Nathan Bearman

Honeywell CT40 Rugged Support

Blog Honeywell CT40 Rugged Support September 5, 2020 Honeywell CT40 Support The Honeywell CT40 is a rugged Android handheld computer for data capture applications.  It is the ideal product for visitor management and access control security use. EvTrack now features support for the device in a 64-bit format under Android 9.

cybersecurity access control tips

Access Control Design Tips Part #5 (Cybersecurity)

Blog Access Control Design Tips Part #5 (Cybersecurity) June 22, 2020 Cybersecurity, the Hidden yet deadly Access Control Enemy With cloud-based access/control systems, remote management, configuration and monitoring has become easier. However, security risks and vulnerabilities have been introduced as more security physical systems are now connected to corporate networks and/or the internet. Companies large …

Access Control Design Tips Part #5 (Cybersecurity) Read More »

The New Signature Luxury Mixed-Use Development features 2N Access Control Hardware combined with EvTrack Visitor Management & Access Control Cloud Software.

Blog The New Signature Luxury Mixed-Use Development features 2N Access Control Hardware combined with EvTrack Visitor Management & Access Control Cloud Software. June 15, 2020 The developer’s requirement was for an easy-to-use all-in-one system combined with robust physical security and temporary visitor credentials for multiple security layers. This includes guard identification scanning, elevator access control …

The New Signature Luxury Mixed-Use Development features 2N Access Control Hardware combined with EvTrack Visitor Management & Access Control Cloud Software. Read More »

Access Control Design Tips #4

Access Control Design Tips Part #4 (Operational)

Blog Access Control Design Tips Part #4 (Operational) June 7, 2020 Operational Best Practise for Electronic Access Control Systems 1.) Remove Lost/Unused Tags – Ensure keyfobs, cards, remotes & other credentials are removed from the system when people leave the site or the credential is lost or stolen. 2.) Separate Visitor Databases – Avoid systems …

Access Control Design Tips Part #4 (Operational) Read More »

Scroll to Top