Some 150 security industry professionals, most of them systems integrators, were on hand for what may very well be looked back upon as an historic event: PSA’s Cybersecurity Congress.
Scott Goldfine · January 26, 2015
Dr. Selva Selvaratnam, senior vice president and CTO with HID Global, has identified key technology and vertical market trends.
SSI Staff · January 21, 2015
Security systems integrators must comply with the requirements issued by authorities having jurisdiction (AHJs) when designing and installing access control systems or it could lead to a fatal injury.
Jeff Zwirn · January 20, 2015
Offering security as a service (SaaS) can allow installing contractors to break out of the binds of a project-based existence. Access control is an area that especially lends itself to service-based RMR. Learn about the exciting varieties now available.
By Al Colombo · January 14, 2015
Westinghouse Security, formerly NextLock, launched the Nucli, a mega-featured door lock with Z-Wave, BLE and Wi-Fi home automation hub built in, at CES 2015.
Julie Jacobson · January 12, 2015
Stanley can now deliver Identiv's identity and access control products and solutions to its customer base.
SSI Staff · January 07, 2015
A multitude of software, products and services are moving to the proverbial cloud, so why should electronic security solutions be any different? Integrators will need to understand unique challenges related to security along with common misconceptions.
SSI Staff · December 18, 2014
Why adopting a ‘Good, Better, Best and Legacy Migration’ sales strategy, and assessing how those solution levels tie into your particular supplier choices and client needs, may yield more access control opportunities and more satisfied customers.
Paul Boucherle · December 17, 2014
Linear President Michael O’Neal announced the name change at the California Alarm Association’s winter convention in San Francisco.
Rodney Bosch · December 14, 2014
A hosted access control system can provide the most-used aspects of access control, such as integration into video, high security access cards, multiple factor authentication and others.
Bob Stockwell · December 09, 2014