Preventing intruder access at the front door; halting hacker access at the back

    The rapid evolution of access control technology, specifically its shift from a closed, proprietary system to an open, IP based architecture, has unlocked a new set of possibilities for end users. Modern access systems offer open communications architecture, designed to allow access controllers to be deployed as IoT devices. The benefits are obvious; Access control […]

      How to maintain cybersecurity across all your devices

      Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of the system. In this post, we will explore the cybersecurity best practices specific to managing their network […]

        IoT, cybersecurity and access control

        Right now, we are beginning the next phase of digital transformation in the security industry – the move to connect all physical security components to the Internet of Things (IoT). The advantages are twofold. First, having all the components in your system working in harmony maximizes their effectiveness. Next, all the individual hardware pieces in […]

          How collaboration will ensure GDPR compliance within supply chains

          The General Data Protection Regulation (GDPR) is a concern for business leaders across the globe. Awareness of the incoming regulation has been improving, with 67% of CIOs advising their business has a clear understanding of the legislation. This will, of course, be crucial going forward, with fines of up to 4 per cent of annual […]

            How to address the changing reality of cybersecurity

            The issues and challenges around cybersecurity are changing. In the past, cybersecurity models centered on placing a firewall around an enterprise and assuming everything inside that firewall was trustworthy and secure while everything outside of it was part of a malevolent world. With IP technology, the Internet of Things, and bring-your-own-device-to-work initiatives, the line between […]