Articles by Darren Learmonth
This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous authentication experience Demand grew for unified identity and access management systems supporting both cards and mobile devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuous authe...
You may also be interested in
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download
