Technology




Please key in code
Latest Articles
Cybersecurity critical in the age of IP-based access control

Cybersecurity critical in the age of IP-based access control

Like video, access control has transitioned from a mostly proprietary technology to an increasingly open, networkable solution on the Internet. However, this has also brought new challenges for vendor...
Most Popular Article
  • How can mobile credentials be secured?
    Users benefit from the convenience of mobile credentials. However, there is always an underlying potential threat toward personal privacy and data breaches. Therefore, what matters the most to users is still security.
    2017/11/09
  • Mobile credentials on the rise
    Mobile credentials are gaining traction. Enhanced user experience and reduced costs are driving the use of smartphones in place of discrete physical access cards. Security is a primary concern for users when it comes to accessing buildings or making online transactions.
    2017/11/08
  • Locking out cybersecurity threats for access control
    Helping integrators strengthen the cybersecurity posture for their clients by modernizing access control systems one component at a time
    2017/11/06
  • A smart lock that's secure and well-designed
    Smart locks are gaining popularity due to the convenience they provide. But given the rampancy of cyberattacks these days, the security of devices, including smart locks, is also important. Poly-Control, owner of the Danalock brand of smart locks, has the solution that is both secure and appealing i...
    2017/11/02
  • How electronic locks make sharing of keys safer, easier
    More and more, people have formed the habit of sharing their keys with those outside the family. This can create certain problems. For example, keys could be copied or duplicated. An electronic lock, meanwhile, can address this problem by revoking and reissuing digital credentials.
    2017/10/24
  • Why ACaaS has become a growing trend
    Installing an access control system can be an expensive proposition, given the investment in related hardware and software. This is where access control as a service (ACaaS) comes in as an ideal alternative.
    2017/10/03
  • Ways to make access control more secure
    Despite access control’s intention to protect, there are still shortcomings or limitations that can be exploited. Overcoming these can help enhance and strengthen the access control system.
    2017/09/29
  • ACRE cites inquiries, further acquisitions as rationale for Mercury sale
    The deal, whose monetary value isn’t disclosed and which is expected to close in Q4, is seen as mutually beneficial for ACRE and HID Global, whose physical access control lines are expected to get a further boost after the purchase.
    2017/09/26
  • ACaaS: How it's influenced by IoT
    Due to the benefits it provides, ACaaS or access control as a service appeals to users in various vertical markets, including residential. At the same time, a migration towards IoT has also driven demand for ACaaS.
    2017/08/30
  • ACaaS: Why residential sector sees pickup in deployment
    Access control as a service or ACaaS carries various advantages, one of the biggest being all doors are secured and managed centrally, saving the end user the need to monitor everything onsite and invest in related devices and equipment. It is due to this reason that ACaaS is seeing deployment in va...
    2017/08/25