Articles Search Results

174 Articles and 22 related Products found for contactless
  • 2015 Access control: Biometrics cheaper yet better
    The access control industry fared pretty well in 2014, fueled in part by the adoption of IP-based solutions. This year, the growth trend will continue in the market, which is also expected to see more advanced technologies.
    Editor / Provider: William Pao, a&s International | Updated: 2015 / 2 / 24
  • Surveying trends in the security integration market
    In today's world, sophisticated security end users demand for higher levels of expertise and interoperability, forcing systems integrators to emphasize on seamless integration to provide users with optimal performance and automation.
    Editor / Provider: Scott Lindley, President, Farpointe Data, a&s International | Updated: 2015 / 2 / 19
  • HID Global shares top secure identity trends for 2015
    HID Global®, a worldwide leader in secure identity solutions, issued its outlook on technology trends for 2015, as well as other anticipated developments across key vertical industries in the secure identity marketplace. The annual assessment is intended to help organizations understand and take adv
    Editor / Provider: HID Global | Updated: 2015 / 1 / 23
  • Allegion helps luxurious hotel at Bordeaux vineyards upgrade to CISA access control system
    A stone's throw from the great Bordeaux vineyards, the village of Bouliac is nestled on the bank of the Garonne overlooking Bordeaux, “the pearl of Aquitaine”. The panoramic view offered to visitors has seen Bouliac nicknamed “The Balcony of Bordeaux” by its inhabitants. In 1989, the architect Jean
    Editor / Provider: Allegion | Updated: 2014 / 12 / 25
  • Comprehensive access control solutions feature at Secutech 2015
    Access control has long been a vital portion of physical security and can be divided into three categories, namely password-based access control, card-based access control, and biometrics-based access control, according to the system's input, transmission, and control methods. The functions and char
    Editor / Provider: Secutech | Updated: 2014 / 11 / 18
  • HID Global securing enterprise cloud applications
    Applications that reside in the cloud afford enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprises cloud deployments now successfully up and running, plus the integration of the Bring-
    Editor / Provider: Jordan Cullis, HID Global | Updated: 2014 / 11 / 5
  • Trends in airport security: meeting the challenges
    The challenges facing today's airport security decision makers become ever more complex, as additional processes traditionally outside of their scope of responsibility have to be considered. These include passenger flow management, higher capacity aircraft, differing passenger security classificatio
    Editor / Provider: Sponsored by Siemens Enterprise Security | Updated: 2014 / 11 / 4
  • The keys to seamless healthcare solution
    In the terms of security for healthcare vertical, there are different phases needed to be taken care of. Unauthorized access to the patient's medical record or expensive medications and equipment will not only cost the hospital a great fortune but also jeopardize their reputation. However, it is imp
    Editor / Provider: Michelle Chu | Updated: 2014 / 10 / 20

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code