Articles

Posted: 10/30/12

Last week I discussed some of the popular questions and answers on networked access control from my perspective as an analyst at ARC Advisory Group. With open and scalable architecture being a key area of interest right now for IP-enabled systems, I will continue this discussion with a related question:

Do you...


Posted: 10/23/12

As an analyst and member of the Automation Systems research team at ARC Advisory Group, I'd like to take a moment and share our viewpoint on some of today's most frequently asked questions regarding networked access control solutions.

How quickly do you believe the physical security and...


Posted: 08/28/12

HID Global has been continually receiving inquiries regarding the trend towards converged physical and logical access control, but what does it take to make this increasingly important technology a reality for government and enterprise organizations?

While converged access projects can often leader to broader identity management initiatives, a basic converged access solution requires...


Posted: 08/22/12

It is no surprise that airports look to HID Global when challenged to deploy multiple layers of access control for restricted areas, while providing a flexible solution that is convenient and accommodates high volume traffic with large numbers of users.

In Latin America, HID Global is the trusted brand for major airports, including the...


Posted: 08/15/12

The Bring Your Own Device (BYOD) mobility deployment phenomenon - where you're allowed to use your smartphone for work -- is growing in popularity as today's smartphones simultaneously grow in capabilities.

We can use our phones to access computers, networks and associated information assets, and to open doors and enter secured areas. Deploying these applications in a BYOD...


Posted: 08/07/12

The goal of the Department of Homeland Security for the U.S. Green Card is to stay years ahead of counterfeiting techniques.

In a card designed to last 10 years, this is vital. This objective has driven breakthroughs in micro imaging and printing, visual security and optically variable...


Posted: 07/18/12

Visual security plays a huge part in the success of the U.S. Green Card for a highly pragmatic reason. While the role of machine-readable technology and intricate layers of overt, covert and forensic security features are key to the program, visual security is a front line defense at many U.S. borders and inspection points.

It's surprising but true that, no matter how advanced the...


Posted: 06/20/12

After my first year representing HID Global in the APAC region, I am more excited than ever about the expanding opportunities for RFID applications and HID Global's readiness to lead these advancements.

HID Global recently exhibited at AIDC/RFID China, the trade show that explores the Internet of Things (IOT). Utilizing...


Posted: 06/12/12

We're always explaining the many advantages of using our visitor management software. But often overlooked is the benefit of improving an organization's image by helping manage visitors more professionally.

It's easy to see how visitor management improves security by identifying, screening, and tracking who is in your facilities and the reason why. Improving ones image is less clear,...


Posted: 05/30/12

Last week at the Security Document World show in London, I had the opportunity to meet with several leading integrators and representatives from a number of different governments across Europe and beyond to discuss the key requirements for ID card personalization equipment that is used for large ID projects.

The integrators and representatives all spoke about the growing demand for...


Pages