Articles Search Results

1106 Articles and 504 related Products found for act
  • Why the need to go beyond traditional authentication?
    Access control and identity management have become more important today as end users place a stronger focus on securit. While traditional fa...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 10 / 17
  • A detailed look at image quality, from Bosch
    These days, it's becoming conventional for security devices to think smarter. But Bosch prefers to go beyond the conventional, because we be...
    Editor / Provider: Bosch Security and Safety Systems | Updated: 2018 / 10 / 8
  • The evolution of cybersecurity
    "What is the current state of cybersecurity in Asia?" Well, the answer is simple: Asian security awareness is several years behind the curve...
    Editor / Provider: Lee Sult, Co-Founder and Chief Technology Officer, Horangi Cyber Security | Updated: 2018 / 10 / 1