Access control controllers - Expert commentary

The King’s Coronation: Essential security considerations
The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role i...

The latest trends in biometrics for access control (2023 advancements)
The latest trends in biometrics for access control (2023 advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 considerations for RFID Reader selection
Elevators - 14 considerations for RFID Reader selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest ASSA ABLOY news

Grand Prairie, Texas completes new ALCEA Traffic Locking Solution installation
Grand Prairie, Texas completes new ALCEA Traffic Locking Solution installation

The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic...

Point Fort Fichet partners with Essence Security to provide the MyShield intruder intervention system
Point Fort Fichet partners with Essence Security to provide the MyShield intruder intervention system

Essence Security, a part of Essence Group, a pioneering technology group developing and supplying wireless, cloud-based security solutions for homes and businesses, announced...

Energetic ISC West reflects industry on the cusp of accelerated change
Energetic ISC West reflects industry on the cusp of accelerated change

ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shapin...

Related white papers

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge