Security Technology Executive

JAN-FEB 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/107544

Contents of this Issue

Navigation

Page 12 of 35

POWERED BY PRODUCT SHOWCASE ACCESS CONTROL Identity Management from a Browser Centrally manage card holder identities in physical access control systems (PACS) to create a single identity across the organization with Quantum Secure's SAFE Physical Identity & Access Manager. The browser-based software ensures synchronized and policybased on/off-boarding of identities and access levels across disparate systems. Cloud-Based Physical Access Control Stay compliant with HSPD-12, FICAM and OMB M-11-11 regulations with XTec's AuthentX cloud-based access control solution. FISMA certified and available through GSA IT Schedule 70, it comes complete with credential issuance and identity management functionality. A web-based interface enables end-users to update card reader functionality remotely, assign and remove permissions, create access groups, and monitor all access requests. Request more info at www.securityinfowatch.com/10857079. Run Access Control through Windows Request more info at www.securityinfowatch.com/10524335. Stainless Steel Doors Steelcraft stainless steel LS-Series doors and FS-Series frames from Ingersoll Rand Security Technologies offer effective performance even in harsh environments such as waste water treatment plants, food processing plants, bio laboratories and indoor aquatic environments. The doors, frames and internal components are fabricated from 100 percent stainless steel to ensure that there is no contamination from dissimilar metals that can result in galvanic corrosion. Request more info: Integrated Identity Management and Surveillance RedCloud Virtual is a web-based access control virtual appliance that leverages an open architecture to integrate identity management and video surveillance. VMwareready for deployment in a virtual server environment, the software is built for organizations that have migrated IT infrastructure to a secure, private cloud, enabling the maintenance of enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud. Request more info at Continental Access, a division of Napco Security Technologies Inc., has released new CA3000 version 2.9 software with new features that enable the software to be run as Windows services, along with the ability to control access to its GUI using Lightweight Directory Access Protocol (LDAP). The system provides robust access control functionality and seamless integration with alarms, locking and a growing list of video systems. Request more info at www.securityinfowatch.com/10834305. www.securityinfowatch.com/10742357. www.securityinfowatch.com/10723450. Safeguard Water Supplies Laser-Engraved ID Cards Protect access points in drinking water distribution systems against the threat of intentional contamination with Bilco's CNIguard intrusion detection system. The system uses a patented sensing technology to detect tampering such as drilling, grinding and cutting, while virtually eliminating false alarms. Request more info at www.securityinfowatch.com/10857107. Leverage versatile laser engraving technology in card identity systems with the Fargo HDP8500LE Industrial Card Laser Engraver system from HID Global. Designed for high-security state and government eID programs and other applications requiring advanced visual security, the system permanently engraves a range of unalterable attributes (both visual and machine-readable) into cards, making forgery and alteration virtually impossible. Request more info at www.securityinfowatch.com/10825473. Want more new products? Updated every day, the SecurityInfoWatch.com Buyer's Guide features the security industry's newest products in a searchable, on-demand format. Check it out at www.securityinfowatch.com/directory now! www.SecurityInfoWatch.com SECURITY TECHNOLOGY EXECUTIVE • January/February 2013 13

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JAN-FEB 2013