Sorry no products match your search. Your search criteria may have been too narrow. If you remove some of your search criteria, this may yield more productive results.

Access control controllers - Expert commentary

The King’s Coronation: Essential security considerations
The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role i...

The latest trends in biometrics for access control (2023 advancements)
The latest trends in biometrics for access control (2023 advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 considerations for RFID Reader selection
Elevators - 14 considerations for RFID Reader selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest TAC Satchwell news

Malmö schools: A case study
Malmö schools: A case study

Vandalism and arson attacks at schools have been on the rise in the Swedish city of Malmö since 2001. In the five years between 2001-2006, school property damage cost the city...

Chiron’s IRIS alarms-over-IP employed in Danish education projects
Chiron’s IRIS alarms-over-IP employed in Danish education projects

  Chiron’s IRIS alarms-over-IP used in Danish education projects International building systems integrator TAC has utilised the operational benefits of Chiron Secur...

Day Automation integrates security with building controls
Day Automation integrates security with building controls

 Day Automation, a TAC partner integrates security with building controls Day Automation Systems, headquartered in Victor, N.Y., experienced an 85 percent increase in product...

Related white papers

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge