;
Your Roadmap to Adopting an ACaaS Model

Your Roadmap to Adopting an ACaaS Model

Access control as a service, aka managed or hosted access, is gaining traction with end users who appreciate greatly reduced capital investments and other related cost savings.




Voices from the Industry

Who ‘Owns’ a Client’s IP Security Devices?
Who ‘Owns’ a Client’s IP Security Devices?

If connected security devices are not secure, it creates a vulnerable spot for hackers to gain access. Here’s how to figure out who takes responsibility for what.


Eddie Reynolds Shares Her Defining Career Moments, Tech Trends
Eddie Reynolds Shares Her Defining Career Moments, Tech Trends

illuminar CEO Edwina (Eddie) Reynolds looks back at her career, as well as important technology trends in this month’s SECURE Perspectives column.


8 Great Hidden Security Sensors to Separate You From DIY Competitors

Take a look at some hidden sensors that will differentiate your professional offerings from the ever-growing list of DIY security options.