Articles Search Results

1487 Articles and 14 related Products found for authentication
  • Security best practices urged amid cyber threats
    Given the rampant cyberattacks against IoT devices, including IP cameras and NVRs, stakeholders across the supply chain should become more k...
    Editor / Provider: William Pao, a&s International | Updated: 2017 / 11 / 14
  • How can mobile credentials be secured?
    Users benefit from the convenience of mobile credentials. However, there is always an underlying potential threat toward personal privacy an...
    Editor / Provider: Weili Lin, Freelancer | Updated: 2017 / 11 / 9
  • Mobile credentials on the rise
    Mobile credentials are gaining traction. Enhanced user experience and reduced costs are driving the use of smartphones in place of discrete ...
    Editor / Provider: Weili Lin, Freelancer | Updated: 2017 / 11 / 8
  • Locking out cybersecurity threats for access control
    Helping integrators strengthen the cybersecurity posture for their clients by modernizing access control systems one component at a time...
    Editor / Provider: Derek Arcuri, Product Marketing Manager, Genetec | Updated: 2017 / 11 / 6