Integrated Systems


Latest News
Latest Vertical Solutions

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code
Latest Articles
ACaaS: How it's influenced by IoT

ACaaS: How it's influenced by IoT

Due to the benefits it provides, ACaaS or access control as a service appeals to users in various vertical markets, including residential. At the same time, a migration towards IoT has also driven dem...
Most Popular Article
  • What to look for when choosing RAIN RFID components
    When implementing a RAIN RFID system, the selection of the components such as the tags and the encoding mechanism is an importance process. Tag choice often begins with the evaluation of the item to which the tag will be applied and the intended application or use case.
    2016/10/12
  • How retail, healthcare can benefit from RAIN RFID
    Various markets can benefit from RAIN RFID, one of them being retail, where end users use the technology to address issues such as limited inventory visibility, inventory overstocks and understocks, poor customer experiences and theft and shrink.
    2016/10/11
  • How combining physical and logical access simplify infrastructure management
    One of the key benefits of combining physical and logical access control becomes evident in simplified infrastructure management and better access to resources.
    2016/10/06
  • Access control seeing unprecedented growth in past 5 years: IHS
    The access control industry has historically seen steady growth, but in the past few years alone, there has been a renewal of innovation and growth, according to IHS.
    2016/10/04
  • What to remember when combining physical and logical access control
    Increasing security concerns and advancements in technology have forced access control companies to come up with innovative solutions. One such measure has been the combination of physical and logical access control systems.
    2016/09/29
  • Role of multifactor authentication in integrating access control systems
    Dual authentication is an option in any mixed technology environment, but the technology applied should be determined by the individual use case, according to Martens, Futurist at Allegion. In many circumstances, a smart phone is already validating the identity of the user prior to presenting a smar...
    2016/09/23
  • Dilemmas of data sharing in facial recognition
    Facial recognition technology is everywhere these days. It’s in Facebook. It’s in mobile apps. It’s in ATMs. While it’s acceptance or at least proliferation in consumer technology grows, it’s use in the public sphere for public safety has faced bigger challenges.
    2016/09/23
  • How visitor management has evolved in today's more connected world
    Checking in visitors and providing an environment that makes them feel comfortable and welcome are an important part of any company's operations. That's where users can rely on today's visitor management systems, which have income more advanced and integrated, especially in an increasingly connected...
    2016/09/14
  • Spun off, Princeton Identity aims to build on SRI's foundation
    Separated from its original company, Princeton Identity intends to capitalize on the research base of SRI International to concentrate on markets that require manufacturing in volume, among other things.
    2016/09/13
  • Iris may be more accurate, but it's not perfect
    Recently, there were reports on iris solutions being deployed at end user entities, with owners of these entities touting the accuracy of the technology. However, notwithstanding iris’s superior identification technology, it is by no means perfect and still has its shortcomings and limitations.
    2016/08/23