Browse Electronic Door Locks & Locking Devices

Electronic locking devices - Expert commentary

Design to finish: Approaching access control in healthcare
Design to finish: Approaching access control in healthcare

The healthcare infrastructure is ever evolving. Facilities are no longer single entities for one, they are sprawling ecosystems that serve a wide range of users, from medical staff...

Staying secure in today’s digital landscape
Staying secure in today’s digital landscape

In today’s connected world, attacks are more likely to target digital than physical entry points. From ransomware and firmware tampering to remote hijacking, AI-driven phishi...

When choosing an access solution, make Total Cost of Ownership a key part of the calculation
When choosing an access solution, make Total Cost of Ownership a key part of the calculation

Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many...

Latest ASSA ABLOY - CLIQ news

OXG Glasfaser: Secure fibre optic with eCLIQ
OXG Glasfaser: Secure fibre optic with eCLIQ

Climate and weather can have a damaging impact on digital devices, especially in locations where extremes in summer and/or winter are common. This may be an obstacle to implem...

Enhance security with CLIQ and braXos Steward
Enhance security with CLIQ and braXos Steward

Seamless connectivity between CLIQ Web Manager (CWM) and the braXos Steward platform gives organisations’ access management even greater security, flexibility and functionali...

ASSA ABLOY eCLIQ: Secure Access At Hofbräuhaus Munich
ASSA ABLOY eCLIQ: Secure Access At Hofbräuhaus Munich

Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world&r...

Related white papers

The critical role of access control in K-12 school security

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge