Browse Access Control Readers

Access control readers - Expert commentary

Privacy measures in modern facial recognition tech
Privacy measures in modern facial recognition tech

In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professio...

How Californian cities are improving  surveillance and security - key developments from 2022 to 2024
How Californian cities are improving surveillance and security - key developments from 2022 to 2024

As urban populations grow and security challenges evolve, Californian cities have increasingly turned to advanced surveillance systems to enhance public safety. Surveillance infr...

Why biometrics are key to a safe Paris Olympics
Why biometrics are key to a safe Paris Olympics

The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled th...

Latest IDEMIA news

Gallagher's cloud solutions at Intersec Saudi Arabia 2025
Gallagher's cloud solutions at Intersec Saudi Arabia 2025

Gallagher Security is gearing up to showcase its newest cloud-based solutions at Intersec Saudi Arabia 2025, held from 29 September to 1 October, 2025, at RICEC in Riyadh. Nemer M...

SIA NPS awards 2025: Top security innovations
SIA NPS awards 2025: Top security innovations

The Security Industry Association (SIA) has announced the 2025 winners of the SIA New Products and Solutions (NPS) Awards, the flagship awards program presented in partnership with...

IST's Keccak-based accelerator boosts cryptographic speed
IST's Keccak-based accelerator boosts cryptographic speed

IDEMIA Secure Transactions (IST) announced an advanced post-quantum accelerator based on Keccak, a core function widely used in new cryptographic algorithms. Post-quantum algorith...

Related white papers

Access and security in the age of hybrid working

Integrated access control: reap the benefits of connected security

Three essential reasons to upgrade your access control technology in 2022