Access Control


Leveraging Data

Leveraging Data

Campus security, both in a corporate and higher education setting, can be improved by leveraging data from access control systems to drive future security decisions.

The Proper Foundation

Wakefield Grammar School Foundation has chosen a complete Tyco Security Products surveillance package that includes Illustra IP cameras and exacqVision network video recorders with exacqVision VMS software and Kantech EntraPass access control system pre-installed.



The Battle For Bandwidth

The Battle For Bandwidth

Helping customers understand the importance of effective bandwidth management is the key to designing a system that truly supports their needs and priorities.

Locking Up A Win

In the beginning, however, Yelinek was hardly an easy sell. In fact, in his own words he was “dead set against” changing lock brands. That’s because simplicity is a priority for Yelinek, who for the past 20 years has been the only locksmith for all of the college’s campuses.

Planning A Connected Campus

Campus Solutions

Planning A Connected Campus

Technology is changing rapidly, transforming the campus landscape. Mobility trends, real-time, location-based services/global positioning systems (GPS) and even social media are having an impact.

Scalable and Cost Effective

Maintaining and/or upgrading physical security systems is a challenge for schools across the country, and the Brunswick School Department is no different.

Guarding Valuables

Guarding Valuables

Berklee College of Music is home to a lot of talented musicians, but also to a variety of expensive audio equipment.

Streamlining Card Issuance

Streamlining Card Issuance

One of the easiest ways to achieve this is to choose an ID issuance solution that allows the card issuer to combine multiple issuance steps into a single and seamless process—all from within the same printing device.

Holding an Open Door

A top tier university serving more than 40,000 students needed a cost effective way to improve the level of security at its non-card access controlled doors.

Organizing a Team

Now that mobile identities can be carried on phones for physical security applications, they are merging with smart cards into centralized identity management systems.

Digital Edition