Integrated Systems


asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code
Latest Articles
How can mobile credentials be secured?

How can mobile credentials be secured?

Users benefit from the convenience of mobile credentials. However, there is always an underlying potential threat toward personal privacy and data breaches. Therefore, what matters the most to users i...
Most Popular Article
  • Access control unlocks the smartness in buildings
    Access control has long performed its chief function – that is, letting those with access rights in and thus helping protect lives and assets. But more and more, access control is seen to be able to provide more value than just opening doors. Nowhere is this more manifested than in a smart building.
    2017/03/22
  • Top trends in access control cited for 2017
    Using access control to make a building smarter – helping end users improve operational and management efficiency – has been cited as a major trend in access control for 2017 by CEM Systems, which also listed some other developments to watch for.
    2017/03/21
  • Access control: Vendors' yearly review and preview
    To most access control vendors, the industry certainly had a good run in 2016 due to increased demand amid renewed concerns for security. Moving into 2017, vendors expect growth to continue as users seek to improve various business processes with access control.
    2017/02/01
  • Access control 2017: Expect the boom to continue
    The access control industry enjoyed growth, albeit by a smaller margin than originally predicated, last year, and the growth trend is expected to grow in 2017, according to market research firm IHS Markit.
    2017/01/30
  • How anonymized data contributes to smarter building management
    More and more, big data generated by security and non-security devices connected over the Internet is used to help users achieve security as well as operational efficiency. In this sense, anonymized location data generated by access control devices can be used to help manage buildings more effective...
    2017/01/19
  • Top identity technology trends to watch for in 2017
    Identity management has become an important topic given more physical and cyber threats faced by organization nowadays, and more advanced technologies have been rolled out to facilitate users. In this regard, HID Global named mobile credentials, cloud and IoT as some of the top trends in the identit...
    2017/01/12
  • The drivers, and models, of physical-logical access convergence
    More and more, access to both the physical doors as well as IT resources – those that reside on the network – is converged, resulting in what is called physical and logical access integration on a single credential.
    2016/10/25
  • Integrating access control in the age of IoT
    As the complexity and power of access control devices increase to a level seen on IP cameras, their security becomes more important.
    2016/10/13
  • What to look for when choosing RAIN RFID components
    When implementing a RAIN RFID system, the selection of the components such as the tags and the encoding mechanism is an importance process. Tag choice often begins with the evaluation of the item to which the tag will be applied and the intended application or use case.
    2016/10/12
  • How retail, healthcare can benefit from RAIN RFID
    Various markets can benefit from RAIN RFID, one of them being retail, where end users use the technology to address issues such as limited inventory visibility, inventory overstocks and understocks, poor customer experiences and theft and shrink.
    2016/10/11