Articles by Darren Learmonth
This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous authentication experience Demand grew for unified identity and access management systems supporting both cards and mobile devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuous authe...
You may also be interested in
The role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadHow to lower labour costs when installing video surveillance
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadGunshot detection
Download