Topics

Accelerating access control and inventory tracking
Businesses today are demanding new access control and inventory tracking solutions to improve security, enhance convenience and increase efficiency. When …
Why gadgets have never been closer at hand
The future is here, and getting personal. With technology seemingly advancing at the speed of light, it may only be a matter of time before much more advanced …
Enhancing the user’s door experience
ASSA ABLOY asked students at Stockholm’s KTH Royal Institute of Technology to put their imaginations to work to enhance the user experience in a door. …
The locksmith of tomorrow
Once upon a time, if you wanted a lock, you went to a locksmith. That's no longer true – you might go to a home improvement store, or the Internet, or …
What’s happening in the Cloud?
Cloud computing has changed the way the physical security industry works. And the evolution is far from over, according to experts. The cloud is what delivers …
Healthy ecosystems support diversity
We have reached the third and final part in the Future Lab article series about security ecosystems. This time we investigate important qualities that …
Bringing new products to life
ASSA ABLOY Shared Technologies develop platform technologies to be integrated in ASSA ABLOY group company products. Thinking outside the box is encouraged …
The significance of standards and ecosystems
The security industry is undergoing a profound change as security technology evolves in the digital age. That is a given, an obvious truth. But a concurrent …
The symbiosis of digital and physical security
The challenge of modern security reminds one of the 1955 Stargazers hit, "Close the door – they're coming through the window": as soon as you've stopped …
Protecting your assets – personal data
As consumers are beginning to adopt wearable technology, new issues arise. One issue is privacy. How do you deal with all the personal data that wristbands …
Top secure identity trends for 2015
What are the most important trends to keep track of during this year? HID Global has issued its outlook on technology trends for 2015, as well as other …
Big Data in physical security
In our previous article about Big Data we learned that retail giants like Amazon use Big Data to analyze purchases and boost sales. But how is Big Data …
Video: What is 3D printing?
Christopher Barnatt, Associate Professor at Nottingham Business University explains the most common applications of 3D printing.
3D printing explained
Everyone is suddenly talking about 3D printing. Although it's been around since the 80s, it's the relatively recent availability of consumer 3D printers …
Creating ecosystems in security
In recent years we have seen a multitude of security solutions that claim to be ‘ecosystems’. But what does it take for such an ecosystem to make it …