Articles Search Results

939 Articles and 444 related Products found for card
  • Luxury hotels serve up first class security
    The hospitality industry is a clear beneficiary of the growing number of tourists floating about the world. As the amount of disposable-income travelers increases, the number of those opting to stay in luxury hotels is also on the rise. As a result, luxury hotel operators are looking at ways to maxi
    Editor / Provider: EIFEH STROM, a&s International | Updated: 2014 / 11 / 26
  • Tyco appoints Daryll T. Fogal as CTO and launches
    Tyco International announced that it has taken important steps to bolster its technology capabilities, appointing Daryll T. Fogal as Chief Technology Officer, launching its new "Tyco On" software solutions platform, and making a strategic investment in Qolsys, a provider of innovative home automatio
    Editor / Provider: TYCO | Updated: 2014 / 11 / 24
  • Axis introduces out-of-the-box-ready recording solutions
    AXIS Camera Station S10 Recorder Series comprises three out-of-the-box-ready desktop and rack-server models. The new series offers recording solutions that will simplify installation and setup for mid-sized installations such as schools, industries and larger retail stores that require a feature-ric
    Editor / Provider: Axis Communications | Updated: 2014 / 11 / 21
  • HID Global continues expansion of the Seos ecosystem with new strategic partners
    HID Global®, a worldwide leader in secure identity solutions, announced the addition of new strategic partners who have joined the company's Enterprise Application Partners program during the third calendar quarter, further expanding the ecosystem of available products that are powered by award-winn
    Editor / Provider: HID Global | Updated: 2014 / 11 / 20
  • Comprehensive access control solutions feature at Secutech 2015
    Access control has long been a vital portion of physical security and can be divided into three categories, namely password-based access control, card-based access control, and biometrics-based access control, according to the system's input, transmission, and control methods. The functions and char
    Editor / Provider: Secutech | Updated: 2014 / 11 / 18
  • HID Global securing enterprise cloud applications
    Applications that reside in the cloud afford enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprises cloud deployments now successfully up and running, plus the integration of the Bring-
    Editor / Provider: Jordan Cullis, HID Global | Updated: 2014 / 11 / 5

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code