Articles Search Results

1580 Articles and 14 related Products found for authentication
  • Cloud access control and the fear of hacking
    There are many advantages of access control in the cloud. The main objection however, has been internet security, or simply put the fear of ...
    Editor / Provider: Spica International | Updated: 2019 / 10 / 4
  • What goes into security solutions in pharma?
    Depending on the nature of their products and the process they follow, each company is different with various requirements requiring various...
    Editor / Provider: Prasanth Aby Thomas, Consultant Editor | Updated: 2019 / 9 / 9
  • How to keep your IP camera system cyber-secure
    It goes without saying that video surveillance moving more and more toward IP. While this brings various benefits, the issue of cybersecurit...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 8 / 29
  • Why mobile access is more secure than card systems
    The ability to use mobile phones as access credentials is one of the biggest trends in a market that's historically slow in adopting new tec...
    Editor / Provider: Scott Lindley, General Manager, Farpointe Data | Updated: 2019 / 8 / 28
  • Why biometrics in government sector is set to grow
    Needless to say, biometrics have become a popular and widespread access control and identity management technology, authenticating people by...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 8 / 27
  • Simply smart: the new AirKey Cloud Interface
    AirKey, the system that turns your smartphone into a key has been expanded to include an interface (API). "The AirKey Interface enables a gr...
    Editor / Provider: EVVA | Updated: 2019 / 8 / 26