HID Global
Physical access control attitudes
September 2014, Access Control & Identity Management
Significant majority of survey respondents acknowledge importance of top technology and policy best practices, yet far fewer say they are implementing them well.
Read more...
Securing enterprise cloud applications
July 2014, Information Security
With data now living on the wrong side of conventional internal defences in cloud-based server farms, the ground has shifted and a one-size-fits-all approach to data protection is not sufficient.
Read more...
Durable high frequency Logi Tag 121
May 2014, Products & Solutions
Logi Tag 121 transponders are the first high frequency (HF) tags produced with patented Vigo technology, yielding thinner, smaller industrial HF tags with uncompromised performance.
Read more...
Smartcard solutions for higher education
April 2014, Asset Management, Access Control & Identity Management
Colleges and universities must keep their campuses safe in as cost-effective manner as is possible. At the same time, each school has its own set of unique demands and challenges, requiring flexible system architectures that satisfy today’s demands while providing the foundation to meet future security needs.
Read more...
Seamless user experience
April 2014, Access Control & Identity Management
White paper reviews key trends that will enable organisations to more easily support multiple access control use cases and identities on one card or smartphone.
Read more...
HID Global acquires IdenTrust
March 2014, News & Events
IdenTrust complements HID Global's position as a leader in providing its partners and end-users with the ability to securely create, manage and use identities for a variety of applications.
Read more...
HID enhances FARGO Direct-to-Card printers
February 2014, Access Control & Identity Management
Enhanced DTC line increases flexibility with iCLASS SE embedded encoder technology and in-line card personalisation capabilities that enable one-step printing and encoding of multiple credential technologies.
Read more...
HID and consortium partners receive US cyber security grant
November 2013, News & Events
Consortium will incorporate identity and attribute verification technology contained in variety of form factors, including use of mobile devices for authentication, securing data flows including encrypted contactless interfaces, and security-enhancing wearable devices.
Read more...
The importance of visitor management for installers
Access & Identity Management Handbook 2014, Asset Management, Access Control & Identity Management
Many security dealers and integrators overlook visitor management. It doesn’t often carry the high system sales cost of access control or CCTV systems. But the fact is that a modern, professional visitor ...
Read more...
Trust but verify
Access & Identity Management Handbook 2014, Access Control & Identity Management
The term "trust but verify" captures the practical reality of a world in which so many of our interactions occur online and we need mechanisms to verify the identity of the entities with whom we interact.
Read more...