Access control software - Expert commentary

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

Mind the gap: Addressing cybersecurity at every phase of technology management
Mind the gap: Addressing cybersecurity at every phase of technology management

In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entw...

How Californian cities are improving  surveillance and security - key developments from 2022 to 2024
How Californian cities are improving surveillance and security - key developments from 2022 to 2024

As urban populations grow and security challenges evolve, Californian cities have increasingly turned to advanced surveillance systems to enhance public safety. Surveillance infr...

Latest LEGIC Identsystems Ltd news

SwiftConnect and LEGIC partner to enable seamless access for major corporations via NFC wallets in smartphones and other mobile devices
SwiftConnect and LEGIC partner to enable seamless access for major corporations via NFC wallets in smartphones and other mobile devices

SwiftConnect, the pioneering provider of connected access enablement, and Swiss-based LEGIC Identsystems, a global pioneer in secure authentication, access management and IoT platf...

ELATEC to introduce the TWN4 Palon Compact Panel Reader at ISC West 2020
ELATEC to introduce the TWN4 Palon Compact Panel Reader at ISC West 2020

From buildings to vehicle fleets and enterprise networks to perimeter gates, having access control to let the right people in—while keeping everyone else out—is a secur...

LEGIC Orbit upgraded with new security feature that restricts configuration data to specific reader ICs
LEGIC Orbit upgraded with new security feature that restricts configuration data to specific reader ICs

Correct configuration of readers in the field forms the basis of secure ID solutions. In the latest version of LEGIC Orbit, the option to restrict configuration data to specific re...

Related white papers

Access and security in the age of hybrid working

Cybersecurity in keyless access management

The critical role of access control in K-12 school security

Quick poll
What is the most significant challenge facing smart building security today?