Articles Search Results

156 Articles and 0 related Products found for credential
  • Quantum Secure help keep sports competition safer in Brazil
    While millions of viewers were watching races, volleyball, gymnastics, swimming and a wide range of sporting achievements, Quantum Secure, part of HID Global, worked behind the scenes in Rio, Brazil this past summer to protect sports venues by verifying the identity of athletes, staff members, guest
    Editor / Provider: Quantum Secure | Updated: 10 / 14 / 2016
  • HID Global delivers solutions for IoT smart buildings applications
    HID Global, a provider in secure identity solutions, announced new solutions that secure Internet of Things (IoT) applications to improve the convenience and effectiveness of monitoring heating and cooling systems, along with a variety of manufacturing and safety equipment.
    Editor / Provider: HID Global | Updated: 10 / 17 / 2016
  • AMAG Technology attains second FICAM approval
    AMAG Technology, the security solution provider specializing in access control, intrusion detection, video management, policy-based identity solutions and visitor management, announces its newest Federal Identity, Credential, and Access Management (FICAM)/ FIPS 201 compliant solution approved by the
    Editor / Provider: AMAG Technology | Updated: 10 / 10 / 2016
  • Secure and easy to integrate: Aperio access control has the edge
    Access control is changing. Recent research* reveals that wireless access control is now deployed in 29 percent of organizations, with 5 percent already employing a fully wireless solution.
    Editor / Provider: Sponsored by ASSA ABLOY | Updated: 10 / 3 / 2016
  • What to remember when combining physical and logical access control
    Increasing security concerns and advancements in technology have forced access control companies to come up with innovative solutions. One such measure has been the combination of physical and logical access control systems.
    Editor / Provider: Prasanth Aby Thomas | Updated: 9 / 29 / 2016
  • Role of multifactor authentication in integrating access control systems
    Dual authentication is an option in any mixed technology environment, but the technology applied should be determined by the individual use case, according to Martens, Futurist at Allegion. In many circumstances, a smart phone is already validating the identity of the user prior to presenting a smar
    Editor / Provider: Prasanth Aby Thomas | Updated: 9 / 23 / 2016