Access control readers - Expert commentary

Why biometrics are key to a safe Paris Olympics
Why biometrics are key to a safe Paris Olympics

The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled th...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Choosing the right fingerprint capture technology
Choosing the right fingerprint capture technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

Latest LEGIC Identsystems Ltd news

SwiftConnect and LEGIC partner to enable seamless access for major corporations via NFC wallets in smartphones and other mobile devices
SwiftConnect and LEGIC partner to enable seamless access for major corporations via NFC wallets in smartphones and other mobile devices

SwiftConnect, the pioneering provider of connected access enablement, and Swiss-based LEGIC Identsystems, a global pioneer in secure authentication, access management and IoT platf...

ELATEC to introduce the TWN4 Palon Compact Panel Reader at ISC West 2020
ELATEC to introduce the TWN4 Palon Compact Panel Reader at ISC West 2020

From buildings to vehicle fleets and enterprise networks to perimeter gates, having access control to let the right people in—while keeping everyone else out—is a secur...

LEGIC Orbit upgraded with new security feature that restricts configuration data to specific reader ICs
LEGIC Orbit upgraded with new security feature that restricts configuration data to specific reader ICs

Correct configuration of readers in the field forms the basis of secure ID solutions. In the latest version of LEGIC Orbit, the option to restrict configuration data to specific re...

Related white papers

Access and security in the age of hybrid working

Integrated access control: reap the benefits of connected security

Three essential reasons to upgrade your access control technology in 2022

Quick poll
Which feature is most important in a video surveillance system?