Articles Search Results

289 Articles and 91 related Products found for HID
  • New prospects for building management and security system integration
    Combining security and building management gives an additional layer of information and operational capabilities. A growing number of network-based solutions will increase the benefits of building management systems and security integration. Even though the synergies between the two seem obvious, no
    Editor / Provider: Israel Gogol, Freelancer, a&s International | Updated: 2015 / 2 / 10
  • Protected against harsh environments
    When it's pouring outside, or the temperature hits -10 degrees, you want to make sure your surveillance equipment is still working properly. Nowadays, equipment for critical environments — those that are subject to water, dust, winds, sand, salt, or extreme climatic patterns — is built with durabili
    Editor / Provider: William Pao, a&s International | Updated: 2015 / 1 / 27
  • HID Global shares top secure identity trends for 2015
    HID Global®, a worldwide leader in secure identity solutions, issued its outlook on technology trends for 2015, as well as other anticipated developments across key vertical industries in the secure identity marketplace. The annual assessment is intended to help organizations understand and take adv
    Editor / Provider: HID Global | Updated: 2015 / 1 / 23
  • Genetec Security Center deployed to safeguard Bank of Rakyat Indonesia
    Bank of Rakyat Indonesia (BRI) is one of the largest government owned banks in Indonesia. Incorporated in 1895, BRI was originally established in Purwokerto, Central Java, as a financial institution serving the people of Indonesian nationality. Today, BRI has over 10,000 outlets serving 30 million r
    Editor / Provider: Genetec | Updated: 2014 / 12 / 24
  • Diversity: Hallmark of RFID
    RFID first hit the market in the 1970s and has seen continued improvements over the years, making it an effective technology for tracking and managing goods with applications in a variety of vertical markets. RFID exists in different types and forms. Chief among them are LF, HF, UHF, active, and pas
    Editor / Provider: William Pao, a&s International | Updated: 2014 / 12 / 23
  • Creative applications illustrate wonders of RFID
    In many ways, RFID is like a paintbrush or building blocks, allowing the user to be as creative as they can to solve a particular problem or dilemma. Its technology is quite simple, consisting of only a reader and a tag. But applications can be diverse, wide-ranging, and even wild. This article exam
    Editor / Provider: William Pao, a&s International | Updated: 2014 / 11 / 25
  • HID Global continues expansion of the Seos ecosystem with new strategic partners
    HID Global®, a worldwide leader in secure identity solutions, announced the addition of new strategic partners who have joined the company's Enterprise Application Partners program during the third calendar quarter, further expanding the ecosystem of available products that are powered by award-winn
    Editor / Provider: HID Global | Updated: 2014 / 11 / 20
  • HID NFC tag tech delivers proof of presence and reduces fraud in home healthcare market
    HID Global®, one of the worldwide leaders in secure identity solutions, announced the results of its HID Trusted Tag™ Services pilot that successfully demonstrate its ability to provide “proof of presence” and an auditable Electronic Visit Verification (EVV) record of caregivers in patients' homes.
    Editor / Provider: HID Global | Updated: 2014 / 11 / 12
  • HID Global securing enterprise cloud applications
    Applications that reside in the cloud afford enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprises cloud deployments now successfully up and running, plus the integration of the Bring-
    Editor / Provider: Jordan Cullis, HID Global | Updated: 2014 / 11 / 5
  • Identity management solutions keep intruders at Bay
    Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well. Dete
    Editor / Provider: William Pao, a&s International | Updated: 2014 / 11 / 4

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code