Sorry no products match your search. Your search criteria may have been too narrow. If you remove some of your search criteria, this may yield more productive results.

Browse Access Control Cards, Tags & Fobs

Access control cards/ tags/ fobs - Expert commentary

Advanced Technologies In Facial Recognition Systems
Advanced Technologies In Facial Recognition Systems

In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professio...

How Open Source Intelligence Is Transforming The Fight Against Gift Card Fraud
How Open Source Intelligence Is Transforming The Fight Against Gift Card Fraud

A survey conducted by Blackhawk Network finds the average shopper plans to spend almost half of their holiday budget to buy gift cards this year versus only 39% in 2023. The g...

Why Biometrics Are Key To A Safe Paris Olympics
Why Biometrics Are Key To A Safe Paris Olympics

The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled th...

Latest IDEMIA news

Gallagher Unveils Cloud Security At Intersec Saudi Arabia 2025
Gallagher Unveils Cloud Security At Intersec Saudi Arabia 2025

Gallagher Security is gearing up to showcase its newest cloud-based solutions at Intersec Saudi Arabia 2025, held from 29 September to 1 October, 2025, at RICEC in Riyadh. Nemer M...

2025 SIA NPS Awards: Best Security Products Revealed
2025 SIA NPS Awards: Best Security Products Revealed

The Security Industry Association (SIA) has announced the 2025 winners of the SIA New Products and Solutions (NPS) Awards, the flagship awards program presented in partnership with...

Boosting Security: IDEMIA's Post-Quantum Innovations
Boosting Security: IDEMIA's Post-Quantum Innovations

IDEMIA Secure Transactions (IST) announced an advanced post-quantum accelerator based on Keccak, a core function widely used in new cryptographic algorithms. Post-quantum algorith...

Related white papers

Integrated Access Control: Reap The Benefits Of Connected Security

A Guide to Specifying RFID Readers

Three Essential Reasons To Upgrade Your Access Control Technology In 2022