SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Leadership

Round Table Discussions

How are smartphones impacting the physical security market?
How are smartphones impacting the physical security market?

Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where...


What are the security industry’s newest buzzwords?
What are the security industry’s newest buzzwords?

Changes in our industry’s technologies are reflected in the language we use. Over the years, more than one industry trend has been tied to associated buzzwords – for better or worse....


What is an open system? Is there a consensus in the marketplace of the definition of “open?”
What is an open system? Is there a consensus in the marketplace of the definition of “open?”

Open systems are great at providing freedom for end user customers. But does the term “open system” mean the same thing throughout the industry? In the bad old days before the...


What is the biggest missed opportunity of security systems integration?
What is the biggest missed opportunity of security systems integration?

There are many benefits of security systems, and some may be more obvious than others. Certainly, when choosing security systems to be installed, end users have goals and expectations for the...


Expert views on PSIM, analogue HD, video analytics and more
Expert views on PSIM, analogue HD, video analytics and more

Some Expert Panel Roundtable topics are more challenging than others. Occasionally a question will “stump” the panel – i.e., no one will choose to answer it. Other times, only...


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14Go to the next page (Page 2)
Viewing page 1 of 20
Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition