Security Innovation for the Past 20 Years and the Future

The Four Musts to Build an RMR Machine

Most integrators have gotten the message that product and installation revenues alone are not sufficient to support a healthy organization in the long term. It’s also clear that the value of your business can be exponentially increased if you derive significant...
Physical Security Best Practices for a Multi-Site Program

Physical Security Best Practices for a Multi-Site Program

If your company is expanding, a new physical security system is certainly top of mind. As your company grows, you may face numerous security challenges, including managing multiple existing systems with varying levels of technology and users carrying multiple...

SWOT Analysis: Physical and Digital Security

Digital, or cyber, security is playing a larger role in physical security as the latter moves toward more cloud-based solutions. While the shift holds great promise, it’s important to understand the risks and to develop plans and policies that address them. The PSA...
What is Access Control As A Service (ACaaS)?

What is Access Control As A Service (ACaaS)?

Every industry has its lingo. Access control and physical security is no exception. Add the cloud-computing layer, and it can seem like you’re wading in alphabet soup. IAM? SaaS? API? HaaS? Then there’s access control as a service (ACaaS). The acronym has been around...