The Forgotten and Oft-Neglected Door Closer

Johnson, Joel
May 2010
Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p46
Trade Publication
The author discusses the significance of using door closer. He explains the myriad of uses and functions of the door closer in electronic card access applications and in providing physical security, user convenience and compliance. Moreover, the author emphasizes the benefits of the door closer particularly in controlling common access and offering security management combined with integrated electronic access and video systems.


Related Articles

  • Video Verification: Use it Wisely! Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Dec2010, Vol. 47 Issue 12, p42 

    The article discusses the importance of using video verification efficiently in security management in the U.S. It mentions that the use of video cameras in security systems verify whether an intrustion alarm is false or genuine. It states that video verification in electronic access control...

  • United Building Security: Urban Challenges, Diverse Solutions.  // Security: Solutions for Enterprise Security Leaders;Mar2004, Vol. 41 Issue 3, p22 

    Focuses on the employment by Martin Cramer, vice president of the Downtown Dallas Security Directors Association, of a security video system for the facility of Dallas, Texas-based United Building Security. Description of the facility; Availability of the video system on a local area network;...

  • Fingerprint biometrics advance.  // Network World;2/27/2006, Vol. 23 Issue 8, p8 

    The article reports that researchers in the University of Buffalo stated that they have improvised a fingerprint detecting system to improve the security of wireless handheld devices and Web sites. The research findings was speculated to help eliminate the complexity password security systems...

  • Time-sensitive Upgrade to IP Video.  // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p52 

    The article discusses the upgrade on the security video system of Sho Ka Wah Casino in California. Terri Seigler implemented an advance Internet Protocol based digital surveillance system using intelligent and networking by Intelligent Edge Switches. The said installation comprised of 300...

  • Best Practices to Manage Access for Temporary and Contract Workers. Dubin, Cindy H. // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p42 

    The article focuses on the best practices employed by companies to manage access for temporary and contract workers. It highlights the pre-emptive measures undertaken by Ace Hardware Corp. in performing same level screening for full- and part-time employees. It also suggests the importance of...

  • Online with Caryn McBride. McBride, Caryn // Fairfield County Business Journal;8/3/2009, Vol. 48 Issue 31, p2 

    An interview with Internet technology executive Keith Reynolds is presented. Reynolds talks about Internet protocol (IP) and radiation technology, and cites its significance for all businesses. He says that IP with radiation detection security is very important to detect unlawful attacks to...

  • Security Goes Online with Web-enabled Features. Hodgson, Karyn // Security: Solutions for Enterprise Security Leaders;Oct2000, Vol. 37 Issue 10, p11 

    Suggests that the Internet is becoming a viable outlet for business security systems in the United States. Advantages of using the Web in business security; Web-enabled devices used by businesses; Use of the internet to accomplish security integration.

  • Getting IT Right.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p23 

    Discusses the collaboration between security and information technology (IT) executives. Purchasing of software and hardware; Mission to secure an organization's computer and information assets; Security directors' responsibility for information protection and traditional physical security;...

  • Coevolution.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p24 

    Discusses the evolution of the partnership between security system directors and information technology (IT) managers. Acceleration of technology into the security; Integration of security systems; Tools shared by IT and security; Organizations' increased demand for the seamless integration of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics