White Papers for Federal, State & Local Homeland Security Providers

  • Create An Inspired Company Culture Through Document Management SoftwareBy

    Positive company culture can go a long way toward creating happier, more productive, and more satisfied employees. Additionally, this is a viable step in the right direction for companies needing to maximize human capital.
  • National Renewable Energy Lab Strives for Safety, Security and SustainabilityBy

    The National Renewable Energy Laboratory’s Campus of the Future blueprint calls for buildings that emphasize safety, security and sustainability. ASSA ABLOY is helping the National Renewable Energy Laboratory (NREL) meet challenges on these fronts by supplying door and hardware products in all...
  • System Integrity management PlatformBy

    An internal National Security Agency (NSA) research and development project created a new framework that emphasized two approaches. In the first, regular feedback is provided to developers about how various system design choices might cascade and ultimately impact security compliance. In the...
  • Benefits of Announcements on the Login Portal for EducationBy

    Let’s be honest: the benefits of announcements are nothing new in the world of education.  Many applications and service providers have the option to implement announcements. However, these features often do not integrate well with the login process. On top of that, announcements are often lost...
  • Employee Self-Service & Self-Service Kiosks: A Significant Cost Saving SolutionBy

    Self-Service Kiosks and Human Resources The rapid rate at which Human Resource departments are evolving is forcing a paradigm shift in HR professionals who have often assumed the roles of compliance managers, benefits administrators, paperwork processors, policy and procedure educators and...
  • Beyond WiegandBy

    With the demand for higher security communication between edge readers and access panels, the use of the un-secure Wiegand ID which transmits in the clear should be abandoned for newer solutions, we discuss in the whitepaper several other options for a secure communication between the edge...