Browse Access Controllers

Access control controllers - Expert commentary

The King’s Coronation: Essential security considerations
The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role i...

The latest trends in biometrics for access control (2023 advancements)
The latest trends in biometrics for access control (2023 advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 considerations for RFID Reader selection
Elevators - 14 considerations for RFID Reader selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest ASSA ABLOY news

ASSA ABLOY acquires IDP for enhanced door solutions
ASSA ABLOY acquires IDP for enhanced door solutions

ASSA ABLOY has acquired International Door Products (“IDP”), a US manufacturer of standard and custom fire-rated steel door frames. "I am very pleased to welcome IDP t...

ASSA ABLOY Capital Markets Day: Strategic update
ASSA ABLOY Capital Markets Day: Strategic update

On Wednesday, November 19, starting at 08:00 CST, ASSA ABLOY hosts its Capital Markets Day in Milwaukee, Wisconsin, USA. Nico Delvaux, President & CEO and Erik Pieder, CFO...

ASSA ABLOY at Greenbuild 2025: Secure, sustainable solutions
ASSA ABLOY at Greenbuild 2025: Secure, sustainable solutions

ASSA ABLOY Opening Solutions will be returning to Greenbuild 2025, the world's largest annual event for green building professionals. This conference and expo is a pioneering ...

Related white papers

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge