Delayed Egress - The Pause that Refreshes

December 2008
Security: Solutions for Enterprise Security Leaders;Dec2008, Vol. 45 Issue 12, p38
Trade Publication
The article offers information on the component system of the delayed egress security system. It provides information on the things that needs to consider when it comes to electronic access control and specialized egress systems. Moreover, it presents information on requirements for delayed aggress locks which mentions that an audible local alarm must sound upon initiation of the release process.


Related Articles

  • Standards Rise as Access Matures. Spitler, Debra // Security: Solutions for Enterprise Security Leaders;Oct2004, Vol. 41 Issue 10, p18 

    This article reports that proximity technology is giving way to contactless smart cards; access control software is modular to let end users integrate access control, digital video, visitor management, fire and security, and other systems into a single platform. IT will continue to take a more...

  • Orchestrate vulnerability management. Andrew, Chris // Communications News;Aug2006, Vol. 43 Issue 8, p26 

    This article discusses ways to implement patch and vulnerability management within corporations. While patching and vulnerability assessment may seem like an arduous task, consistent mitigation of organizational vulnerabilities can be achieved through a thoroughly tested and integrated patching...

  • Ground Yourself for Power Quality.  // Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p96 

    The article focuses on the need to understand the electrical sensitivity of elements of a security system to resolve common power quality problems. It is noted that changes in the characteristics of the power supply to the components of a security system are caused by several sources. Components...

  • Managing Security Monitoring in Enterprise Networks. Priescu, Iustin; Nicolăescu, Sebastian // Petroleum - Gas University of Ploiesti Bulletin, Mathematics - I;2008, Vol. 60 Issue 2, p53 

    A significant number of high profile cases of malicious software threats and incidents that have dominated media reporting for years have served to raise awareness and determine most businesses to invest time and resources into defending against this prevalent security issue. Security monitoring...

  • Tightening Up On Pipeline Security. Cooper, Angus // Pipeline & Gas Journal;Feb2006, Vol. 233 Issue 2, p28 

    The article focuses on the physical and security threats in the gas industry. Supervisory Control and Data Acquisition is routinely developed throughout the worlds gas pipeline infrastructure as a way of protecting the industry from outside threats. The software provides real-time control,...

  • HOW SECURE are Internet Connections? Moss, John // Security: Solutions for Enterprise Security Leaders;Apr2005 Supplement, Vol. 42, p20 

    Shares the author's thoughts about Internet security systems. Solutions to the problem of sending data securely over the Internet; Utilization of a VPN connection; Advantages of using access control panels.

  • Switch-mode supply ready for back-up.  // Electronics Weekly;9/15/2004, Issue 2162, p36 

    The article presents information on a 170W switch-mode power supply, introduced by VxI Power, that is designed to be used in conjunction with a single backup battery to provide standby power for low-power systems. Available in two versions offering outputs of either 12V or 24V, the Oracle 11-170...

  • Privacy-Preserving H.264 Video Encryption Scheme. SuGil Choi; Jong-Wook Han; Hyunsook Cho // ETRI Journal;Dec2011, Vol. 33 Issue 6, p935 

    As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been...

  • Northwest Electronic Security Has the Latest in Biometric Systems.  // Caribbean Business;10/27/2005, Vol. 33 Issue 42, pS10 

    Focuses on ACTAtek, the world's only biometric and smart card authentication system using encrypted and secure Web-based, real time communication, by Northwestern Electronic Security. Benefits of the biometric system; Functions of the system; Impact of the system on the security management industry.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics