Summary is AI-generated, newsdesk-reviewed
  • ASIS International and HID Global highlight security gaps in access technology implementations.
  • Study analyses security gaps from security managers, consultants, and technical experts' perspectives.
  • Discover critical insights by downloading the ASIS-HID access control white paper.

In early 2016, dialogue between ASIS International in Europe and HID Global around access technology identified the need to take a closer look at why sometimes cutting-edge technology is not as effective as it should be in real world applications. Central to the issue were security gaps caused when elements are combined that do not match the same level of sophistication.

This resulted in ASIS conducting a study amongst its European members with HID Global providing support on the technical content. The shared objective was to assess how and where security gaps arise during the process of choosing and installing access control technology.

The study content is based on input from ASIS members, HID technical experts and the survey results. Collectively, this combines the viewpoints of security management practitioners, consultants and technical service providers.

What's inside?

  • Executive Summary
  • Conclusions
  • ASIS-HID Survey

Click Here to Download the White Paper Now!

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...