As technology continues to expand, your decisions begin to become more and more complicated. What was once as simple as picking a manufacturer and grabbing a box of 24 VHS tapes is now so much more complex. In the… Read More
Posts Tagged ‘security systems’
Putting Wireless to Work for You
In today’s economy, one thing is for certain; budgets are as tight as they have been in recent memory. But a small budget does not excuse the use of poor security technology. Because of this, wireless intrusion technology has become… Read More
IP Video Builds on What you Know
Despite all the advantages that IP video lends to the security field, less than 15 percent of current video surveillance systems utilize this technology. Security managers are often leery to switch from a system, analog, that they are very comfortable… Read More
Building an ideal communication network
If you are under the assumption that you can accomplish your communication goals and the ideal communication network with one product, you have been misled. In order to build a network that meets both your current and long term goals,… Read More
Proximity Card Access Systems
What is a proximity access card? A proximity access card is a card about the size of your driver’s license that can open and activate doors so that the holder of the card can enter. Embedded in the card is… Read More
A broader view of access control
There’s more to effective access control than just putting up some fences, cameras, and security lighting. As this article outlines, access control also encompasses determining which zones of a facility require protection and what level of protection each zone requires. Access to these protected zones almost always involves a method of identifying personnel, and there are many different ways of doing this. Here are two main categories.
More on the Yellow Threat Condition
Building on our last post on Green and Blue Threat Conditions, we’d like to continue with more information on the Yellow (Elevated) Threat Condition, which happens to be the current threat level. This level indicates a significant risk for a terrorist attack, and as this page details, suggests organizations take the following steps: