Access control (541)

Displaying 'Access Control' tags 1 - 25 of 541 in total

Add Door Operators To Fight Coronavirus

(Member Only)

IPVM recommends that integrators advocate and end-users consider adding door operators to fight the spread of coronavirus. This delivers mutual benefits - providing business to integrators in a slowdown and improving the attractiveness and he...

By Brian Rhodes - 6 days ago

Access Control Course Spring 2020 - Save $50 Last Day

Register Now - Spring 2020 Access Control Course. Today, March 26th is the last day to save $50. IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the sys...

By Brian Rhodes - 12 days ago

IPVM Launches On-Demand Courses

For nearly a decade, IPVM has been a leader in online live courses. Now, we have added on-demand versions for all courses. The same course materials (videos, tutorials, quizzes, assignments, exams) are now available for on-demand. Start wheneve...

By IPVM Team - 13 days ago

Help Security End Users Facing Coronavirus Improve Remote Access

(Member Only)

Many end-users and integrators are struggling with the impact of coronavirus lock downs but remote access can help both sides during this time. In this note, we explain how integrators can increase service opportunities during this time while...

By Brian Rhodes - 13 days ago

How Mobile Access Control Can and Cannot Help With Coronavirus

(Member Only)

With coronavirus concerns continuing to rise, many access control companies have pitched mobile access control as safer but how much are they? And what should be done? Inside this report, we examine: Door Operators vs Mobile Access Corona...

By Brian Rhodes - 14 days ago

Vehicle Gate Access Control Guide

(Member Only)

Vehicle gate access control demands integrating various systems to keep unauthorized cars out. Everything from high voltage electrical, to concrete modification, trenching, welding, low voltage systems (<50 volts), and manual labor is requ...

By Brian Rhodes - 18 days ago

Facial Recognition 101

(Member Only)

Facial recognition interest, use and fear is increasing. This guide aims to teach you the fundamentals of facial recognition. Inside we cover: Face Detection Face Recognition 1:1 vs 1:N Cooperative vs Uncooperative Resolution / Image Req...

By IPVM Team - 19 days ago

Proxy Raises $42 Million

(Member Only)

Startup Proxy has raised $42 million, an astounding amount for the access control market. For background, see our Proxy access control test. How did they get much funding? What do they aim to do with it and to the market? We spoke with Proxy e...

By John Honovich and Brian Rhodes - 20 days ago

New: Mobile Access Proxy Releases 'World's Smallest Mobile Reader'

(Member Only)

Mobile access provider Proxy claims its new Nano is 'the world’s smallest mobile reader' that can be installed into nearly all existing access systems. However, Nano is not a full reader, but more accurately an adapter that requires a reader to...

By Brian Rhodes - about 1 month ago

Train Your Team With IPVM Courses From Experts

You trust and use IPVM for reporting and research and you can also have your team trained by our experts. One of the most common requests our support team gets is how members can get their co-workers or employees trained. This explains how and ...

By Donald Maye - about 1 month ago

Hazardous & Explosion Proof Access Control Tutorial

(Member Only)

Controlling access to hazardous environments requires equipment meeting specific ratings that certify they will not start fires or will not introduce potential contamination risks. Understanding those ratings mandate careful selection. Inside t...

By Brian Rhodes - about 1 month ago

Vulnerability Directory For Access Credentials

(Member Only)

Knowing which access credentials are insecure can be difficult to see, especially because most look and feel the same. Even insecure 125 kHz types are still widely used, and using 13.56 MHz smartcards is no guarantee the format has not been h...

By Brian Rhodes - about 2 months ago

Access Control ADA and Disability Laws Tutorial

(Member Only)

Safe access control is paramount, especially for those with disabilities. Most countries have codes to mandate safe building access for those who may have difficulty with 'traditional' building design. In the US, the "Americans with Disabilitie...

By Brian Rhodes - about 2 months ago

BluB0X Alleges Lenel, S2, Software House Are Dinosaurs

(Member Only)

BluB0X is running an ad campaign labeling Lenel, S2, Software House, Honeywell, AMAG and more as dinosaurs: In a follow-up email to IPVM, BluB0X's CEO told us they were inspired by Elon Musk and how he sees BluB0X like Tesla in access control. ...

By John Honovich and Brian Rhodes - about 2 months ago

BICSI For IP Video Surveillance Guide

(Member Only)

Spend enough time around networks and eventually someone will mention BICSI, the oft-referenced but only vaguely known standards body prevalent in the IT world. The question is: how do BICSI and their guidelines practically affect your surveillanc...

By IPVM Team - about 2 months ago

Access Credential Form Factor Tutorial

(Member Only)

Deciding which access control credential to use and distribute, including form factor, can be a difficult task. Knowing the limitations and strengths of common form factors will help the integrator recommend the right choice. In this note, we ...

By Brian Rhodes - about 2 months ago

Genetec Security Center 5.9 Release Examined

(Member Only)

Genetec released the next major version of Security Center, less than a year after version 5.8. This also follows no Genetec major releases in 2018. In this note, we examine this update, with feedback from Genetec, and review key features and i...

By Sean Patton - 2 months ago

Delayed Egress Access Control Tutorial

(Member Only)

Delayed Egress marks one of the few times locking people into a building is legal. With so much of access control driven by life safety codes, and a predominant focus of 'free egress' during an emergency, 'delayed egress' is contrary in preventin...

By Brian Rhodes - 2 months ago

Verkada Raises $80 Million, Triples Valuation To $1.6 Billion

(Member Only)

Verkada's rocketing valuation continues. 9 months ago, they got a half-billion valuation and now they have announced more than triple that, at $1.6 billion, raising $80 million more. The most amazing thing? Verkada's next big thing is physical ...

By John Honovich - 2 months ago

Breaking Into A Facility Using Canned Air Tested

(Member Only)

Access control is supposed to make doors more secure, but a $5 can of compressed air may defeat it. With no special training, intruders can unlock access doors and walk through without alarming the system. Inside, we demo the exploit and exami...

By Brian Rhodes - 2 months ago

Brivo Business Profile 2020

(Member Only)

Brivo has been doing cloud access for more than 20 years. Is the 2020s the decade that cloud access becomes the norm? CEO Steve Van Till recently briefed the Imperial Capital Security Investor Conference and talked to us about Brivo's positive gr...

By John Honovich and Brian Rhodes - 2 months ago

Favorite VMS / NVR Manufacturers 2020

(Member Only)

In 2018, a new winner emerged and a former top choice declined. Now, there is a new #1, a new top 5 finisher and 2 major VMSes in decline. Our 2020 Favorite VMS results (from 200+ respondents) is the first to include a breakdown of responses fr...

By IPVM Team - 2 months ago

Multipoint Door Lock Tutorial

(Member Only)

Despite widespread use, locked doors are notoriously weak at stopping entry, and thousands can be misspent on locks that leave doors quite vulnerable. Using locks with multiple latches is one way to improve door security against attacks. Insid...

By Brian Rhodes - 2 months ago

Vehicle & Long Range Access Reader Tutorial

(Member Only)

One of the classic challenges for access control are parking lots and garages, where the user's credential is far from the reader. With modern access systems, the basic methods of increasing the read distance mean using special readers, credential...

By Brian Rhodes - 3 months ago

Displaying 'Access Control' tags 1 - 25 of 541 in total