Latest Updates
The right questions to ask prospective identity governance vendors
February 14, 2025Discover how asking the right questions can help IT decision-makers navigate the complex landscape of security solutions and select the best vendor for their needs. As an IT decision-maker, navigating the vast array of security solutions on the market can...
How to overcome key physical security public relations challenges
January 31, 2025The top 10 public relations challenges faced by physical security companies and solutions for each. As America’s domestic and foreign physical risks continue to evolve in 2025, businesses and government departments must invest in new security services and solutions to...
Why supporting a modern IoT platform in physical security is vital
January 17, 2025With modern IoT platform support, physical security OEMs can improve customer satisfaction and lower costs. IoT is synonymous with integrating technology into once-static elements, enabling new efficiencies and endless possibilities for business and societal growth. As a result, the IoT...
Advanced AI for data-driven security operations
January 3, 2025AI-enabled guarding and guard force management achieve breakthrough capabilities in physical security operations. For years, I’ve been writing about how the physical security industry lags behind IT by five to 15 years. But for the first time, that gap is...
AI and Access Control, Perfect Together?
December 13, 2024Rob Rowe, the head of the HID AI Lab, shares his valuable insights and cautious perspectives as the security industry continues to harness AI’s potential Integrating artificial intelligence (AI) into security systems is a journey filled with optimism for its...
Mobilizing the future of access control
December 6, 2024Industry experts talk about challenges, best practices, and the future of mobile credentialing at ISC East 2024. Skyrocketing innovation in mobile credentialing is redefining access control for organizations, integrators, and end users. As Bluetooth-based systems give way to near-field communications...
The IoT revolution is transforming physical security for the connected age
November 27, 2024The commercial sector has been more cautious in adopting an IoT approach to systems, but momentum is building. The Internet of Things (IoT) has become deeply woven into the fabric of our daily lives. From smart speakers that dim our...
The evolution of edge computing in security
November 15, 2024From single devices to comprehensive solutions, physical security systems are network-centric and require due diligence when implementing. The security industry stands at a technological crossroads where the promise of edge computing is transforming how we process and analyze data from...
Over half of organizations cite technical debt as top hurdle to identity system modernization
November 8, 2024The Cloud Security Alliance’s report also found that over 75% of enterprises are using two or more IDPs and struggle to manage access controls and consistent security policies. Modernizing identity systems is proving difficult for organizations due to two key...