Join or Sign in
Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.
To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.com
Member Registration
ADVERTISE
SUBSCRIBE
LOGIN
NEWS
NEWS
a&s exclusive
Industry News
Supplier's News
Smart Building & Home
Industrial IoT
Smart & Safe City
Asia News
Video Library
Report Download
Special Feature
Global Events
Readers’ Choice
VERTICAL SOLUTIONS
Retail / Restaurants
Transportation
Banking / Finance
Oil & Gas/Utility
Police / Military
Education
Office / Corporate
Smart Home
Healthcare
Industrial / Manufacturing
Gaming
Hospitality
Correctional Facilities / Public Services
Stadiums / Event Venues
Buildings
Service Industry
PRODUCTS
PRODUCTS
IP Camera
CCTV
Key Components
Access Control
Intrusion Detection
Intercoms
Transmission
Management Platform
Building Automation
Home Automation
Security Services
Personal Safety
Police Equipment
Fire & Safety
Solution
SUPPLIERS
SECURITY 50
NEW
CALCULATE
INSIGHTS
Search by
Product
Supplier
Article
You are at :
Home
>
Search Results
Articles Search Results
653
Articles and
2
related Products found for
mobility
Indra equips the Buenos Aires train network for 35 million Euros
Argentina's national rail operator has awarded Indra a contract worth 35 million euros, under which the firm will deploy its access control ...
Editor / Provider:
Indra |
Updated:
2016 / 2 / 26
Integrated Biometrics appoints new director of sales for Asia Pacific
Integrated Biometrics, developers of energy-efficient FBI-compliant fingerprint scanners, is pleased to announce the addition of industry pr...
Editor / Provider:
Integrated Biometrics |
Updated:
2016 / 2 / 23
What are the common vulnerabilities of IP-based physical security systems for cyber intrusion?
In today's connected world, IP-based systems offer numerous breach points for cyber-attacks. Ironically, physical security systems based o...
Editor / Provider:
Israel Gogol, Freelancer |
Updated:
2016 / 2 / 15
Key identity management trends for 2016
In essence, an autonomous vehicle comes with a variety of sensors that are also found in the security world. Together, they serve as the “ey...
Editor / Provider:
William Pao, a&s International |
Updated:
2016 / 2 / 4
Teleste's solutions at UN climate convention in Paris
Teleste, an international technology group specialized in video security and information systems, unveils an innovative, comprehensive and s...
Editor / Provider:
Teleste |
Updated:
2016 / 2 / 4
Systems integrators play a key role in city surveillance projects
As a result of rapid urbanization and urban growth, today's cities are dealing with complex and rising security threat levels. It has becom...
Editor / Provider:
Emily Lin |
Updated:
2016 / 2 / 2
Mobile guestroom entry offers a highly customized experience
One concern voiced by some hoteliers about mobile key technology is that this will create further distance between the hotel and the guest, ...
Editor / Provider:
William Pao, a&s International |
Updated:
2016 / 1 / 28
Crossmatch appoints industry veterans to lead sales initiatives in strategic markets
Crossmatch, a leading provider of identity management enrollment and authentication solutions, announced the appointment of John Atkinson as...
Editor / Provider:
Crossmatch |
Updated:
2016 / 1 / 14
AMAG Technology announces Symmetry GUEST visitor management
AMAG Technology's new cloud-based visitor management system improves visitor experience, enhances security, and recedes costs....
Editor / Provider:
AMAG Technology |
Updated:
2016 / 1 / 13
Campus safety up for debate after active shooter cases
Recent shooting incidents have brought safety in colleges and universities to the spotlight. With technological advancements and customized ...
Editor / Provider:
Prasanth Aby Thomas |
Updated:
2016 / 1 / 5
《 First
< Prev
44
45
46
47
48
49
50
51
52
53
Next >
Last 》
Supplier Updates
GEO Awards 2026 Spotlight Matrix's People, Innovation, and Leadership Culture
2026/02/07
NCI NFC Reader for Android: Applications and Recommendations
2026/01/27
https://www.vedardsecurity.com/Wireless-fire-alarm-system-ezp-38
2026/01/08
Visibility Blind Spots and Process Breakdowns Plague Hospital IoMT Security Programs
2025/12/20