Access control controllers - Expert commentary

The King’s Coronation: Essential Security Considerations
The King’s Coronation: Essential Security Considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasizes the significance of implementing and upholding robust security measures, highlighting their role i...

The Latest Trends In Biometrics For Access Control (2023 Advancements)
The Latest Trends In Biometrics For Access Control (2023 Advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 Considerations For RFID Reader Selection
Elevators - 14 Considerations For RFID Reader Selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest Nedap Security Management news

Discover CNI Cybersecurity Insights At Scotland Event
Discover CNI Cybersecurity Insights At Scotland Event

Building on their highly popular series of integrated high-security solutions events, the CNI Security Group has announced their next event, ‘Protecting CNI Scotland –...

Koning Willem College Implements ASSA ABLOY Wireless Aperio Access Control
Koning Willem College Implements ASSA ABLOY Wireless Aperio Access Control

Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programs. In total, around 18,000 students take 250 courses at its 16 loca...

Nedap Adapts To Change: The Dynamic Nature Of Retail Crime
Nedap Adapts To Change: The Dynamic Nature Of Retail Crime

With the rise of organized retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing...

Related white papers

Cybersecurity in Keyless Access Management

Three Essential Reasons To Upgrade Your Access Control Technology In 2022

Securing Unmanned Infrastructure at the Network Edge