Browse Access Control Readers

Access control readers - Expert commentary

Advanced Technologies In Facial Recognition Systems
Advanced Technologies In Facial Recognition Systems

In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professio...

How Californian Cities Are Improving  Surveillance And Security - Key Developments From 2022 To 2024
How Californian Cities Are Improving Surveillance And Security - Key Developments From 2022 To 2024

As urban populations grow and security challenges evolve, major Californian cities like Los Angeles, San Francisco and San Diego have increasingly turned to advanced surveillance s...

Why Biometrics Are Key To A Safe Paris Olympics
Why Biometrics Are Key To A Safe Paris Olympics

The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled th...

Latest IDEMIA news

Gallagher Unveils Cloud Security At Intersec Saudi Arabia 2025
Gallagher Unveils Cloud Security At Intersec Saudi Arabia 2025

Gallagher Security is gearing up to showcase its newest cloud-based solutions at Intersec Saudi Arabia 2025, held from 29 September to 1 October, 2025, at RICEC in Riyadh. Nemer M...

2025 SIA NPS Awards: Best Security Products Revealed
2025 SIA NPS Awards: Best Security Products Revealed

The Security Industry Association (SIA) has announced the 2025 winners of the SIA New Products and Solutions (NPS) Awards, the flagship awards program presented in partnership with...

Boosting Security: IDEMIA's Post-Quantum Innovations
Boosting Security: IDEMIA's Post-Quantum Innovations

IDEMIA Secure Transactions (IST) announced an advanced post-quantum accelerator based on Keccak, a core function widely used in new cryptographic algorithms. Post-quantum algorith...

Related white papers

Access and Security In The Age of Hybrid Working

Integrated Access Control: Reap The Benefits Of Connected Security

Three Essential Reasons To Upgrade Your Access Control Technology In 2022