Integrated Systems


Latest News
Latest Vertical Solutions

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code
Latest Articles
Cloud-based access control: advantages and what to consider

Cloud-based access control: advantages and what to consider

Cloud computing creates many advantages, for example providing more reliability and saving the end user the upfront cost for setting up servers or storage devices. These benefits can now be extended t...
Most Popular Article
  • What to remember when combining physical and logical access control
    Increasing security concerns and advancements in technology have forced access control companies to come up with innovative solutions. One such measure has been the combination of physical and logical access control systems.
    2016/09/29
  • Role of multifactor authentication in integrating access control systems
    Dual authentication is an option in any mixed technology environment, but the technology applied should be determined by the individual use case, according to Martens, Futurist at Allegion. In many circumstances, a smart phone is already validating the identity of the user prior to presenting a smar...
    2016/09/23
  • Dilemmas of data sharing in facial recognition
    Facial recognition technology is everywhere these days. It’s in Facebook. It’s in mobile apps. It’s in ATMs. While it’s acceptance or at least proliferation in consumer technology grows, it’s use in the public sphere for public safety has faced bigger challenges.
    2016/09/23
  • How visitor management has evolved in today's more connected world
    Checking in visitors and providing an environment that makes them feel comfortable and welcome are an important part of any company's operations. That's where users can rely on today's visitor management systems, which have income more advanced and integrated, especially in an increasingly connected...
    2016/09/14
  • Spun off, Princeton Identity aims to build on SRI's foundation
    Separated from its original company, Princeton Identity intends to capitalize on the research base of SRI International to concentrate on markets that require manufacturing in volume, among other things.
    2016/09/13
  • Iris may be more accurate, but it's not perfect
    Recently, there were reports on iris solutions being deployed at end user entities, with owners of these entities touting the accuracy of the technology. However, notwithstanding iris’s superior identification technology, it is by no means perfect and still has its shortcomings and limitations.
    2016/08/23
  • Why data center security should come in layers
    Data centers have become an increasingly important business, as enterprises acquire more and more servers to host their data. Amidst this trend, the need to keep data centers secure from physical and cyber attacks has become critical. While different defense mechanisms have been proposed, most agree...
    2016/08/17
  • How artificial intelligence works side by side with security
    More and more, AI is being applied to security as well, for example access control to airports or other critical infrastructure areas, as the ties between them get stronger.
    2016/07/26
  • How visitor management, data synergize to benefit end users
    Besides security, visitor management can also be used for business enablement purposes, thanks to an increasing amount of data that is fed into it.
    2016/07/20
  • How is modern access control both protective and smart
    Today, access control systems that are networked and integrated with other solutions not only help protect physical and virtual assets but also improve operational efficiency.
    2016/07/15