blog

Morristown is the latest town in New Jersey to issue municipal identification cards for residents. Click here to see the complete article.

For a video explaining how these cards will be used in Morristown click here.

temp-post-image

Read more

The idea of trying to keep students, faculty, staff and all of their sensitive information safe, can seem like an overwhelming and impossible task. And while, it may not be possible to thwart off every possible security breach, there is a way to help guard against the most common threats.

By integrating high quality secure access ID cards with an up-to-date IT system, the risk of a security breach greatly decreases. The organization can better manage user data stored on the ID card, protect daily functionality performed, and integrate their access cards with other security measures to provide greater physical and cyber security on its campus. To read the full article click here.

One of the biggest obstacles to organizations is determining the best way to protect their assets. Enterprises should consider both physical and logical security when they determine what applications would help them the most. This takes a team approach between HR, Security and IT. Tom Stiles, the Executive Director of the ISG, provides a list of things to consider when choosing a system. To see the complete article, click here.

  1. Card Technology
  2. Card Durability
  3. Security of System
  4. Use of Biometrics
  5. Logical Access
  6. Public Key Infrastructure
  7. Cost

Elliott Data Systems is a member of the ISG nationwide network of Identification Solution Experts. To learn more about what products Elliott has to protect your company, please contact us at 1-888-345-8511 or visit www.elliottdata.com

Mobile Access Control is an efficient, safe and reliable way to protect your physical and data security. There are now over 2.5 billion smartphone users in the world today, and that is why Mobile Access Control is so important and beneficial to protecting your employees, your organization and your assets. Mobile Access uses multi-layer authentication to provide a highly secure and convenient credentialing system. Click here to learn about the Top 10 Reasons You Should Embrace Mobile Access Control.

Recent studies have shown a dramatic uptick in becoming a mobile-first world. This trend has spread into the workplace, therefore creating a need for operational efficiency and mobile access control. Mobile devices can support technology that provides the most secure digital credentials that can be used within a connected network. More benefits include:

  1. More convenient end-user experience
  2. More efficient to manage
  3. Simple enrollment for end users
  4. Quick and easy management of multiple locations
  5. Reduced expenses of maintaining multiple systems

Click here to learn more about the latest mobile access trends in this HID executive brief.

Learn everything you need to know about smart card basics.

temp-post-image

Read more

temp-post-image

Read more

temp-post-image
Read more

temp-post-image

Read more

The recent global cyber attack demonstrates how vulnerable many organizations are to the ongoing cyber security challenges today. Patrick Woods, Missouri Highway Patrol CISO spoke at Elliott’s recent “Security Technology Summit” about the Internet of Things (IOT) and its never-ending connectivity of nearly everything in our lives. As Patrick summarized, it is very convenient to have a refrigerator, thermostat, or hot water heater that can be managed remotely but do you really know if these devices are protected and are not being compromised. You cannot protect everything, but you can start with the most common ways that data is compromised.

1. Your Trash Can. Still one of the number one ways that a crook can steal you...

Read more

 


contact us