Articles Search Results

233 Articles and 1 related Products found for logical
  • Usability Key to Access Control Software Success
    Although the marketplace is replete with software providers, not all can offer user satisfaction. ASMAG.com speaks to three Asian vendors and identifies how they embody the fundamental characteristics of effective access control management software.
    Editor / Provider: The Editorial Team | Updated: 2008 / 10 / 14
  • Integrated Security: Just What the Doctor Ordered
    Health care facilities range from large hospitals to clinics, all to serve patients needing medical attention. Granting patients access, while keeping threats out, forms the delicate balancing act for health care security.
    Editor / Provider: a&s International | Updated: 2008 / 10 / 8
  • When Building Automation Meets Security Integration
    Johnson Controls offered an insider view on central management systems at the Global Digital Surveillance Forum.The integration of disparate building systems is a hot topic these days. While there is a consensus that intelligent building system integration produces greater comfort, sustainability an
    Editor / Provider: Submitted by Johnson Controls | Updated: 2008 / 9 / 11
  • Airports Secured With Quality Technology
    Security providers discuss how their solutions are deployed at airports around the World
    Editor / Provider: Submitted by Pelco, Siemens Building Technologies, Orad and Zenitel | Updated: 2008 / 7 / 16
  • EURO 2012: Defining Moment for Polish Security
    After a series of security incidents and terrorist attacks in the United States and Europe, Poland has placed a significant emphasis on security of critical infrastructure within the country and its borders. In Poland, security at major airports and ports, border crossings and government buildings i
    Editor / Provider: Hayden Hsu | Updated: 2008 / 6 / 13
  • The Dawning of Next Generation Government Electronic IDs (Part II of II)
    The use of RFID in government documents will make identification easier, but will also have potential security risks. In the second of two articles, Joseph Pearson, Government Identification Marketing Manager, RFID Systems for Texas Instruments, discusses how technological breakthroughs will protect
    Editor / Provider: SUBMITTED BY TEXAS INSTRUMENTS | Updated: 2008 / 3 / 20
  • Safeguarding Financial Institutions
    In 2006, the financial services vertical in the U.S. purchased US$1.9 billion in electronic security, guard services and physical security equipment such as safes and vaults, according to an ADT-commissioned McKinsey research report. Similar amounts are being spent in Europe and East Asia. A&S talks
    Editor / Provider: a&s International | Updated: 2008 / 2 / 13
  • Web-Based Access Control : Staying in Control of Your Building Wherever You Are
    Web-based access control have revolutionized the conventional way of access control. In this article, George Redpath, Director of Engineering at CEM Systems, discusses other integration that need to be taken into consideration for complete control of a building.
    Editor / Provider: Submitted BY CEM Systems | Updated: 2008 / 1 / 30
  • Eight Trends That Will Shape Security in' 08
    When former IBM CEO Louis Gerstner, Jr. began his quest to turn around the once-troubled company, he asked an auditorium full of corporate customers what he could do to help them manage their businesses and technology platforms better. Someone from the back called out, ¨Slow it all down!〃 The group
    Editor / Provider: Submitted by ADT Security Services | Updated: 2008 / 1 / 8

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code