Articles Search Results

13 Articles and 0 related Products found for keystroke
  • Some interesting applications of biometrics
    Biometrics is the “what you are” factor in identity management. Their uses in access control are pretty common, but more and more they have ...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 12 / 21
  • Why the need to go beyond traditional authentication?
    Access control and identity management have become more important today as end users place a stronger focus on securit. While traditional fa...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 10 / 17
  • Pacom expansion into APAC
    As part of Stanley Security Solutions' Convergent Security Solutions (CSS) unit through the acquisition of parent company Niscayah, Pacom Sy...
    Editor / Provider: a&s Asia | Updated: 2013 / 10 / 29
  • Hosted Services Speak the IT Language
    With IP blooming, software-as-a-service (SaaS) is the next natural step for physical security. However, IT complications have hindered real ...
    Editor / Provider: The Editorial Team | Updated: 2010 / 2 / 9
  • Putting Danger Behind Bars
    Correctional facilities hold individuals convicted of breaking the law, ensuring they remain behind bars until they complete their sentences...
    Editor / Provider: by a&s International | Updated: 2009 / 3 / 13