Rob Druktenis

Rob Druktenis
Access control program manager, Axis CommunicationsRob Druktenis is an access control program manager at Axis Communications. A 24-year security industry veteran, he's been with Axis since 2014 and has previously worked at VTI Security, Tyco Integrated Security, Honeywell Security, and Northern Computers. He is proficient in a vast array of pertinent security topics such as access control, IP cameras, CCTV, IP intercoms, intrusion detection, biometrics, analytics, and integration.
Round table contributions
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance wi...
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a...
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “t...
Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than do...
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new l...
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance wi...
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a...
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “t...
Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than do...
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new l...
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance wi...
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a...
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “t...
News mentions
ASSA ABLOY Opening Solutions announces that Axis Communications, an industry pioneer in video surveillance, access control, intercom, and audio systems, has completed the integration of ASSA ABLOY Ape...
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a...
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “t...
Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than do...
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new l...
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance wi...
ASSA ABLOY Opening Solutions announces that Axis Communications, an industry pioneer in video surveillance, access control, intercom, and audio systems, has completed the integration of ASSA ABLOY Ape...
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a...
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “t...
Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than do...
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new l...
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance wi...
ASSA ABLOY Opening Solutions announces that Axis Communications, an industry pioneer in video surveillance, access control, intercom, and audio systems, has completed the integration of ASSA ABLOY Ape...
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a...
Key people from Axis
Security experts
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download