Join or Sign in
Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.
To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.com
Member Registration
ADVERTISE
SUBSCRIBE
LOGIN
NEWS
NEWS
a&s exclusive
Industry News
Supplier's News
Smart Building & Home
Industrial IoT
Smart & Safe City
Asia News
Video Library
Report Download
Special Feature
Global Events
Readers’ Choice
VERTICAL SOLUTIONS
Retail / Restaurants
Transportation
Banking / Finance
Oil & Gas/Utility
Police / Military
Education
Office / Corporate
Smart Home
Healthcare
Industrial / Manufacturing
Gaming
Hospitality
Correctional Facilities / Public Services
Stadiums / Event Venues
Buildings
Service Industry
PRODUCTS
PRODUCTS
IP Camera
CCTV
Key Components
Access Control
Intrusion Detection
Intercoms
Transmission
Management Platform
Building Automation
Home Automation
Security Services
Personal Safety
Police Equipment
Fire & Safety
Solution
SUPPLIERS
SECURITY 50
NEW
CALCULATE
INSIGHTS
Search by
Product
Supplier
Article
You are at :
Home
>
Search Results
Articles Search Results
500
Articles and
0
related Products found for
best practices
Biometric access control in healthcare: Balancing security and patient privacy
As new technologies become more embedded in clinical environments, healthcare providers must navigate the delicate balance between tightenin...
Editor / Provider:
Coram AI |
Updated:
2025 / 7 / 1
No room for blind spots in Asia’s data center boom
As Asia rapidly expands its digital infrastructure, the region's data centers are coming under unprecedented pressure to ensure robust physi...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 24
Countering deepfakes: 5 best practices to follow
With deepfake and spoofing attacks becoming more frequent, how to protect organizations against these attacks has become important for end u...
Editor / Provider:
William Pao |
Updated:
2025 / 6 / 19
Mobile wallets unlock growth for enterprise access control
Platforms like Apple Wallet and Google Wallet have significantly accelerated enterprise adoption of mobile credentials by leveraging familia...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 16
Powerful operating system ensures the performance and security of your network products
AXIS OS is the operating system at the heart of almost 200 Axis products and tens of millions of deployed Axis devices. Purpose-built for ne...
Editor / Provider:
Axis Communications |
Updated:
2025 / 6 / 16
Securing the last meter: Why cabinet-level protection matters
Data centers have traditionally focused their physical security efforts on outer perimeters and secure room access. ...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 11
From keys to cognition: The rise of intelligent access control
Mobile credentials and artificial intelligence (AI) are redefining how organizations manage identities, secure assets, and optimize operatio...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 6
Gallagher Security achieves ISO 27001 recertification, reinforcing commitment to information security
Global security technology leader Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for ...
Editor / Provider:
Gallagher Security |
Updated:
2025 / 6 / 4
Ransomware through the lens: lessons for systems integrators from an IP camera breach
Every connected security device, including CCTV, is part of the broader IT threat surface....
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 5 / 27
Top challenges customers face during large-scale camera upgrade projects
Large-scale refreshes are particularly complicated in sectors like banking, where institutions operate hundreds of locations, each with uniq...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 4 / 28
1
2
3
4
5
6
7
8
9
10
Next >
Last 》
Supplier Updates
Is Your Surveillance System Truly Secure — or Just Technically Functional?
2025/06/26
https://vedard.com/blog/latest-electronic-security-solution/
2025/06/09
Reliable Connectivity Anywhere – Chainway P100 Sets a New Benchmark for Industrial Wireless Performance
2025/04/25
Rhombus Advances Physical Security by Bringing AI to Incident Investigations
2025/04/15