Access control controllers - Expert commentary

The King’s Coronation: Essential security considerations
The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role i...

The latest trends in biometrics for access control (2023 advancements)
The latest trends in biometrics for access control (2023 advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 considerations for RFID Reader selection
Elevators - 14 considerations for RFID Reader selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest Hikvision news

Hikvision's AcuSeek enhances video search in HikCentral
Hikvision's AcuSeek enhances video search in HikCentral

Hikvision has announced the integration of its AcuSeek AI-powered video analytics into two key platforms: HikCentral Professional and Hik-Connect 6.  This breakthrough techno...

Mayflex expands team with security industry experts
Mayflex expands team with security industry experts

Mayflex, the distributor of Converged IP Solutions, has strengthened its external security team with the addition of two new experienced and accomplished recruits. Jason Cooke joi...

Intelligent perimeter security by SourceSecurity & Hikvision
Intelligent perimeter security by SourceSecurity & Hikvision

Perimeter protection is the essential first line of defence in physical security, acting as a critical barrier against unauthorised access and safeguarding valuable assets. However...

Related white papers

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge

Quick poll
How likely is it that companies will invest in cloud-based physical security solutions in the next 5 years?