Access control controllers - Expert commentary

The King’s Coronation: Essential security considerations
The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role i...

The latest trends in biometrics for access control (2023 advancements)
The latest trends in biometrics for access control (2023 advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutio...

Elevators - 14 considerations for RFID Reader selection
Elevators - 14 considerations for RFID Reader selection

RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from buil...

Latest Verkada Inc. news

SIA's SNG 2024: Top security industry conference
SIA's SNG 2024: Top security industry conference

The Security Industry Association (SIA) has announced the schedule, speaker lineup and program for the 2024 Securing New Ground (SNG), the security industry’s...

What is the most overlooked factor when installing physical security?
What is the most overlooked factor when installing physical security?

While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that depl...

Verkada Command Connector: Integrate third-party cameras
Verkada Command Connector: Integrate third-party cameras

Verkada, a pioneer in cloud-managed enterprise building security and management, announced a new way for organisations to transition to the cloud with its Command Connector, w...

Related white papers

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Securing unmanned infrastructure at the network edge