Empowered Experience: The Hotel and Access Control

Most hotels, even the ones with the best customer service, are not known as places of convenient access. You wait to check in and to check out. You’re given a key card that may or may not work with the door in question. Other steps: putting a credit card on file,...

4 Benefits of Threat Intelligence in Physical Security

First, a definition, admittedly a technical one, of threat intelligence: Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging menace or hazard to assets that can...

SWOT Analysis: Physical and Digital Security

Digital, or cyber, security is playing a larger role in physical security as the latter moves toward more cloud-based solutions. While the shift holds great promise, it’s important to understand the risks and to develop plans and policies that address them. The PSA...
What is Access Control As A Service (ACaaS)?

What is Access Control As A Service (ACaaS)?

Every industry has its lingo. Access control and physical security is no exception. Add the cloud-computing layer, and it can seem like you’re wading in alphabet soup. IAM? SaaS? API? HaaS? Then there’s access control as a service (ACaaS). The acronym has been around...