Join or Sign in
Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.
To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.com
Member Registration
ADVERTISE
SUBSCRIBE
LOGIN
NEWS
NEWS
a&s exclusive
Industry News
Supplier's News
Smart Building & Home
Industrial IoT
Smart & Safe City
Asia News
Video Library
Report Download
Special Feature
Global Events
Readers’ Choice
VERTICAL SOLUTIONS
Retail / Restaurants
Transportation
Banking / Finance
Oil & Gas/Utility
Police / Military
Education
Office / Corporate
Smart Home
Healthcare
Industrial / Manufacturing
Gaming
Hospitality
Correctional Facilities / Public Services
Stadiums / Event Venues
Buildings
Service Industry
PRODUCTS
PRODUCTS
IP Camera
CCTV
Key Components
Access Control
Intrusion Detection
Intercoms
Transmission
Management Platform
Building Automation
Home Automation
Security Services
Personal Safety
Police Equipment
Fire & Safety
Solution
SUPPLIERS
SECURITY 50
NEW
CALCULATE
INSIGHTS
Search by
Product
Supplier
Article
You are at :
Home
>
Search Results
Articles Search Results
531
Articles and
1
related Products found for
machine learning
Countering deepfakes: 5 best practices to follow
With deepfake and spoofing attacks becoming more frequent, how to protect organizations against these attacks has become important for end u...
Editor / Provider:
William Pao |
Updated:
2025 / 6 / 19
The Essential Guide to Electronic Toll Collection (ETC) Systems
Curious about electronic toll collection? This guide explains exactly how ETC systems work, their benefits for traffic flow, and why they ar...
Editor / Provider:
William Pao and Eifeh Strom, Freelancer |
Updated:
2025 / 6 / 18
AI transforms access control industry, but challenges remain
As adoption grows, industry leaders acknowledge that its real potential, along with its risks, is still unfolding. ...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 18
Can facial recognition anti-spoofing technology be easily breached?
Biometric recognition is a common occurrence in our daily lives now, with smartphones being unlocked through fingerprint or facial recogniti...
Editor / Provider:
Cyberlink |
Updated:
2025 / 6 / 18
How AI-powered surveillance is elevating security standards in schools and universities
Security in US educational institutions of all types remains a pressing issue for educators, governors, students and politicians, but AI too...
Editor / Provider:
Avigilon |
Updated:
2025 / 6 / 13
Thailand—an IoT vanguard in a dynamic region
Discover how Thailand is leading Southeast Asia's IoT transformation—from smart cities and 5G to AI-driven manufacturing and environmental m...
Editor / Provider:
Editorial Dept. |
Updated:
2025 / 6 / 9
Check Point takes IoT security to the next level as AI creates a ‘perfect storm’
As AI reshapes the IoT landscape, Check Point Software Technologies shares how it's defending smart devices against new AI-powered cyberatta...
Editor / Provider:
Editorial Dept. |
Updated:
2025 / 5 / 28
Synology unveils new cloud security suite as it goes all-in on VSaaS at Computex 2025
At Computex 2025, Synology introduces its C2 Surveillance VSaaS and the PAS7700 NVMe storage, marking a new era in AI-powered security and d...
Editor / Provider:
Editorial Dept. |
Updated:
2025 / 5 / 23
Securing borders in the digital age: a multi-layered approach to perimeter protection
Modern border security strategy can be visualized as a system of concentric defense zones, each layered with specific technologies designed ...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 5 / 21
AI security cameras explained: Benefits, applications and concerns
Explore the innovative world of AI security cameras, understand their unique features, how they work, and real-world applications—from home ...
Editor / Provider:
Pipl Systems |
Updated:
2025 / 5 / 13
1
2
3
4
5
6
7
8
9
10
Next >
Last 》
Supplier Updates
Is Your Surveillance System Truly Secure — or Just Technically Functional?
2025/06/26
https://vedard.com/blog/latest-electronic-security-solution/
2025/06/09
Reliable Connectivity Anywhere – Chainway P100 Sets a New Benchmark for Industrial Wireless Performance
2025/04/25
Rhombus Advances Physical Security by Bringing AI to Incident Investigations
2025/04/15