Next Gen Access Means an 'IP Door'

February 2008
Security: Solutions for Enterprise Security Leaders;Feb2008, Vol. 45 Issue 2, p50
Trade Publication
An interview with Stephen Pineau, chief executive officer (CEO) of Viscount Systems Inc. (VSI), is presented. When asked on will Internet Protocol (IP)-based readers improve reliability, he replies that if networks fail, IP-based readers can function in a degraded mode, and it can use high availability measures that are not typical with control panels. Furthermore, he said that in an IP world, the only difference between an intercom, a camera, and a card reader is the type of data.


Related Articles

  • IP Cameras Will Change Your Life.  // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p62 

    The article discusses the use of Internet Protocol (IP) cameras in physical security in the United States. The challenge for enterprises seeking return on investment is determining how long it will take for IP cameras to dominate. As digital camera technology continues to improve, the cost...

  • SUCCESS STORIES IN IP ALARM TRANSMISSION. Engebretson, Joan // SDM: Security Distributing & Marketing;Jul2006, Vol. 36 Issue 7, p77 

    The article focuses on the popularity of Internet protocol alarm transmission and the benefits it offers to subscribers of security system subscribers. IP alarm transmission is usually used for fire alarm transmission, high-security intrusion alarm or to get along with IP phone service. Six...

  • IP Alarm Transmitters. Engebretson, David // SDM: Security Distributing & Marketing;Jul2006, Vol. 36 Issue 7, p104 

    The article focuses on security equipment manufacturers' development of Internet Protocol alarm transmitters. The devices interface with burglar and fire alarm control panels then transmits alarm, trouble and status reports over the local area network or the Internet. Signals can be received and...

  • Digital Video as a Starting Point. Freschi, Cynthia // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p56 

    The article focuses on enterprise security systems, which are network-based that uses Internet Protocol-based technology to relay information between locations and subsystems. Enterprise security systems offer such benefits as the capability to manage all of the systems from a centralized...

  • 7 Myths about IP Access Control to the Door.  // Security: Solutions for Enterprise Security Leaders;Dec2007, Vol. 44 Issue 12, p40 

    The article discusses several myths about Internet protocol (IP) access control for security operations. First, IP access control is untested and unproven when compared to a traditional, hard-wired solution. Next, IP access control is more vulnerable to security breaches or hackers that can open...

  • IP Video Surveillance: An Investment in the Future. Freschi, Cynthia // Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p130 

    The article focuses on the factors that make Internet Protocol (IP)-based video surveillance and security systems an investment in value and versatility. According to the author, many industry experts have misconceptions about the nature of IP and networked systems due to erroneous marketing...

  • The Convergence of Physical and IT Security. Cavanaugh, Ray // Security: Solutions for Enterprise Security Leaders;Sep2012, Vol. 49 Issue 9, p48 

    The article focuses on the convergence of information technology (IT) and physical security. It notes that guards deter possible security breaches through their presence and react to these breaches as they occur. Digital internet protocol (IP) video systems enable roaming guards to receive...

  • Security tool can 'frisk' PCs. Musich, Paula // eWeek;11/16/2005, Vol. 22 Issue 45A, p19 

    The article reports on the new use of the automated Internet protocol (IP) address management. The automated IP address management has discovered to create an extra layer of endpoint security and access control. MetaInfo Inc. is working with customers and partners to use the point at which users...

  • Wired Malls. Long, Jessica // San Diego Business Journal;8/15/2005, Vol. 26 Issue 33, p55 

    Reports on the security and communication services utilized by shopping malls through wired and wireless Internet-protocol-based networks by Wireless Facilities Inc. in San Diego, California.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics