The University of Nottingham is renowned for its research innovations. Its system to control access and to secure the facilities no longer reflected its commitment to excellence in the advancement of technology.
Ten million inhabitants of Germany and the Netherlands live within 60 minutes’ drive from the airport, making it an important gateway in the region.
To comply with the highest standards of airport security, Airport Weeze recently updated and improved its security measures with AEOS.
Ziggo Dome played host to a seemingly never-ending stream of leading national and international singers and bands. Increasing visitor numbers indicate the growing popularity of what is now known as the music Mecca of the Netherlands. An event venue of this type requires specific security measures and systems.
If you’re a security manager, you’ll know how many different factors are involved when securing buildings and premises.
You draw up a security policy to prescribe the appropriate security measures, but how do you then implement that policy?
Traditional access control systems assign access rights to identifiers such as badges, fingerprints or PIN codes. It seems sensible, but there’s a problem. It means the identifier has the authorisation to enter – rather than the person or vehicle that needs access.
In the digital world, people own personal information just like they own physical assets such as cash, keys and clothes in the real world. But because personal information is intangible, its value has been overlooked by many for a very long time. With the increase in cybercrimes on personal data and the high profile data breaches, this issue has become more prominent.