issue 5, p26 

    Provides tips on how to protect facilities from unauthorized vehicles and visitors in the U.S. Emergence of blast-resistant guard booths; Relevance of visitor identification systems and more versatile guard tour systems; Design of the Sky Watch mobile tower.

  • Weighing up the security options.  // Computer Weekly;4/25/2006, p24 

    The article presents information related to information security. It is reported that the 11 commandments on security infrastructure provide a rapid evolution to a new security paradigm. Moreover, it is informed that the Jericho group, which is backed by many FTSE 100 companies, has been...

  • What's the Price of Outsourcing? Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p44 

    The article reports on the implications of having an electronic employment verification (EEV) system in the U.S. According to a Cato Institute study, the EEV is ineffective, intrusive and expensive. It notes that implementing a full-fledged EEV has many practical and technical problems and would...

  • WHAT CUSTOMERS WANT. Maddry, Terry // SDM: Security Distributing & Marketing;Mar2004, Vol. 34 Issue 3, p61 

    Shares insights on customer's preferences for access control systems. Attribution of changing access needs of the organization and problems with a current system as the two most important reasons why a buyer purchases a different electronic access control system; Factors affecting the...

  • Time-sensitive Upgrade to IP Video.  // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p52 

    The article discusses the upgrade on the security video system of Sho Ka Wah Casino in California. Terri Seigler implemented an advance Internet Protocol based digital surveillance system using intelligent and networking by Intelligent Edge Switches. The said installation comprised of 300...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics