This website uses cookies. By continuing to browse this website without changing your web-browser cookie settings, you are agreeing to our use of cookies. Find out more by reading our cookie guideline.

Close X
  • Log in
  • Lost Password
  • Register
Future Lab – ASSA ABLOY – Studying security trends
Future Lab – ASSA ABLOY – Studying security trends
  • Home
  • Latest Articles
  • Categories
    • Access control
    • Biometrics
    • Door control
    • Identity
    • IT & Data security
    • Locking
    • Mobile access
    • Monitoring & Detection
  • Topics
    • Artificial Intelligence
    • Augmented Reality (AR)
    • Big Data
    • Cloud
    • Culture
    • Design
    • Industry & Ecosystems
    • In-home delivery
    • Internet of Things
    • Real-time locating systems (RTLS)
    • Safety
    • Smart homes
    • Sustainability
  • Segments
    • Education
    • Government
    • Healthcare
    • Hospitality
    • Industry & utilities
    • Enterprise
    • Public facilities
    • Residential
    • Retail
    • Transportation
  • Our way of working
  • Podcast
  • Members only
  • About Future Lab
Home > Categories > IT & Data security

IT & Data security

The latest trends in online identity control, encryption and how access control can protect data centers against cyber threats and hackers.

  • 2022
  • 2021
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • All years
  • English
  • German
  • Spanish
  • French
  • Swedish
  • All
  • Identity
  • Access control
  • Biometrics
  • Door control
  • Locking
  • Mobile access
  • Monitoring & Detection
  • Other security
October 17, 2018 in Podcast, Education, IT & Data security

Podcast: Unlocking the Security of Security

On this final episode of Unlocked, three campus security experts share how to keep your physical security devices secure, and why it’s just as important …
Hardware, Campuses, security devices
  • 0
  • 0
  • 0
IP Camera Library
August 7, 2017 in Podcast, Education, IT & Data security, Monitoring & Detection

Podcast: Unlocking Video Surveillance

Security cameras are smarter than ever before. The move from analog to IP-based digital video surveillance has allowed cameras to go from a documentary …
IP cameras, CCTV, Campuses
  • 0
  • 0
  • 0
Campus Security Costs
March 16, 2017 in Podcast, Access control, Education, IT & Data security

Podcast: Unlocking Physical Security Costs

In Episode 2 of the new podcast 'Unlocked', we take you on the journey of an IT Director at a small college as he navigates through the sometimes choppy …
Schools, IT, System integrators, Security managers, Campuses
  • 1
  • 0
  • 0
Phone Identity Assurance
March 7, 2016 in Identity, Design, IT & Data security, Industry & Ecosystems

Security will focus more on the user experience

Focusing security solutions more on user experience will help close the gap between planning and compliance, while ensuring that security adapts to rather …
Identity, User experience (UX), Smartphones
  • 0
  • 0
  • 0
Open and integrated security
November 30, 2015 in Access control, IT & Data security, Industry & Ecosystems

Open and integrated security

The most important technology shift in the coming five years will be the increasing demand for integral security management systems with open IT standards. …
Interoperability, Standards
  • 0
  • 0
  • 0
October 13, 2015 in IT & Data security, Mobile access, Enterprise

Reducing mobile security risks

Mobility may be a fact of life in just about all enterprises, but that doesn’t mean IT organizations aren’t concerned about its impact on security …
Identity, Hackers, White papers, Smartphones
  • 1
  • 0
  • 0
May 18, 2015 in Cloud, Big Data, IT & Data security, Internet of Things, Monitoring & Detection

What’s happening in the Cloud?

Cloud computing has changed the way the physical security industry works. And the evolution is far from over, according to experts. The cloud is what delivers …
The Cloud, Physical security
  • 2
  • 0
  • 0
The symbiosis of digital and physical security
February 19, 2015 in IT & Data security, Smart homes

The symbiosis of digital and physical security

The challenge of modern security reminds one of the 1955 Stargazers hit, "Close the door – they're coming through the window": as soon as you've stopped …
Hackers, Data Centers, Control4, IT security
  • 1
  • 0
  • 0
Windows Holographic
February 9, 2015 in Augmented Reality (AR), IT & Data security, Mobile access

Protecting your assets – personal data

As consumers are beginning to adopt wearable technology, new issues arise. One issue is privacy. How do you deal with all the personal data that wristbands …
Smart watches, Innovation, Tracking, Wearable technology
  • 1
  • 0
  • 0
Member only
Physical Security for Today’s Data Centers
January 6, 2015 in Access control, IT & Data security, Enterprise

Physical Security for Today’s Data Centers

Data center managers, faced with an increasingly stringent regulatory environment, need to rely on the latest technology and the industry’s best practices …
IT security, White papers, Data Centers
  • 3
  • 0
  • 0
August 31, 2011 in Government, IT & Data security, Industry & utilities

Utilities Cyber Threat Legislation on the Rise

Operational systems like SCADA and DCS [1] that control plants, refineries of all sorts and the flow of electricity in power grids, are now interconnected …
Electricity, IT security
  • 0
  • 0
  • 0
December 16, 2010 in Identity, Education, IT & Data security

Identity control online

As technology improves, establishing who’s who, especially online and through non-traditional identification methods, is becoming increasingly difficult.
Identity, IT security, Hackers, NFC
  • 0
  • 0
  • 0
March 25, 2010 in IT & Data security

Perfect your password

Too many people are disregarding the security risks of using simple passwords online. But, in trying to avoid the hassle of creating strong passwords, …
IT security, Hackers
  • 0
  • 0
  • 0
March 25, 2010 in IT & Data security

Encryption basics

If you work with any kind of private data, it is good to acquaint yourself with encryption and a growing number of requirements to protect sensitive data.
IT security, Hackers
  • 0
  • 0
  • 0
December 15, 2009 in Government, IT & Data security, Enterprise

Where did your data go?

A civilian employee of a police department disables warehouse security cameras and steals backup tapes putting identity numbers and the direct-deposit …
IT security, Hackers
  • 0
  • 0
  • 0
October 15, 2009 in Government, IT & Data security

Protecting the privacy of others

With every action you take in our wired world, whether making an Internet purchase or posting a blog, you leave a digital footprint, a record of who you …
IT security, Hackers
  • 0
  • 0
  • 0
June 15, 2009 in Identity, Real-time locating systems (RTLS), IT & Data security

Watch your (digital) step!

Maybe you cover your PIN number when you enter it into an ATM. Perhaps you change and strengthen your computer passwords often. You may even refrain from …
Audit trails, IT security, Identity
  • 0
  • 0
  • 0
April 16, 2008 in Access control, IT & Data security

Weighing the hacking risks

It’s a story that seems worthy of front-page headlines: A hacker exposes a major flaw in the protocol that underlies many of the world’s access …
Risk assessment, IT security, Hackers, HID Global, Wiegand
  • 0
  • 0
  • 0
December 11, 2007 in Access control, IT & Data security, Industry & Ecosystems

Alliances frail but worthwhile

There are three ways to generate growth in a company: organic growth, mergers and acquisitions, and alliances. But beware – partnering is harder …
Securitas AB, IT security, Ecosystems, Interoperability
  • 0
  • 0
  • 0
December 11, 2007 in IT & Data security

Separate worlds come together

A combination of security and IT knowledge will be crucial for succeeding in tomorrow’s security market. A recent study identifies some pitfalls …
IT security, Hackers
  • 0
  • 0
  • 0
November 2, 2007 in Access control, IT & Data security

Sealing information leaks

Once upon a time, there were investment banks, retail banks, stockbrokers and various other specialized financial service providers, and they all did their …
IT security, Hackers, Financial institutions
  • 0
  • 0
  • 0

Links

  • Future Lab on Twitter
  • ASSA ABLOY Group Website
  • ASSA ABLOY on Facebook
  • ASSA ABLOY on LinkedIn
  • ASSA ABLOY on Flickr
  • HID Global Blog

Get the Future Lab newsletter

Sign up and receive updates from the Future Lab.

Latest tweets

@ 01 Jan

Latest images

Phoniro home care smart lock Joakim Jardenberg Mechanical key management Cliq remote fire department Cliq remote system Matthias Weiß Aperio compability check One credential, many functions ASSA ABLOY product design ASSA ABLOY energy harvesting Abloy PULSE Daniel Skarp

View all images

Tags

Most read articles

  • Week
  • Month
  • All time
Posts not found!
Posts not found!
  • The thoughtful home
    Read 24865 times
  • Digital identities in your everyday life
    Read 24282 times
  • Making Artificial Intelligence real
    Read 22301 times
  • How ASSA ABLOY is bringing value through the IoT
    Read 20774 times
  • La seguridad de los aeropuertos, en fase de madurez
    Read 20179 times

Latest commented articles

  • Thank you.
    Post: Report: Smart-Home Security in 2016
  • Epson printer is the most common printer errors such as epson wf-3640 error code 0x97 used to provide their service to the users. While using the printer you can face, some common problems. There are simple steps that need to follow such as clean your printer's clogged nozzles, reconnect your printer, check that your printer must be connected with your pc.
    Post: Reducing mobile security risks
  • Despite having the bio-metric system attended to by different locksmiths there were issues. I was recommended to try you guys. Your technician Jake did a fine job in evaluating the problem and finding a suitable solution. He was very patient in explaining the technical aspects and showed great expertise. It was a refreshing change from the type of customer service I experienced earlier.
    Post: The locksmith of tomorrow
  • Anthony, I apologize to you for my delay in responding. Please feel free to reach out to me at brian.schwab@s3sdc.com so we can discuss if you are still having issues. Regards, Brian
    Post: Augmented reality in physical security
  • There was an issue with the keyless entry system installed at my office and I called up your company.
    Post: Augmented reality in physical security

Most commented articles

  • Week
  • Month
  • All time
Posts not found!
Posts not found!
  • Bringing new products to life
    Commented 0 times
  • The locksmith of tomorrow
    Commented 3 times
  • Defining Big Data
    Commented 0 times
  • Wearables for security: potential or peril?
    Commented 2 times
  • Physical Security for Today’s Data Centers
    Commented 0 times

Categories

  • Identity
  • Access control
  • Biometrics
  • Door control
  • IT & Data security
  • Locking
  • Mobile access
  • Monitoring & Detection
  • Other security

Topics

  • Augmented Reality (AR)
  • In-home delivery
  • Artificial Intelligence
  • Cloud
  • Real-time locating systems (RTLS)
  • Big Data
  • Culture
  • Design
  • Smart homes
  • Industry & Ecosystems
  • Internet of Things
  • Safety
  • Sustainability

Segments

  • Education
  • Government
  • Healthcare
  • Hospitality
  • Industry & utilities
  • Enterprise
  • Public facilities
  • Residential
  • Retail
  • Transportation

Become a member of ASSA ABLOY Future Lab

About this site

Future Lab is an initiative from ASSA ABLOY aimed at observing and analyzing the trends and the future of the security arena. Sign-up and get access to all content.

Read more

Get in touch

  • Future Lab on Twitter
  • Future Lab on YouTube
  • futurelab@assaabloy.com

An initiative by

Experience a safer and more open world
©ASSA ABLOY 2023
  • Legal
  • Privacy notice
  • Cookies