Access control controllers - Expert commentary

The King’s Coronation: Essential Security Considerations
The King’s Coronation: Essential Security Considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasizes the significance of implementing and upholding robust security measures, highlighting their role i...

The Latest Trends In Biometrics For Access Control (2023 Advancements)
The Latest Trends In Biometrics For Access Control (2023 Advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 Considerations For RFID Reader Selection
Elevators - 14 Considerations For RFID Reader Selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest Genetec, Inc. news

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

Genetec's 2026 Physical Security Trends And Insights
Genetec's 2026 Physical Security Trends And Insights

Genetec Inc., the pioneer in enterprise physical security software, now released its sixth annual State of Physical Security report. Based on insights from over 7,300 physical secu...

Genetec Cloudrunner Mobile: Vehicle Data On The Go
Genetec Cloudrunner Mobile: Vehicle Data On The Go

Genetec Inc., the pioneer in enterprise physical security software, announced the launch of Genetec Cloudrunner™ Mobile, a companion app for its vehicle-centric investig...

Related white papers

Cybersecurity in Keyless Access Management

Three Essential Reasons To Upgrade Your Access Control Technology In 2022

Securing Unmanned Infrastructure at the Network Edge