Technology




Please key in code
Latest Articles
Re-enter with an expired badge? Not with this solution!

Re-enter with an expired badge? Not with this solution!

One issue facing commercial or enterprise end user organizations is someone coming in with an expired badge that no one knows about. If the badge provides a visual, for example showing the word “void”...
Most Popular Article
  • Biometrics adoptions to grow further amid rising demands
    Biometrics solutions are seeing growing demands. More and more they are seen not just in government installations but also in private projects as well. This increase in demand is expected to further drive related products and solutions, according to Gemalto.
    2017/11/24
  • How can mobile credentials be secured?
    Users benefit from the convenience of mobile credentials. However, there is always an underlying potential threat toward personal privacy and data breaches. Therefore, what matters the most to users is still security.
    2017/11/09
  • Mobile credentials on the rise
    Mobile credentials are gaining traction. Enhanced user experience and reduced costs are driving the use of smartphones in place of discrete physical access cards. Security is a primary concern for users when it comes to accessing buildings or making online transactions.
    2017/11/08
  • Locking out cybersecurity threats for access control
    Helping integrators strengthen the cybersecurity posture for their clients by modernizing access control systems one component at a time
    2017/11/06
  • A smart lock that's secure and well-designed
    Smart locks are gaining popularity due to the convenience they provide. But given the rampancy of cyberattacks these days, the security of devices, including smart locks, is also important. Poly-Control, owner of the Danalock brand of smart locks, has the solution that is both secure and appealing i...
    2017/11/02
  • How electronic locks make sharing of keys safer, easier
    More and more, people have formed the habit of sharing their keys with those outside the family. This can create certain problems. For example, keys could be copied or duplicated. An electronic lock, meanwhile, can address this problem by revoking and reissuing digital credentials.
    2017/10/24
  • Why ACaaS has become a growing trend
    Installing an access control system can be an expensive proposition, given the investment in related hardware and software. This is where access control as a service (ACaaS) comes in as an ideal alternative.
    2017/10/03
  • Ways to make access control more secure
    Despite access control’s intention to protect, there are still shortcomings or limitations that can be exploited. Overcoming these can help enhance and strengthen the access control system.
    2017/09/29
  • ACRE cites inquiries, further acquisitions as rationale for Mercury sale
    The deal, whose monetary value isn’t disclosed and which is expected to close in Q4, is seen as mutually beneficial for ACRE and HID Global, whose physical access control lines are expected to get a further boost after the purchase.
    2017/09/26
  • ACaaS: How it's influenced by IoT
    Due to the benefits it provides, ACaaS or access control as a service appeals to users in various vertical markets, including residential. At the same time, a migration towards IoT has also driven demand for ACaaS.
    2017/08/30