Preventing intruder access at the front door; halting hacker access at the back

    The rapid evolution of access control technology, specifically its shift from a closed, proprietary system to an open, IP based architecture, has unlocked a new set of possibilities for end users. Modern access systems offer open communications architecture, designed to allow access controllers to be deployed as IoT devices. The benefits are obvious; Access control […]

      How to maintain cybersecurity across all your devices

      Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of the system. In this post, we will explore the cybersecurity best practices specific to managing their network […]

        How collaboration will ensure GDPR compliance within supply chains

        The General Data Protection Regulation (GDPR) is a concern for business leaders across the globe. Awareness of the incoming regulation has been improving, with 67% of CIOs advising their business has a clear understanding of the legislation. This will, of course, be crucial going forward, with fines of up to 4 per cent of annual […]

          Physical security and cybersecurity – are they so different?

          Who watches the watchmen? And who secures the security systems? It all seems very Catch-22 on the surface of it, but the idea of securing one’s security system does make very good sense. When it comes to IP security cameras though – should you be more concerned about their physical security or their cyber vulnerabilities? […]