SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Unique perspectives

Technology & Trends - Access control software

154 articles found
Showing 1 to 20 of 154 articles
Page 1 of 8 pages
Healthcare providers face new rules for “All Hazards” emergency planningHealthcare providers face new rules for “All Hazards” emergency planning
On September 16th, 2016, six weeks before America’s ‘historic’ election, the U.S. Centers for Medicare and Medicaid Services (CMS)...
Smartphones offer many advantages over cards and fobs for access controlSmartphones offer many advantages over cards and fobs for access control
Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious...
Combining mechanical and electronic systems to enhance door securityCombining mechanical and electronic systems to enhance door security
In most buildings, security is a hybrid solution of both mechanical and electronic security products. Locksmiths take care of the mechanical door...
Growing data security trends: Internet of Things and cyber securityGrowing data security trends: Internet of Things and cyber security
As the whirlwind of 2016 quickly winds down, it is a good opportunity to look back at the significant trends from this year. As predicted, the industry...
Physical security continues to support cybersecurity aimsPhysical security continues to support cybersecurity aims
At the end of last year, we anticipated that data gathering and analysis would continue to be a strong trend , and that certainly proved to be the case...
Ongoing network attacks encourage consolidation of physical and cybersecurityOngoing network attacks encourage consolidation of physical and cybersecurity
Ongoing attacks on private networks drew attention in 2016. Most public were the Wikileaks and other privacy violations during the 2016 election cycle....
Access control moves from siloed security solution to integrated approachAccess control moves from siloed security solution to integrated approach
The year of 2016 ended with Vanderbilt finalising the acquisition of Access Control Technology Ltd., which strengthened the company’s product...
Growth of cloud-based access control solutionsGrowth of cloud-based access control solutions
Predicting where or how security access trends would develop in 2016 was an educated guess at best. We did, however, forecast continued growth in the...
Access management becomes ‘mobilised', pervasive and personalisedAccess management becomes ‘mobilised', pervasive and personalised
After two decades of advances from simple visual ID badges to smart cards, standards-based access control systems and mobile ID solutions, the industry...
3 ways technology will change access control in 20173 ways technology will change access control in 2017
The winds of change have swept into the access control market in 2016. The hardware is transitioning away from being solely panel-based, software is...
Wireless access control sees major growth in 2016Wireless access control sees major growth in 2016
The shift from wired to wireless access control was expected to gather pace in 2016—and that has happened. This year we at Assa Abloy surveyed a...
Converged data and integrated security were key in 2016Converged data and integrated security were key in 2016
The economy positively impacted the security marketplace in 2016 as end users have been more willing to invest in new security systems or upgrade...
Managing risk with a data-centric business approachManaging risk with a data-centric business approach
An organisation is a complex environment that is ever changing and continuously growing to include more servers, more buildings, more systems and as a...
Mechanical and electronic security to see further convergence in 2017Mechanical and electronic security to see further convergence in 2017
New construction has continued to grow as a result of low interest rates in 2016 and that has positively impacted the security marketplace. Yet the...
Coming in 2017: More holistic security… and more lone wolf attacksComing in 2017: More holistic security… and more lone wolf attacks
There will likely continue to be high numbers of lone wolf and soft target attacks in the year ahead. The drivers behind these tragedies are a confluence...
Download: Dangers of CSN-only smart card readersDownload: Dangers of CSN-only smart card readers
This executive brief explores the security risks associated with using CSN instead of reading the data protected by...
10 benefits of cloud access control solutions10 benefits of cloud access control solutions
The security and safety industry has seen tremendous advances in cloud-based access control recently as cloud computing has opened up a world of...
7 things you need to know about iris recognition systems7 things you need to know about iris recognition systems
Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is...
[Download] Visitor Management: A Guide to Selecting and Employing a New Solution[Download] Visitor Management: A Guide to Selecting and Employing a New Solution
Visitor management refers to the methods organisations use to admit and track visitors to their facilities. The concept is...
Improving security decisions by identifying red flags and operational inefficiencies through advanced analyticsImproving security decisions by identifying red flags and operational inefficiencies through advanced analytics
Threats to an organisation’s physical and logical security are increasing in number and financial impact, according to several recent surveys. To...
1|2|3|4|5|6|7|8next
Go to :
border
Related videos
Bookmark and Share
Featured White Paper

Mobile Access - What You Need to Know

Mobile devices are everywhere in society today, and in the business world. What makes better sense than to use these ever-present devices to control physical access? It’s the logical next step for both employees and enterprises.

Using a smartphone or other smart device to control physical access (what the industry calls “mobile access control”) has multiple benefits in the new mobile-first world. Download HID Global’s new White Paper to understand the available technologies and what your organisation needs to consider when implementing a mobile access control solution.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition