Articles Search Results

1523 Articles and 14 related Products found for authentication
  • Why mobile access is more secure than card systems
    The ability to use mobile phones as access credentials is one of the biggest trends in a market that's historically slow in adopting new tec...
    Editor / Provider: Scott Lindley, General Manager, Farpointe Data | Updated: 2019 / 8 / 28
  • Why biometrics in government sector is set to grow
    Needless to say, biometrics have become a popular and widespread access control and identity management technology, authenticating people by...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 8 / 27
  • Simply smart: the new AirKey Cloud Interface
    AirKey, the system that turns your smartphone into a key has been expanded to include an interface (API). "The AirKey Interface enables a gr...
    Editor / Provider: EVVA | Updated: 2019 / 8 / 26
  • Top 7 reasons for cloud access control
    We are witnessing a huge IT migration to cloud. General benefits of the cloud are well known, and they all apply to cloud access control. Ho...
    Editor / Provider: Spica International | Updated: 2019 / 8 / 23
  • Blockchain aids enterprise cybersecurity
    As companies have moved their infrastructure from local sites to online, they have also increased the potential for malicious cyberattacks. ...
    Editor / Provider: Elvina Yang | Updated: 2019 / 8 / 23
  • How do different access credentials compare
    Needless to say, an access control system contains two core hardware elements, the reader and the credential. Different types of credentials...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 8 / 21
  • Zigbee and Z-Wave contribute to cybersecurity
    Low-energy radio waves in a smart home, including Zigbee and Z-Wave, are providing smart home security from a communication protocol perspec...
    Editor / Provider: Elvina Yang | Updated: 2019 / 8 / 19