Browse Access Control Readers

Access control readers - Expert commentary

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

Nedap Adapts To Change: The Dynamic Nature Of Retail Crime
Nedap Adapts To Change: The Dynamic Nature Of Retail Crime

With the rise of organized retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing...

Strengthening Retail Security: Strategies To Combat The Surging Shoplifting Epidemic
Strengthening Retail Security: Strategies To Combat The Surging Shoplifting Epidemic

Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The...

Latest ASSA ABLOY news

Grand Prairie, Texas Completes New ALCEA Traffic Locking Solution Installation
Grand Prairie, Texas Completes New ALCEA Traffic Locking Solution Installation

The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic...

Point Fort Fichet Partners With Essence Security To Provide The MyShield Intruder Intervention System
Point Fort Fichet Partners With Essence Security To Provide The MyShield Intruder Intervention System

Essence Security, a part of Essence Group, a pioneering technology group developing and supplying wireless, cloud-based security solutions for homes and businesses, announced...

Energetic ISC West Reflects Industry On The Cusp Of Accelerated Change
Energetic ISC West Reflects Industry On The Cusp Of Accelerated Change

ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shapin...

Related white papers

Access and Security In The Age of Hybrid Working

Integrated Access Control: Reap The Benefits Of Connected Security

Three Essential Reasons To Upgrade Your Access Control Technology In 2022