Join or Sign in
Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.
To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.com
Member Registration
ADVERTISE
SUBSCRIBE
LOGIN
NEWS
NEWS
a&s exclusive
Industry News
Supplier's News
Smart Building & Home
Industrial IoT
Smart & Safe City
Asia News
Video Library
Report Download
Special Feature
Global Events
Readers’ Choice
VERTICAL SOLUTIONS
Retail / Restaurants
Transportation
Banking / Finance
Oil & Gas/Utility
Police / Military
Education
Office / Corporate
Smart Home
Healthcare
Industrial / Manufacturing
Gaming
Hospitality
Correctional Facilities / Public Services
Stadiums / Event Venues
Buildings
Service Industry
PRODUCTS
PRODUCTS
IP Camera
CCTV
Key Components
Access Control
Intrusion Detection
Intercoms
Transmission
Management Platform
Building Automation
Home Automation
Security Services
Personal Safety
Police Equipment
Fire & Safety
Solution
SUPPLIERS
SECURITY 50
NEW
CALCULATE
INSIGHTS
Search by
Product
Supplier
Article
You are at :
Home
>
Search Results
Articles Search Results
1314
Articles and
2
related Products found for
access control systems
Mobile wallets unlock growth for enterprise access control
Platforms like Apple Wallet and Google Wallet have significantly accelerated enterprise adoption of mobile credentials by leveraging familia...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 16
Powerful operating system ensures the performance and security of your network products
AXIS OS is the operating system at the heart of almost 200 Axis products and tens of millions of deployed Axis devices. Purpose-built for ne...
Editor / Provider:
Axis Communications |
Updated:
2025 / 6 / 16
Keeping data physically safe: An interview with Mike Margrain, Technical Director APAC and IMEA, Gallagher Security
In this exclusive interview, Mike Margrain, Technical Director Asia Pacific and India, Middle East and Africa at Gallagher, shares his visio...
Editor / Provider:
Editorial Dept. |
Updated:
2025 / 6 / 16
Deepfake threats against biometric systems ‘no longer theory, but reality’
Increasingly, biometric solutions are becoming vulnerable to deepfake and spoofing attacks, which are now easier to execute thanks in part t...
Editor / Provider:
William Pao |
Updated:
2025 / 6 / 11
From keys to cognition: The rise of intelligent access control
Mobile credentials and artificial intelligence (AI) are redefining how organizations manage identities, secure assets, and optimize operatio...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 6
Hikvision to host Shaping Intelligence 2025 – Education Summit to explore EdTech for a brighter future
Hikvision is set to host the Shaping Intelligence 2025 – Education Summit in Singapore. Scheduled from July 1 to 2, the summit will establis...
Editor / Provider:
Hikvision |
Updated:
2025 / 6 / 4
Data center security: the importance of protecting critical infrastructure
For cybercriminals, data centers represent a lucrative and attractive prize, whether the aim of the attack is to steal data, disrupt critica...
Editor / Provider:
Axis Communications |
Updated:
2025 / 6 / 4
Suprema achieves EN 60839 Certification for high-security access control
Suprema, a global leader in AI-powered access control and security solutions, has achieved EN 60839-11-1:2013 Grade 3 certification, applica...
Editor / Provider:
Suprema |
Updated:
2025 / 5 / 22
Securing borders in the digital age: a multi-layered approach to perimeter protection
Modern border security strategy can be visualized as a system of concentric defense zones, each layered with specific technologies designed ...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 5 / 21
Solve the Top 3 Challenges for Coworking Spaces with Cloud Access Control
Coworking is booming. Since 2018, global membership has grown fivefold as companies and freelancers embrace shared spaces for flexible acces...
Editor / Provider:
Suprema |
Updated:
2025 / 5 / 16
《 First
< Prev
2
3
4
5
6
7
8
9
10
11
Next >
Last 》
Supplier Updates
Is Your Surveillance System Truly Secure — or Just Technically Functional?
2025/06/26
https://vedard.com/blog/latest-electronic-security-solution/
2025/06/09
Reliable Connectivity Anywhere – Chainway P100 Sets a New Benchmark for Industrial Wireless Performance
2025/04/25
Rhombus Advances Physical Security by Bringing AI to Incident Investigations
2025/04/15