Electronic locking devices - Expert commentary

Design to finish: Approaching access control in healthcare
Design to finish: Approaching access control in healthcare

The healthcare infrastructure is ever evolving. Facilities are no longer single entities for one, they are sprawling ecosystems that serve a wide range of users, from medical staff...

Staying secure in today’s digital landscape
Staying secure in today’s digital landscape

In today’s connected world, attacks are more likely to target digital than physical entry points. From ransomware and firmware tampering to remote hijacking, AI-driven phishi...

When choosing an access solution, make Total Cost of Ownership a key part of the calculation
When choosing an access solution, make Total Cost of Ownership a key part of the calculation

Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many...

Latest EVVA news

Secure patented key control at Dartmoor Zoo
Secure patented key control at Dartmoor Zoo

Set in 33 hectares of woodland on the edge of Dartmoor National Park, the zoo is home to an impressive variety of exotic and native animals, including Amur tigers, African lions, a...

Xesar enhances accessibility with new smartphone integration
Xesar enhances accessibility with new smartphone integration

Xesar is simply versatile. With the smartphone as an additional access medium, Xesar is now becoming even more versatile in its range of solutions and remains very simple to us...

Master the physical security industry with EVVA's training programmes
Master the physical security industry with EVVA's training programmes

Further training is more than just a tool for economic success. After all, as Benjamin Franklin said, “Investing in knowledge pays the best interest.” Thus, in th...

Related white papers

The critical role of access control in K-12 school security

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge