Please key in code
Latest Articles
Making office visitor management more efficient

Making office visitor management more efficient

Keeping track of visitors entering and exiting an office building can be difficult and time consuming. With the latest developments in visitor management systems, along with integration of systems suc...
Most Popular Article
  • Top 3 myths of physical access control technology
    Once again, it is the transition from analog to IP-based systems and with it the adoption of open standards which provides new opportunities and stimulates market growth.
  • Biometric access control solutions
    Biometrics has become one of the most prominent technologies in access control because it is reliable, convenient and secure. Secutech 2014 features Asia’s biggest gathering of access control equipment, including biometric solutions from some of the leading manufacturers.
  • Tips for choosing a video door phone system
    Demand for video door phone systems has built up over the years due to the increased convenience and security it offers. With the continuous evolution of smart buildings and smart homes, video door phones has increasingly digitized to integrate with other systems. However, users do not fully underst...
  • Controller options for access control
    Within a physical access control system, the decision to grant or deny access to a cardholder normally happens at the door controller located at the individual door or centralized with one controller handling multiple doors. The controller handles the authorization process, determining who has acces...
  • Is Microsoft poised to disrupt physical access control?
    The effect of technologies such as the Cloud and the trend of integrating physical Access Control with Identity Management, have been well documented. What is less clear, is how the business will evolve and which companies will gain or lose market share.
  • Seeing your face everywhere
    Seeing the noninvasive, face-capturing benefits, different verticals are incorporating face recognition into their settings, acting as access control devices or identification tools. In each different setting, users must be perfectly aware of their environments and the dynamics surrounding it. Users...
  • Value-added biometrics
    New biometric solutions offer more customizable features for operators and security personnel to adapt quickly. In this feature, a&s showcases a number of interesting applications which harness the powers of biometrics while providing end users a more cost-effective way to manage and add value to se...