Access control cards/ tags/ fobs - Expert commentary

Why biometrics are key to a safe Paris Olympics
Why biometrics are key to a safe Paris Olympics

The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled th...

Nedap adapts to change: The dynamic nature of retail crime
Nedap adapts to change: The dynamic nature of retail crime

With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing...

Exploring evolving trends in data security: unveiling key developments
Exploring evolving trends in data security: unveiling key developments

It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the ri...

Latest TDSi news

How should total cost of ownership (TCO) impact security decisions?
How should total cost of ownership (TCO) impact security decisions?

Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lo...

How can organisations integrate physical security with other systems, such as IT and HR?
How can organisations integrate physical security with other systems, such as IT and HR?

By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations...

CFIUS approves Identiv's sale of security business to Vitaprotech
CFIUS approves Identiv's sale of security business to Vitaprotech

The Committee on Foreign Investment in the United States ("CFIUS") has now approved Identiv's transaction to sell its physical security business and assets to Vitaprotech, the secu...

Related white papers

Integrated access control: reap the benefits of connected security

A guide to specifying RFID readers

Three essential reasons to upgrade your access control technology in 2022