Technology




Please key in code
Latest Articles
Cybersecurity critical in the age of IP-based access control

Cybersecurity critical in the age of IP-based access control

Like video, access control has transitioned from a mostly proprietary technology to an increasingly open, networkable solution on the Internet. However, this has also brought new challenges for vendor...
Most Popular Article
  • ACaaS: Benefits abound for users, integrators alike
    Access control as a service, in which a cloud service provider manages an end user's access control needs, has become a major trend. This is mostly because of the various benefits associated with it – for example enabling the user to lower or eliminate initial investment in access control-related de...
    2017/08/24
  • How electronic locks offer greater peace of mind
    Electronic locks are becoming more and more popular. Convenience certainly plays a big role, as they can be remotely managed and opened with smart devices. Yet they also offer greater peace of mind for residents who can remotely check the status of their locks.
    2017/08/17
  • What to know when installing a secure access control system
    Cybersecurity has become a major issue facing security players these days as devices become more and more connected and networkable. Against this backdrop, Farpointe Data has posted an RFID Cybersecurity Vulnerability Checklist for access control players.
    2017/06/28
  • How to write the perfect product specification for access control projects
    A good access control project keeps premises safe and secure and allows flexibility and ease of management for the end user. Typically it begins with a well-written product specification that takes into consideration the user’s various needs and demands.
    2017/05/31
  • Cloud-based access control: advantages and what to consider
    Cloud computing creates many advantages, for example providing more reliability and saving the end user the upfront cost for setting up servers or storage devices. These benefits can now be extended to different areas of physical security, for example access control.
    2017/05/25
  • Benefits of AR in physical security manifold: ASSA ABLOY Future Labs
    According to a recent blog post by the access control manufacturer, there are two main areas where security professionals can benefit from augmented reality: accessible project information and photo and video capture.
    2017/05/24
  • Access control boosts user experience in buildings
    Energy savings and operational efficiency aside, a smart building is all about the user experience. Advances in access control technology – for example integration with building management and more innovative credentialing – ensure a more automated and frictionless experience as users go in and out ...
    2017/04/04
  • Choosing the right PIAM system for enterprise
    Keeping track of each and every person within an enterprise environment can be quite a task. Couple that with managing their access and the task becomes all the more complicated.
    2017/04/03
  • Nedap, Milestone integration running deeper
    Last year Nedap Security Management and Milestone Systems entered into a strategic partnership whereby both companies' flagship products, the AEOS Access Control and XProtect VMS, were to be integrated together. Now, both companies are demonstrating this integration and how it can be applied in diff...
    2017/03/28
  • PIAM: What is it, and challenges encountered for enterprises
    Identity management in enterprise environments is an integral part of both physical and data access. However, identity and access management is complex and can be complicated.
    2017/03/27