Access control
The development of identity management and credentials like smart cards, RFID and mobile access.

Wireless locks extend the reach of access control
As building security becomes smarter, the need for electronic access control grows. Wired access points and security doors have long been the backbone. …
Can phones challenge the resilient plastic card?
Mobile access control will increasingly keep pace with modern mobile working, says Thomas Schulz, Director Marketing and Communications, Digital and Access …
Wireless Access Control in 2018
The market for access control is changing. But how? How fast? And what factors will affect your business between now and 2025? A new report by IFSEC Global, …
Podcast: Unlocking Physical Security Costs
In Episode 2 of the new podcast 'Unlocked', we take you on the journey of an IT Director at a small college as he navigates through the sometimes choppy …
Greater emphasis on the cloud for digital IDs
HID Global continue predicting trends for Identity in 2017. Next up is a greater emphasis on the cloud. By combining on-premises and the cloud, "hybrid …
Podcast: Unlocking Campus Lockdown
Active shooter emergencies are a reality on today's campuses. On this first episode of the podcast series 'Unlocked', we take a look at what can go wrong …
The Access Control Report 2016
This report from IFSEC Global and sponsored by access control innovators HID Global, is a white paper with two distinct components. Firstly, what kind …Member only

Report: Access Control 2016
Welcome to the Access Control Report 2016: Legacy Infrastructure and Motivations for Upgrading. This report by IFSEC Global and sponsored by access control …
Generation Z and the next wave
Generation Z. iGeneration. Screenagers. The generation born between 1995 and 2009 goes by many monikers. But, whatever you call them, these young people …
The transition to wireless access control
Wireless locks remain one of the fastest growing segments of the electronic access control industry, especially in mature countries. But how many commercial …
Wireless Access Control in 2016
Given the critical advantages wireless technology has over both mechanical locks and wired access control, we would expect to find the market moving steadily …Member only

Report: The wireless access control market in 2016
This report examines issues around wireless systems – including training requirements, from where wireless systems are sourced and wired versus wireless …
Open and integrated security
The most important technology shift in the coming five years will be the increasing demand for integral security management systems with open IT standards. …
Shift on the wearable horizon
From smart watches and smart jewelry to Fitbits and Jawbones, wearable technology is becoming ubiquitous in today’s world. But wearables are evolving …
Accelerating access control and inventory tracking
Businesses today are demanding new access control and inventory tracking solutions to improve security, enhance convenience and increase efficiency. When …
The locksmith of tomorrow
Once upon a time, if you wanted a lock, you went to a locksmith. That's no longer true – you might go to a home improvement store, or the Internet, or …
Developing mobile access for hotels
We recently posted and article about how products are developed at ASSA ABLOY's shared global innovation organization, Shared Technologies. We continue …
Busting the myths around wireless access control
EXPERT OPINION. Let’s begin with something that’s hardly front-page news: the market potential for wireless access control is huge. At January’s …
Healthy ecosystems support diversity
We have reached the third and final part in the Future Lab article series about security ecosystems. This time we investigate important qualities that …
Bringing new products to life
ASSA ABLOY Shared Technologies develop platform technologies to be integrated in ASSA ABLOY group company products. Thinking outside the box is encouraged …
Top secure identity trends for 2015
What are the most important trends to keep track of during this year? HID Global has issued its outlook on technology trends for 2015, as well as other …
Wearables in access control
Wearable technology is on the verge of turning mainstream and the consumer electronics industry has convinced itself that wearable technology will be the …Member only

Physical Security for Today’s Data Centers
Data center managers, faced with an increasingly stringent regulatory environment, need to rely on the latest technology and the industry’s best practices …Member only

Wearables for security: potential or peril?
Can the security industry unlock the potential of wearable technology and improve quality of life – or do the associated problems outweigh the benefits?Member only

Q&A: Security in Asia
Securitas is a global leader in security, offering specialized guarding, technology solutions, consulting and investigation services. In Thailand, Securitas …
Safe for – and from the public
Achieving adequate levels of security in public facilities often means treading a fine line between granting taxpaying citizens their constitutional right …
Stadiums keep track for better control
Technology is helping improve safety and security at football stadiums and could help consign the crowd disasters of the past to history.
Giving – and getting retail service
Whether it’s a security system or an entrance system, retailers cannot afford downtime. Various services are popping up to ensure that doors, locks …
Taking the pulse on hotel security
What would be an ideal security wish list for a hotel? Security experts share their experience and insights with the Future Lab.
Sharing the holiday investment
An appealing blend between staying in a hotel and owning your own home, timeshare holidays are growing in demand. How do they handle security challenges?
Smartphones open campus doors
Mobile phones are second nature to today’s students which is why security and NFC mobile phone applications are making their way to campuses worldwide.
Not without my magstripe card
Magnetic stripe cards have been popular on campuses for years and their appeal shows little sign of waning. But external factors may be providing the impetus …
Ins and outs of utility access
There are many ways to manage access rights in an industrial facility like a power plant or a water utility. Electro-mechanical locking solutions are among …
Hospitals keep disease at bay
One of Canada’s largest hospitals has taken effective measures to prevent the spread of contamination and ensure secure access to pharmaceuticals.
Hospital friendly design
Hospital design is evolving along with advances in technology, safety and security.
Service-minded business models
As the business environment changes, so do the solutions being offered by the security industry. More service-oriented business models, such as hosting, …
PKI opens more doors
Traditionally associated with logical access and the digital signing of documents, PKI is now also being used to control physical access.
Unleash the power
New technologies have emerged that can power up security systems without wires or batteries. Solar, wireless power transmission and energy harvesting solutions …
Access control and video surveillance unite
While access control and alarm systems have been common features with most companies for a long time, video surveillance has often proved too costly to …
Extending ethernet capabilities
Hailed as a watershed innovation when first standardized in 2003, Power over Ethernet (PoE) offers a way of supplying electricity to network devices over …
Fraud fighters
Seven percent of GDP was lost to fraud in 2008, according to the US Association of Certified Fraud Examiners. That's $994 billion a year. But new technology …
No limits for intelligent readers
Card readers were once highly proprietary and difficult to install, and they mainly served the single purpose of granting access to a building or a section …
Bridging two worlds
Previously, the physical and virtual worlds couldn’t be further apart when it came to security. You entered a building using a physical token like …
Get the Edge
Intelligent access control has been around for some time – but traditionally, the brains of the operation were actually hidden in a mechanical room, …
Smart card flexibility
With so many smart card options on the market, manufacturers are constantly exploring new card design and composition in order to give customers a broad …
Aperio is a reality
As a member of ASSA ABLOY’s Future Lab, you were invited to participate in developing a new technology for wireless access control. Thanks to your …
The smartest lock in town
A new intelligent, wireless lock is set to make extending access control quick, painless and affordable. ASSA ABLOY’s new WiFi lock, the Sargent …
Weighing the hacking risks
It’s a story that seems worthy of front-page headlines: A hacker exposes a major flaw in the protocol that underlies many of the world’s access …
Concept test results available now!
In November 2007, we performed an online survey at the ASSA ABLOY Future Lab and got a very good response from our industry. Since then, the feedback from …
Alliances frail but worthwhile
There are three ways to generate growth in a company: organic growth, mergers and acquisitions, and alliances. But beware – partnering is harder …Member only

New concept test – integrated wireless access control
At the ASSA ABLOY Future Lab you provide input on future solutions via online concept tests. The information you give us is thoroughly analyzed and included …
Sealing information leaks
Once upon a time, there were investment banks, retail banks, stockbrokers and various other specialized financial service providers, and they all did their …
Open Standards Development for the Security Industry
As the access control industry becomes more and more “IT-centric” the push for devices that can simply plug-in to an existing network is growing. …
Comments to Coopetition Arrives
This article comes from a magazine read by Security Directors and the author makes the case for, and urges the readers to demand, interoperability among …
The Value and Importance of Open and Interoperable Access Control Products
Historically, access control systems have been anything but open. Early electronic access control systems were custom-built by independent entrepreneurs. …