Access control controllers - Expert commentary

The King’s Coronation: Essential security considerations
The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role i...

The latest trends in biometrics for access control (2023 advancements)
The latest trends in biometrics for access control (2023 advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 considerations for RFID Reader selection
Elevators - 14 considerations for RFID Reader selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest ASSA ABLOY news

Centrios ships first hardware products to SECLOCK
Centrios ships first hardware products to SECLOCK

Centrios, a new brand created within ASSA ABLOY to serve the small business market, announces their first shipment of hardware products to SECLOCK. Centrios is a cloud-based acces...

Women in security: Highlights from Security LeadHER 2024
Women in security: Highlights from Security LeadHER 2024

ASIS International and the Security Industry Association (SIA) have closed out a successful second annual Security LeadHER conference, a unique event dedicated to advancing, c...

Embrace future-proof safety with ASSA ABLOY's digital access solutions
Embrace future-proof safety with ASSA ABLOY's digital access solutions

Digitalisation is reshaping the way individuals live and work. Buildings should be at the centre of this change, streamlining daily interactions with homes, offices, and other work...

Related white papers

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge