Topstories

Photo
27.08.2018 • TopstoriesSecurity

Fish Farms Protection with Radar

Theft, vandalism and poaching consist of a great threats to fish farms around the world as many are finding themselves completely defenseless. Typically, farms are located in open ...

Photo
17.08.2018 • TopstoriesSecurity

That‘s Handy!

American technology research firm Gartner predicts that in three years time, more than 20% of organizations will use smartphones instead of physical access cards. Mobile access con...

Photo
13.06.2018 • TopstoriesSecurity

Four Things You Need to Know about GDPR and HID Mobile Access

As the General Data Protection Regulation (GDPR) took affect on May 25th, 2018, we reflect on how mobile access customers, who enable users to use their phones as a “key” to unlock doors, have been adapting and becoming compliant-ready for months. User data is, of course, utilized in cloud services-based mobile access to connect individuals’ phones (and their identities) to the back-end of the physical access control system.

Photo
11.06.2018 • TopstoriesSecurity

Basics of Storage

Collecting massive amounts of data is the trend of our time. Higher-resolution videos, smarter software and interconnection of devices, not just in the field of automation, keep se...

1015 more Topstories

Corporate Security

Strategy of Corporate Security at Volkswagen

Strategy of Corporate Security at Volkswagen

Interview with Andreas Maack, Head of Group Security & Resilience and CSO of the Volkswagen Group