Summary is AI-generated, newsdesk-reviewed
  • Study highlights access control security gaps from mismatched technology sophistication levels.
  • ASIS and HID Global explore real-world effectiveness of cutting-edge access technology.
  • Security gaps arise during access control technology selection and installation process.

In early 2016, dialog between ASIS International in Europe and HID Global around access technology identified the need to take a closer look at why sometimes cutting-edge technology is not as effective as it should be in real world applications. Central to the issue were security gaps caused when elements are combined that do not match the same level of sophistication.

This resulted in ASIS conducting a study amongst its European members with HID Global providing support on the technical content. The shared objective was to assess how and where security gaps arise during the process of choosing and installing access control technology.

The study content is based on input from ASIS members, HID technical experts and the survey results. Collectively, this combines the viewpoints of security management practitioners, consultants and technical service providers.

What's Inside?

  • Executive Summary
  • Conclusions
  • ASIS-HID Survey


Click Here to Download the White Paper Now!

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...