Electronic locking devices - Expert commentary

Design to finish: Approaching access control in healthcare
Design to finish: Approaching access control in healthcare

The healthcare infrastructure is ever evolving. Facilities are no longer single entities for one, they are sprawling ecosystems that serve a wide range of users, from medical staff...

Staying secure in today’s digital landscape
Staying secure in today’s digital landscape

In today’s connected world, attacks are more likely to target digital than physical entry points. From ransomware and firmware tampering to remote hijacking, AI-driven phishi...

When choosing an access solution, make Total Cost of Ownership a key part of the calculation
When choosing an access solution, make Total Cost of Ownership a key part of the calculation

Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many...

Latest Kaba news

Women in security: Highlights from Security LeadHER 2024
Women in security: Highlights from Security LeadHER 2024

ASIS International and the Security Industry Association (SIA) have closed out a successful second annual Security LeadHER conference, a unique event dedicated to advancing, c...

Altronix demonstrates Trove Access and Power Integration Solutions at ASIS 2017
Altronix demonstrates Trove Access and Power Integration Solutions at ASIS 2017

Altronix, a recognised provider of power and transmission solutions for the professional security industry, is featuring its expanded offering of Trove Access and Power Integration...

First edition of Intersec Saudi Arabia 2017 to lead upward trend of fire safety and security markets
First edition of Intersec Saudi Arabia 2017 to lead upward trend of fire safety and security markets

Intersec Saudi Arabia 2017 is expected to host more than 100 exhibitors, including 22 launch partners Saudi Arabia and the UAE are leading the upward trend for t...

Related white papers

The critical role of access control in K-12 school security

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge