Join or Sign in
Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.
To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.com
Member Registration
ADVERTISE
SUBSCRIBE
LOGIN
NEWS
NEWS
a&s exclusive
Industry News
Supplier's News
Smart Building & Home
Industrial IoT
Smart & Safe City
Asia News
Video Library
Report Download
Special Feature
Global Events
Readers’ Choice
VERTICAL SOLUTIONS
Retail / Restaurants
Transportation
Banking / Finance
Oil & Gas/Utility
Police / Military
Education
Office / Corporate
Smart Home
Healthcare
Industrial / Manufacturing
Gaming
Hospitality
Correctional Facilities / Public Services
Stadiums / Event Venues
Buildings
Service Industry
PRODUCTS
PRODUCTS
IP Camera
CCTV
Key Components
Access Control
Intrusion Detection
Intercoms
Transmission
Management Platform
Building Automation
Home Automation
Security Services
Personal Safety
Police Equipment
Fire & Safety
Solution
SUPPLIERS
SECURITY 50
NEW
CALCULATE
INSIGHTS
Search by
Product
Supplier
Article
You are at :
Home
>
Search Results
Articles Search Results
882
Articles and
1
related Products found for
smartphones
Countering deepfakes: 5 best practices to follow
With deepfake and spoofing attacks becoming more frequent, how to protect organizations against these attacks has become important for end u...
Editor / Provider:
William Pao |
Updated:
2025 / 6 / 19
Can facial recognition anti-spoofing technology be easily breached?
Biometric recognition is a common occurrence in our daily lives now, with smartphones being unlocked through fingerprint or facial recogniti...
Editor / Provider:
Cyberlink |
Updated:
2025 / 6 / 18
The Future is Keyless: 8 Mobile Access Control Systems Transforming Security
Move beyond traditional cards and fobs. Discover 8 of the most innovative mobile access control systems offering greater flexibility and sec...
Editor / Provider:
asmag.com Editorial Team |
Updated:
2025 / 6 / 18
Mobile wallets unlock growth for enterprise access control
Platforms like Apple Wallet and Google Wallet have significantly accelerated enterprise adoption of mobile credentials by leveraging familia...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 16
How a UC Berkeley student residence decreased lockouts and streamlined management
By adopting Verkada's cloud-based access control system International House at UC Berkeley addressed all the major pain points of modern acc...
Editor / Provider:
Verkada |
Updated:
2025 / 6 / 11
From keys to cognition: The rise of intelligent access control
Mobile credentials and artificial intelligence (AI) are redefining how organizations manage identities, secure assets, and optimize operatio...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 6 / 6
AI threats require new cybersecurity solutions, ALSO Cloud's Mark Appleton says
With attack surfaces expanding, AI-boosted cybersecurity and expert data analysis are essential for modern endpoint protection....
Editor / Provider:
ALSO Cloud |
Updated:
2025 / 5 / 20
Product testing: Hikvision’s intelligent checkpoint cameras powered by ‘Guanlan’ AI
Seatbelt and talking-on-the-phone detection gets a powerful boost with the large-model AI embedded in the cameras....
Editor / Provider:
asmag.com Editorial Team |
Updated:
2025 / 4 / 30
New possibilities with mobile digital access
In business and personal life today, digitalization increasingly means moving to mobile. We speak to David Moser, SVP & Head of Digital Acce...
Editor / Provider:
asmag.com Editorial Team |
Updated:
2025 / 4 / 28
Android vs. iOS for mobile access control: What’s important for vendors
For mobile access control solutions providers, it doesn't matter which platform the user is using. Offering solutions that support both oper...
Editor / Provider:
William Pao |
Updated:
2025 / 4 / 9
1
2
3
4
5
6
7
8
9
10
Next >
Last 》
Supplier Updates
Advanced Access Control System for a Smarter Manufacturing Industry
2025/06/09
https://vedard.com/blog/latest-electronic-security-solution/
2025/06/09
Reliable Connectivity Anywhere – Chainway P100 Sets a New Benchmark for Industrial Wireless Performance
2025/04/25
Rhombus Advances Physical Security by Bringing AI to Incident Investigations
2025/04/15