Electronic locking devices - Expert commentary

Nedap adapts to change: The dynamic nature of retail crime
Nedap adapts to change: The dynamic nature of retail crime

With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing...

Strengthening retail security: strategies to combat the surging shoplifting epidemic
Strengthening retail security: strategies to combat the surging shoplifting epidemic

Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The...

How security gets real with remote monitoring
How security gets real with remote monitoring

The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity....

Latest HID news

Paris Olympics 2024: Critical security preparations
Paris Olympics 2024: Critical security preparations

As the anticipation builds for the 2024 Paris Olympics, security concerns are heightened. While this long-awaited event will showcase the world’s most accomplished athle...

HID unveils Mercury MP controllers for enhanced cybersecurity
HID unveils Mercury MP controllers for enhanced cybersecurity

Mercury Security, the manufacturer of OEM technology, and HID, a pioneer in trusted identity and access control solutions, announce the next-generation Mercury MP Controllers,...

HID & Inner Range expand mobile access with SIFER credentials
HID & Inner Range expand mobile access with SIFER credentials

HID®, a pioneer in trusted identity solutions announced an extended partnership with its trusted partner Inner Range, a global provider of integrated access control systems and...

Related white papers

The critical role of access control in K-12 school security

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge

Quick poll
Which feature is most important in a video surveillance system?