Categories

Open and integrated security
The most important technology shift in the coming five years will be the increasing demand for integral security management systems with open IT standards. …
Shift on the wearable horizon
From smart watches and smart jewelry to Fitbits and Jawbones, wearable technology is becoming ubiquitous in today’s world. But wearables are evolving …
Accelerating access control and inventory tracking
Businesses today are demanding new access control and inventory tracking solutions to improve security, enhance convenience and increase efficiency. When …
Reducing mobile security risks
Mobility may be a fact of life in just about all enterprises, but that doesn’t mean IT organizations aren’t concerned about its impact on security …
Why gadgets have never been closer at hand
The future is here, and getting personal. With technology seemingly advancing at the speed of light, it may only be a matter of time before much more advanced …
Enhancing the user’s door experience
ASSA ABLOY asked students at Stockholm’s KTH Royal Institute of Technology to put their imaginations to work to enhance the user experience in a door. …
The locksmith of tomorrow
Once upon a time, if you wanted a lock, you went to a locksmith. That's no longer true – you might go to a home improvement store, or the Internet, or …
Developing mobile access for hotels
We recently posted and article about how products are developed at ASSA ABLOY's shared global innovation organization, Shared Technologies. We continue …
What’s happening in the Cloud?
Cloud computing has changed the way the physical security industry works. And the evolution is far from over, according to experts. The cloud is what delivers …Member only

Post The Wireless Access Control Market in 2014
The market for wireless access control remains embryonic. Just 6% of businesses have a fully wireless system, according to an IFSEC Global survey of businesses …Member only

The Wireless Access Control Market in 2014
The market for wireless access control remains embryonic. Just 6% of businesses have a fully wireless system, according to an IFSEC Global survey of businesses …
Busting the myths around wireless access control
EXPERT OPINION. Let’s begin with something that’s hardly front-page news: the market potential for wireless access control is huge. At January’s …
Healthy ecosystems support diversity
We have reached the third and final part in the Future Lab article series about security ecosystems. This time we investigate important qualities that …
Bringing new products to life
ASSA ABLOY Shared Technologies develop platform technologies to be integrated in ASSA ABLOY group company products. Thinking outside the box is encouraged …
The symbiosis of digital and physical security
The challenge of modern security reminds one of the 1955 Stargazers hit, "Close the door – they're coming through the window": as soon as you've stopped …
Protecting your assets – personal data
As consumers are beginning to adopt wearable technology, new issues arise. One issue is privacy. How do you deal with all the personal data that wristbands …
Top secure identity trends for 2015
What are the most important trends to keep track of during this year? HID Global has issued its outlook on technology trends for 2015, as well as other …
Big Data in physical security
In our previous article about Big Data we learned that retail giants like Amazon use Big Data to analyze purchases and boost sales. But how is Big Data …
Wearables in access control
Wearable technology is on the verge of turning mainstream and the consumer electronics industry has convinced itself that wearable technology will be the …Member only

Physical Security for Today’s Data Centers
Data center managers, faced with an increasingly stringent regulatory environment, need to rely on the latest technology and the industry’s best practices …Member only
