TITLE

Delayed Egress - The Pause that Refreshes

PUB. DATE
December 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Dec2008, Vol. 45 Issue 12, p38
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the component system of the delayed egress security system. It provides information on the things that needs to consider when it comes to electronic access control and specialized egress systems. Moreover, it presents information on requirements for delayed aggress locks which mentions that an audible local alarm must sound upon initiation of the release process.
ACCESSION #
35714724

 

Related Articles

  • Standards Rise as Access Matures. Spitler, Debra // Security: Solutions for Enterprise Security Leaders;Oct2004, Vol. 41 Issue 10, p18 

    This article reports that proximity technology is giving way to contactless smart cards; access control software is modular to let end users integrate access control, digital video, visitor management, fire and security, and other systems into a single platform. IT will continue to take a more...

  • Orchestrate vulnerability management. Andrew, Chris // Communications News;Aug2006, Vol. 43 Issue 8, p26 

    This article discusses ways to implement patch and vulnerability management within corporations. While patching and vulnerability assessment may seem like an arduous task, consistent mitigation of organizational vulnerabilities can be achieved through a thoroughly tested and integrated patching...

  • Managing Security Monitoring in Enterprise Networks. Priescu, Iustin; Nicolăescu, Sebastian // Petroleum - Gas University of Ploiesti Bulletin, Mathematics - I;2008, Vol. 60 Issue 2, p53 

    A significant number of high profile cases of malicious software threats and incidents that have dominated media reporting for years have served to raise awareness and determine most businesses to invest time and resources into defending against this prevalent security issue. Security monitoring...

  • Tightening Up On Pipeline Security. Cooper, Angus // Pipeline & Gas Journal;Feb2006, Vol. 233 Issue 2, p28 

    The article focuses on the physical and security threats in the gas industry. Supervisory Control and Data Acquisition is routinely developed throughout the worlds gas pipeline infrastructure as a way of protecting the industry from outside threats. The software provides real-time control,...

  • Northwest Electronic Security Has the Latest in Biometric Systems.  // Caribbean Business;10/27/2005, Vol. 33 Issue 42, pS10 

    Focuses on ACTAtek, the world's only biometric and smart card authentication system using encrypted and secure Web-based, real time communication, by Northwestern Electronic Security. Benefits of the biometric system; Functions of the system; Impact of the system on the security management industry.

  • Time-sensitive Upgrade to IP Video.  // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p52 

    The article discusses the upgrade on the security video system of Sho Ka Wah Casino in California. Terri Seigler implemented an advance Internet Protocol based digital surveillance system using intelligent and networking by Intelligent Edge Switches. The said installation comprised of 300...

  • WHAT CUSTOMERS WANT. Maddry, Terry // SDM: Security Distributing & Marketing;Mar2004, Vol. 34 Issue 3, p61 

    Shares insights on customer's preferences for access control systems. Attribution of changing access needs of the organization and problems with a current system as the two most important reasons why a buyer purchases a different electronic access control system; Factors affecting the...

  • Automatic Electronic Identity Provides Information Security. Jirásek, Petr // Signal;Jun2011, Vol. 65 Issue 10, p61 

    The article describes the Automatic Liberal and User-Centric Electronic Identity (ALUCID) security system designed and developed by ANECT using the electronic identities infrastructure principle. The system also employed the five main principles of automatic electronic identity (EI) which...

  • Moving Security Beyond Regulatory Compliance.  // Computer Economics Report;Oct2007, Vol. 29 Issue 10, p12 

    The article discusses the importance of implementing an organizational comprehensive security program that complies with a set regulations. Accordingly, a single security framework could harmonize and serve an organization to sustain efficiency in both regulatory audits and security programs....

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics