Integrated Systems


Latest News
Latest Vertical Solutions

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code
Latest Articles
What to consider when installing a door entry system

What to consider when installing a door entry system

The technology behind a door entry system as well as the materials used are among the factors that should be considered. Ultimately, the installer should take into consideration the user's own needs a...
Most Popular Article
  • How deep learning increases the value of surveillance
    Deep learning has become a hot topic, enabling machines and systems equipped with powerful analytics to recognize things without much human supervision. More and more, this technology is being employed in the security industry, which can benefit from deep learning in numerous ways.
    2017/07/13
  • Advances in fiber optic sensing do wonders for perimeter security
    Perimeter protection is all about detection of threats or intrusion. As such detectors and sensors are still used in this regard. Increasingly, improvements have been made to fiber optic sensors to enhance their accuracy.
    2017/07/12
  • In video perimeter detection, integration is key
    Video plays a key role in helping identify an object – be it a human, an animal or a vehicle – detected along the perimeters of a facility or end-user organization. Typically, the video is integrated with other systems to verify as well as respond to an incident.
    2017/07/04
  • Advances in video help keep perimeters safe
    Perimeter detection is usually the first line of defense for end user organizations, especially critical facilities such as airports, refineries and military bases. Today, video surveillance has become more and more advanced and is used for both intrusion detection and verification purposes.
    2017/06/30
  • What to know when installing a secure access control system
    Cybersecurity has become a major issue facing security players these days as devices become more and more connected and networkable. Against this backdrop, Farpointe Data has posted an RFID Cybersecurity Vulnerability Checklist for access control players.
    2017/06/28
  • How transmission can benefit from Li-Fi
    Wireless transmission of data is enabled with several technologies, for example cellular or Wi-Fi. But what if the visible light is used as a transmission medium? The answer lies in a technology called Li-Fi, which uses light emitted from LED bulbs to transmit data.
    2017/06/27
  • Bosch's selected camera series now has Essential Video Analytics on board as a standard
    This means valuable data can be retrieved quickly from hours of stored video and you are alerted whenever it's needed, providing improved levels of security 24/7. However, it doesn't end there. In addition to advanced intrusion and automatic detection with timely alerts, it enables users to go beyon...
    2017/06/02
  • How to write the perfect product specification for access control projects
    A good access control project keeps premises safe and secure and allows flexibility and ease of management for the end user. Typically it begins with a well-written product specification that takes into consideration the user’s various needs and demands.
    2017/05/31
  • Cloud-based access control: advantages and what to consider
    Cloud computing creates many advantages, for example providing more reliability and saving the end user the upfront cost for setting up servers or storage devices. These benefits can now be extended to different areas of physical security, for example access control.
    2017/05/25
  • Benefits of AR in physical security manifold: ASSA ABLOY Future Labs
    According to a recent blog post by the access control manufacturer, there are two main areas where security professionals can benefit from augmented reality: accessible project information and photo and video capture.
    2017/05/24