Access control controllers - Expert commentary

The King’s Coronation: Essential security considerations
The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role i...

The latest trends in biometrics for access control (2023 advancements)
The latest trends in biometrics for access control (2023 advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 considerations for RFID Reader selection
Elevators - 14 considerations for RFID Reader selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest HID news

Paris Olympics 2024: Critical security preparations
Paris Olympics 2024: Critical security preparations

As the anticipation builds for the 2024 Paris Olympics, security concerns are heightened. While this long-awaited event will showcase the world’s most accomplished athle...

HID unveils Mercury MP controllers for enhanced cybersecurity
HID unveils Mercury MP controllers for enhanced cybersecurity

Mercury Security, the manufacturer of OEM technology, and HID, a pioneer in trusted identity and access control solutions, announce the next-generation Mercury MP Controllers,...

HID & Inner Range expand mobile access with SIFER credentials
HID & Inner Range expand mobile access with SIFER credentials

HID®, a pioneer in trusted identity solutions announced an extended partnership with its trusted partner Inner Range, a global provider of integrated access control systems and...

Related white papers

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge

Quick poll
Which feature is most important in a video surveillance system?