Guest Authors's Latest Posts

Read: ProdataKey: In the Access Control Universe, What Does Mobile First Really Mean?

ProdataKey: In the Access Control Universe, What Does Mobile First Really Mean?

A mobile first platform, like ProdataKey’s pdk io, is built from the ground up with the needs of the mobile user foremost in mind.

Read: What Security Integrators Need to Know About OSDP

What Security Integrators Need to Know About OSDP

The Open Supervised Device Protocol importantly offers the option of secured communications between reader and controller.

Read: RemoteLock: Modern Access Control About More Than Opening Doors

RemoteLock: Modern Access Control About More Than Opening Doors

Modern access control is about more than locking and unlocking doors — it’s about remote access, the ability to configure systems at scale and integration with other systems.

Read: Robosecurity Is Here: How Robots Can Save Money and Lives

Robosecurity Is Here: How Robots Can Save Money and Lives

Security robots are quickly becoming an extension of smart buildings and smart organizations. Discover the latest robosecurity trends, use cases and opportunities.

Read: 2N: Take Security to Next Level With Today’s IP Intercoms

2N: Take Security to Next Level With Today’s IP Intercoms

Today’s intercoms are now part of a well thought out security solution for school campuses, office and apartment buildings, and countless other facilities.

Read: Continental Access: Security, Mobility & Seamless Integrated User Interfaces

Continental Access: Security, Mobility & Seamless Integrated User Interfaces

Successful integrators provide end-to-end solutions that work for their customers’ business operations, where all points of controlled entry work the same, easily and intuitively

Read: Wyoming School District Selects IDIS to Meet Surveillance Needs

Wyoming School District Selects IDIS to Meet Surveillance Needs

The Washakie School District No. 1 required video surveillance coverage across all of its geographically separate school campuses.

Read: Speco Technologies: The Power of 2-Factor Authentication

Speco Technologies: The Power of 2-Factor Authentication

Using Speco Access in conjunction with Speco’s facial recognition gives an added level of security and an extra form of verification to guarantee a user is who they say they are.

Read: Make Sure to Follow These Dealer/Integrator Cybersecurity Basics

Make Sure to Follow These Dealer/Integrator Cybersecurity Basics

Careful attention to IT security is a critical component of the deployment of any security system. Are you following these cybersecurity best practices?

Read: Why a Long-Term Vision Is Essential to Safely Reopen Businesses

Why a Long-Term Vision Is Essential to Safely Reopen Businesses

While video analytics can form the core of a COVID-19 response to help open shuttered facilities, no AI platform will be sufficient by itself.

1 39 40 41 42 43 75
Get Our Newsletters