Electronic locking devices - Expert commentary

What’s behind (perimeter) door #1?
What’s behind (perimeter) door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...

Design to finish: Approaching access control in healthcare
Design to finish: Approaching access control in healthcare

The healthcare infrastructure is ever evolving. Facilities are no longer single entities for one, they are sprawling ecosystems that serve a wide range of users, from medical staff...

Staying secure in today’s digital landscape
Staying secure in today’s digital landscape

In today’s connected world, attacks are more likely to target digital than physical entry points. From ransomware and firmware tampering to remote hijacking, AI-driven phishi...

Latest LEGIC Identsystems Ltd news

SwiftConnect and LEGIC partner to enable seamless access for major corporations via NFC wallets in smartphones and other mobile devices
SwiftConnect and LEGIC partner to enable seamless access for major corporations via NFC wallets in smartphones and other mobile devices

SwiftConnect, the pioneering provider of connected access enablement, and Swiss-based LEGIC Identsystems, a global pioneer in secure authentication, access management and IoT platf...

ELATEC to introduce the TWN4 Palon Compact Panel Reader at ISC West 2020
ELATEC to introduce the TWN4 Palon Compact Panel Reader at ISC West 2020

From buildings to vehicle fleets and enterprise networks to perimeter gates, having access control to let the right people in—while keeping everyone else out—is a secur...

LEGIC Orbit upgraded with new security feature that restricts configuration data to specific reader ICs
LEGIC Orbit upgraded with new security feature that restricts configuration data to specific reader ICs

Correct configuration of readers in the field forms the basis of secure ID solutions. In the latest version of LEGIC Orbit, the option to restrict configuration data to specific re...

Related white papers

The critical role of access control in K-12 school security

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge