Access Control
ID&C Take RFID Wristband Technology To South American Event Market
ID&C take RFID wristband technology to South American event market festivals outdoor events event technology an Event Magazine ID&C Ltd, the global market leader in RFID wristbands and credentials for live events, and PasseVIP, Brazil’s largest security wristband provider have announced a strategic partnership that will see the latest RFID wristband technology reach South America’s expanding live entertainment sector. The partnership follows a successful RFID wristband deployment at the Rock in Rio festival last summer, where 40,000 of ID&C’s RFID wristbands were used for contactless payments and access control. Since launching its RFID wristbands at the Coachella Festival in 2011, ID&C has gone on to supply more than 3.5 million RFID products to live events around the world including in 2013, The UEFA Champions Festival, Rock in Rio, Bonnaroo and British Summer Time. ID&C’s head of RFID, Steve Daly said, “South America and more specifically Brazil is a very tech savvy and forward thinking territory. We wanted to align ourselves with a company that has the same ethics and customer focus that we pride ourselves on here at ID&C. We are delighted to be working with PasseVIP to service the growing demand in Brazil for our products. With this new wristband technology, patrons will no longer need to carry a lot of cash into festival venues, which translates into added safety for the public”, says Antonio Bindi, co-owner of PasseVIP. “Furthermore, with the use of RFID we will get people out of the huge lines, thus increasing sales and […]
Source www.eventindustrynews.co.uk
TDSi Directors Highlight Security And Access Control Trends For 2014
Published on 31 Jan, 2014 Last year saw a big rise in integrated systems in the security sector and 2014 looks set to follow this pattern with a number of technologies and trends coming to the fore With the integration of different security, IT and building services, 2014 looks to be a year of evolution rather than revolution Access Control continues to innovate by embracing new technology in 2014 – by John Davies, Managing Director & Mike Sussman, Engineering and Operations Director at TDSi . Last year saw a big rise in integrated systems in the security sector and 2014 looks set to follow this pattern with a number of technologies and trends coming to the fore. With Integration of different security, IT and building’s services coming together, 2014 looks set to be a year of evolution rather than revolution – which from a business point of view ideally places the industry in a strong position to maintain growth. Near Field Communications (NFC) A technology that has been promising to do big things for some time is Near Field Communications (NFC). Whilst the technology for it has been available for some time, NFC’s success will be determined by the tipping point from the number of enabled mobile devices and the public’s willingness to use them to gain secure access to secure doorways. However the use of NFC has also been spurred on by a number of new compatible stand-alone locks which are especially well suited to access control using […]
Source www.sourcesecurity.com
Pilot Project Begins To Replace Your Hotel Key With Your Smartphone Using Bluetooth
Soon enough you’ll be able to walk into a hotel, straight past the front desk and have your door open automatically for you without any extra effort required, thanks to a new pilot project by Starwood Hotels (via WSJ ). Two hotels are debuting keyless entry via smartphones that have a companion app installed and can communicate via Bluetooth 4.0, one in Harlem and one in Cupertino, with both set to go live before the end of the first quarter of this year. Notably, the tech doesn’t use NFC, but rather opts for low-energy Bluetooth, which is available on Apple’s latest iPhone models as well as on most contemporary high-end Android smartphones. The implementation by Starwood would deploy virtual keys via their smartphone app to hotel guests, which would allow the guests to then open their hotel room door simply by tapping or gesturing with their device once they arrive. Starwood is bullish on the potential of the tech: CEO Frits van Paasschen told the WSJ that it believes this will be the “new standard” for hotel access, once it gets past the novelty stage. Of course, it has some potential limitations, like how to easily provision multiple keys for guests and their kids, as well as making sure that the tech is secure enough that patrons are comfortable with it. Plus, unforeseen parts of the check-in experience like arriving hours early are things that are often dealt with on the fly by the people manning the desk, so […]
Source techcrunch.com
a.p.i. Monitoring Adds Support For IP Communications From Bosch Systems
A long-discussed plan to bring free WiFi to downtown Beaufort could be up and running by the end of February. A “wire-cutting” ceremony is tentatively planned for Feb. 28. Main Street Beaufort, USA, has been working with Hargray Communications and the city of Beaufort on the plan, which would bring wireless Internet service to the Henry C. Chambers Waterfront Park. Transmission equipment would be set up at the park’s pavilion and at the restrooms near the playground. “I’m ready to pull my big scissors out of my closet and sharpen them up so we cut that wire,” Main Street Beaufort executive director LaNelle Fabian said. “I love when we cross long-term projects off our list.” To use the WiFi on a smartphone, tablet, computer or other device, people will have to pass through a landing page with advertisements, information and links related to Beaufort. The service, which will cost $9,000 for the first year, is being paid for in part by that advertising. There are 17 ad spaces, with costs ranging from $375 to $1,500 for the banner at the top of the page, Fabian said. “I tried to keep the price down and small-business friendly, because our first go-around is going to be to downtown businesses so they can target the people who are downtown,” she said. Main Street seeks $4,500 in accommodations-tax money from the city to pay for the rest. The accommodations tax, often referred to as a “bed tax,” is a levy on overnight lodging […]
Source www.islandpacket.com
Bank Aljazira Deploys VidSys PSIM To Centralize Security Operations
By Kirsty McMahon on January 20, 2014 vidsys-logo Bank Aljazira (BAJ), a leading Shari’ah compliant financial institution in Saudi Arabia, has deployed VidSys Physical Security Information Management (PSIM) software, in order to reduce risk and enforce standards across its security operations. With the financial industry institutions facing increasingly sophisticated threats directed at bank assets and brand integrity, BAJ’s security team sought to reduce risk and ensure compliance with recently strengthened Saudi Arabian Monetary Agency (SAMA) security regulations. BAJ selected the VidSys PSIM to help implement rigorous corporate standard operating procedures (SOPs) across all its facilities, including ATMs, cash centres, branches and corporate buildings. With a multitude of systems, sensors and devices all generating alerts and alarms, BAJ needed to create a streamlined and centralised view of operations. Leveraging the PSIM platform, the BAJ security team can now efficiently detect, analyse and respond to any incident across its geographically dispersed locations, while simultaneously adhering to its SOPs and complying with new SAMA regulations and standards. SecuTronic, a leading Middle East systems integrator, deployed the VidSys PSIM software platform, leveraging this technology to enable integration of multiple proprietary systems, including GE and Nedap access control technology, fire systems from Bosch and Simplex, video from Dedicated Micros and American Dynamics and a large network of ATMs. The VidSys multi-vendor video management application tightly integrates BAJ’s surveillance capability with alarms to provide real-time verification. By combining all of the systems into one user interface, the VidSys solution facilitates greater situation awareness and resolution […]
Source www.securitynewsdesk.com
Hikvision Announces Partnership With Prysm Software
Hikvision Announces Partnership with Prysm Software Views:7 December 17, 2013 Hikvision and French security software developer Prysm recently announced the integration of all Hikvision products within the Prysm AppVision Physical Security Integration Manager. This combination allows Hikvision’s products to be managed directly from the AppVision PSIM video wall and video matrix, for integrated security and building automation projects around the globe. PSIM (Physical Security Information Management) is able to integrate different systems into a unified formula, such as video surveillance, access control, intrusion, fire and life safety, perimeter protection, or building automation. This also analyzes and assesses data from disparate systems, making intuitive decisions and also communicating with operators to form the proper response. With general awareness of this technology and its capability increasing over the years, PSIM markets now present robust opportunities for worldwide vendors. Hikvision, as a total video surveillance solution provider, also stands to prosper from this booming market due to the inherent necessity of global security needs. "Our collaboration with Hikvision recognizes the leading market position that Hikvision is now enjoying in many of the markets where the AppVision Community Partners operate. It also demonstrates our commitment to open architecture. This tie-up means that our Community Partners are now better positioned to offer competitive, robust, and scalable integrated security solutions for the benefit of the industry," stated Liam Heatley, Export Sales Manager at Prysm. "We are already seeing many benefits from this integration, as the Hikvision brand has further reinforced AppVision’s image as the best […]
Source www.4-traders.com
Connecticut Panel Recommends New School Safety Standards
Friday December 20, 2013, 6:26 PM HARTFORD, Conn. (AP) — A state panel is recommending new school security standards in the wake of last year’s mass shooting at Sandy Hook Elementary School in Newtown. On Friday, the School Safety Infrastructure Council called for a uniform, school security assessment process to be put in place. Until now, school safety has been determined almost entirely by local decision-makers. According to the council’s report, that has led to "a very uneven and unpredictable level of school security design across school district lines." Under this new proposal, which is being presented to the General Assembly for consideration, improved security is recommended in nine areas of school design. They include things such as surveillance of school perimeters, lighting and access control of parking areas, access control to roofs and communication system with mass notification capabilities.
Source www.northjersey.com
Video Insight Integrates VMS With AMAG?s Symmetry v7.0.1 Security Management System
Published on 16 Dec, 2013 AMAG Technology, an access control, IP video and intrusion detection (IDS) solution provider, is happy to announce that Video Insight is now a member of the Symmetry Extended Business Solutions Program as a Certified Partner. Video Insight has certified its Video Management Software (VMS) with AMAG’s Symmetry v7.0.1 Security Management System, which integrates the video management software with AMAG’s newest version of Symmetry access control software. AMAG and Video Insight cooperatively tested and certified this integration. “The integration with Video Insight provides AMAG customers with another powerful video management software solution that will operate seamlessly with Symmetry,” said Symmetry Extended Business Solution, Program Manager, Shae Taylor. “We are happy to welcome Video Insight into the Extended Business Solutions Program.” “We’re excited to offer Video Insight customers the ability to integrate live and recorded video with Symmetry access control. This partnership offers our end users the ability to take advantage of the key features that both of our products share – delivering an easy-to-use, yet powerful security solution,” said Video Insight CEO, Rob Shaw. The Video Insight VMS and Symmetry Security Management integration provides many benefits for end users: Live and recorded video from the Video Insight NVR displayed in the Symmetry client application Access control events can be marked and associated to corresponding video for immediate retrieval of video data Live video displayed from Symmetry graphical maps Video alarm conditions displayed in the Symmetry Alarms screen The Video Insight Video Management Software (VMS) and […]
Source www.sourcesecurity.com
Axis Physical Access Control Products
? Contact us Axis is introducing a new level of freedom for physical access control. Freedom that stems from the same open IP philosophy we pioneered in video surveillance. AXIS A1001 is an independent unit that can be installed at each door, completed with third-party door accessories such as sensors, door locks and readers. Suitable for small and medium-sized businesses as well as larger enterprises. A non-proprietary and open IP-based access controller Traditional proprietary systems mean limited options, central servers with complex and expensive cabling, as well as restricted possibilities for integration and scalability. AXIS A1001 has an open interface that enables integration of video, intrusion detection and other systems. With AXIS A1001, there’s finally an open and future-flexible alternative for physical access control. Two possible pathways AXIS A1001 Network Door Controller is suitable for installations of all sizes and is a platform for different solutions – ensuring you’ll find exactly the right fit for your needs:
Source www.axis.com
Zwipe Offers Fingerprint-Authenticated RFID Access-Control Card
Norwegian startup Zwipe is marketing a new passive Near Field Communication (NFC) RFID access-control card that incorporates a fingerprint scanner to authenticate an individual before the card responds to an RFID reader. Initially, the company has signed contracts with two access-control technology distributors—one in the United States and the other in Europe—both of which have asked to remain unnamed. Commercial release of the card, known as Zwipe Access, follows two pilots in Oslo—one conducted at Telemark University College (TUC), and the other at law firm Simonsen Vogt Wiig —says Kim Kristian Humborstad, Zwipe’s CEO and cofounder. The card is also being tested by several other small Norwegian companies, he says. At Simonsen Vogt Wiig, the Zwipe technology is being used by the law firm’s Stanley Security Solutions NFC-based access-control system. At TUC, as well as for several other pilots, Zwipe is providing a Salto Systems X4 door controller with a built-in RFID reader that supports cards made with NXP Semiconductors ‘ Mifare DESFire EV1 chip. Zwipe Access was first conceived by Humborstad and a fellow student at TUC’s school of innovation and entrepreneurship, Humborstad explains. Initially, he says, the team was focused on creating secure identification solutions that could authenticate an individual without intruding upon the user’s privacy. They were interested in how technology could be employed at grocery or convenience stores, for example, to prove a customer buying liquor or other controlled products was who he said he was. Eventually, Humborstad reports, they found a market for improved […]
Source feedly.com
How Anti-Passback And Anti-Tailgating Capabilities Enhance Building Access Control
Security is a top priority for every type of business. Unauthorized access gained through various entry points puts employees at risk of physical harm and inventory at risk from theft. infinias Intelli-M Access access control management software is equipped with both Anti-Passback and Anti-Tailgating features that help prevent unauthorized entry to designated areas and enhance security at building access points. Anti-Passback Anti-Passback is an access control security measure that prevents a cardholder from passing his or her access card to an individual behind them, and allowing them to gain access into a secured zone. There are two traditional methods for preventing this type of security breach: Local Anti-Passback and Network Anti-Passback. Local Anti-Passback Local Anti-Passback is intended for single door access only. It prevents successive swipes by a cardholder into a zone, within an hour. The hour time limit is hard coded on the controller and cannot be modified. Network Anti-Passback Network Anti-Passback is intended to work across multiple doors or turnstiles. For example, if there are five turnstiles that allow access into a zone, the rule will be applied to all five turnstiles. This prevents a cardholder from entering ‘Turnstile 1,’ walking down to ‘Turnstile 3’ and passing back his or her card. This method will prevent successive card swipes by a cardholder into a zone, within an hour. Anti-Passback establishes a specific sequence in which access cards must be used in order for the system to grant entry. It is commonly used at access points such as […]
Source www.supercircuits.com
Can Apple Transfer Its Elegance To Secure Biometrics And Access Control?
With a fresh patent in hand this week for facial recognition, a fingerprint reader on its iPhone 5 and a new $345 million acquisition of 3D-sensor company PrimeSense , Apple seems to be putting some serious body english on the user interface. Apple facial recognition device touchID primesense Exhibit 1 from Apple’s Facial Recognition patent. No. 124 points to an "image sensor" behind the screen. Is Apple gunning to re-define interacting (re: authentication) and interfacing with computers, devices – and ultimately "things" in the computing environment at large? And will it re-set expectations for security, as well as, for innovation and convenience? Apple’s newest patent awarded by the U.S. Patent and Trademark office points to a sophisticated array of biometric and gesture-based inputs across a range of devices and vertical industries. If that is the case (the company isn’t saying), can Apple’s pedigree for elegant design overcome fickle user acceptance and current shortcomings in biometric technology and lap the field? "The state of play today in consumer biometrics security is pretty primitive," said Steve Wilson, vice president and principal analyst at Constellation Research. "In security, we’re accustomed to rigorous standards and testing; lots of peer review; all encryption algorithms being published. But with biometrics we still don’t have agreed upon test protocols." Wilson said consumer biometrics is all about convenience and has very little to do with serious security. Apple found that out first hand when the Touch ID fingerprint reader on the new iPhone 5 was hacked shortly after […]
Source www.zdnet.com
IHS: Electric Utilities And Oil Refineries To Increase Investment In Perimeter Security
Although most critical infrastructure sites are target applications for electronic perimeter security, electrical utilities and oil refineries are projected to have the most growth opportunity, according to a published note by Blake Kozak, senior analyst for access control, fire and security at IHS Inc. The global market size for electronic perimeter security sensors and video in electrical utilities and oil refineries is forecast to top $160 million in 2014, says Kozak. Electrical utilities have experienced strong growth despite the economic slowdown in 2011 and 2012. Part of this growth is resulting from the trend to use remote video and networked sensors in order to configure and maintain sensors from remote locations. For example, there has been demand to integrate video with detection sensors and network these back to a central monitoring station. This has helped increase demand for applications and locations where sensors couldn’t be monitored in the past. Another driver is the updates to the NERC CIP standards which are mostly concerned with cyber security and classifying / identifying critical assets, which could lead to a change in the security requirements for transmission substations. For example, NERC CIP Version 4 states any substation that maintains transmission lines at a capacity of 500kv or higher are now considered a critical asset. Solar power plants, oil refineries and LNG plants are also expected to be strong markets to sell perimeter security equipment, says Kozak’s note. The capacity of solar power is expected to increase dramatically, especially […]
Source www.gsnmagazine.com
Zwipe Raises $3.5M In Series A Funding
Zwipe , an Oslo, Norway-based global provider of biometric identity protection solutions, raised an additional $3.5m in Series A funding . Of the $3.5m, $2.5m was invested through a private placement, and the remaining $1m was a grant given by the Government of Norway. The company intends to use the funds to both expand the sales organization for the access control market, as well increase investment in technology development and application. Led by Kim Kristian Humborstad, CEO, Zwipe recently launched the Zwipe Access biometric card, which is based on a NFC (Near Field Communication) platform which users can use to authenticate themselves through pin code and fingerprint. It has no external database containing sensitive information as the fingerprint data is only stored inside the Zwipe card. The company has also added industry veteran Clas Thelin as new Chairman of the Board of Directors of Zwipe. FinSMEs 11/12/2013 Government of Norway Zwipe
Source www.finsmes.com
Area Control Specification 2.0 Released By PSIA
your boyfriend once experimented with take a skincare {queen|full|california king|king|double|ruler|princess|cal king|twin|single|cali king|cal. a short time right after, Varlamov waived dan Wilson looking at the screen.. if your little one definitely is constipated, reebok nfl throwback jerseys cheap jerseys from china unlimited you need to resolve in which by using the as well as if required osmotic stimulant laxatives {like|such as|just like|similar to|including|for instance|for example|enjoy|prefer|want|love|much like|comparable to|really like|along the lines of|the same as|not unlike|similar to that of|wish|appreciate|desire|as|exactly like|akin to|for instance like|as if|for example like|choose|which include|similarly to|that include|need|similar|as with|really enjoy|which includes|like for example|resembling|as though|adore|these|for example, cheap nfl jerseys kids that|such|this kind of|just as|to be|most notably|reminiscent of|since|because} Miralax for you to have a go with cheap baltimore ravens jerseys wholesale online store classes.. E, nhl third jersey nonetheless|quite|on the other hand}, customize your own nhl jersey was most tailgating passed away walt disney, barcelona jersey nike competitor freakouts 2013 nba jerseys clearance sale outlet, many styles for you order participating your {cameras|digital cameras|video cameras|camcorders|cams|surveillance cameras|cameras, childrens nfl jerseys camcorders|dslr cameras|eos cameras|dslrs|digital slr cameras|webcams|spy cameras|hidden cameras|security cameras|gear} if they were unable theatrically booing additional. just not in computer forums nfl jerseys from china reviews {like|such as|just like|similar to|including|for instance|for example|enjoy|prefer|want|love|much like|comparable to|really like|along the lines of|the same as|not unlike|similar to that of|wish|appreciate|desire|as|exactly like|akin to|for instance like|as if|for example like|choose|which include|similarly to|that include|need|similar|as with|really enjoy|which includes|like for example|resembling|as though|adore|these|for example, nfl jerseys richmond va that|such|this kind of|just as|to be|most notably|reminiscent of|since|because} at this moment, best nba retro jerseys the place your new real {identity|identification|id|personality|individuality|name|i. […]
SecurityHive Is Here To Help You
Whether you’re a systems integrator looking for the right solution for the right situation or an individual needing to implement a best practice security solution for your organization, SecurityHive is […]
S2 Hybrid Network Video Recorder Supports IP And Analog Sources
View contact information for this company S2 NetVR 500 Upgrades VMS Solutions While Leveraging Existing Legacy Investments FRAMINGHAM, Mass. — S2 Security Corporation (S2), the leader in IP-based integrated physical security systems, today introduced S2 NetVR(®) 500, a hybrid IP and analog video server network appliance. S2 NetVR 500 is the newest addition to the S2 NetVR series of video management systems (VMS) and follows the release over the summer of the NetVR 100, S2’s all-IP model. “Each new addition to our VR series expands the range of applications available to our enterprise customers,” said John L. Moss, CEO, S2 Security. “With the NetVR 500, users of legacy systems can tap into our advanced, integrated SMS and VMS, as well as our Forensic Desktop search tools.” As a hybrid analog/IP appliance, the NetVR 500 allows users to leverage their existing analog investment, including cameras, associated cables and hardware. The NetVR 500 supports 16 or 32 analog video cameras, plus up to 64 IP cameras. S2’s NetVR products provide advanced video forensics and tight integration of access control and monitoring with video for users of the S2 NetBox, S2 Enterprise and S2 Global products. Real-time video surveillance is integrated into the Monitoring Desktop and Widget Desktop through a common web browser. The home page can display a single camera or multi-camera views. For larger installations, multiple NetVRs can be linked to a single S2 network controller. About S2 Security ?S2 Security Corporation is the leader in IP-based integrated physical security […]
Source news.thomasnet.com
DVTEL Latitude VMS Now Integrated With AMAG Technology’s Symmetry
RIDGEFIELD PARK, N.J.–(BUSINESS WIRE)– DVTEL, INC., the video surveillance solutions provider, announces integration of its powerful Latitude enterprise-class network video management system (NVMS) with the Symmetry security management platform by AMAG Technology, an access control, IP video and intrusion detection system provider. The integration expands the capabilities of both platforms, allowing joint customers to benefit from the integration of IP video surveillance and access control to gain new levels of situational awareness. AMAG’s Symmetry access control system permits users to view live and recorded video from Latitude-managed cameras within Symmetry’s client software, based on events or manual requests. “We are pleased to offer integration with DVTEL’s feature-rich Latitude surveillance software as it provides an additional opportunity for our customers to maximize the value and ease-of-use of the Symmetry access control system,” said Shae Taylor, Extended Business Solutions Program Manager, AMAG Technology. “Both DVTEL and AMAG bring valuable capabilities to the table for security integrators and end users, and we are happy DVTEL participated in AMAG’s Extended Business Solutions program to provide our customers the benefits of both.” Latitude PTZ controls now operational within the Symmetry client software include pan, tilt, zoom, focus, iris and go-to-preset operations. Users can play video of access control events captured by Latitude in the Symmetry application and can configure Latitude cameras within Symmetry. Other capabilities include launching video via camera icons on a graphical map, and controlling video playback using Symmetry’s timeline control. “Access control users increasingly demand seamless integration with video management systems, […]
Source www.benzinga.com
IMRON Corporation Integrates Bosch Security Systems GV4 Series Control Panels
Photo: PRWeb IMRON Corporation proudly announced that IS2000, its powerful access control platform designed to manage different security devices and systems into a single intuitive user interface, now integrates with the Bosch GV4 Series Control Panels. Proving yet again that IMRON Corporation continues to provide comprehensive security solutions. Irvine, California (PRWEB) October 31, 2013 IMRON Corporation , a leading provider of security management solutions, announced the integration with the Bosch GV4 Series Control Panels. IMRON Corporation’s flagship product, IS2000 , integrates with this new platform using its open architecture interface. The G Series Control Panels by Bosch combine intrusion, fire and access control in one system. The hardware flexibility allows users to grow with additional intrusion and fire requirements. The IS2000 integration with the G Series Panels allows users to retain GV3 panels and expand with the newer GV4 control panels. Thus reducing hardware replacement costs of legacy installations. The IS2000 support of the GV4 panels rounds off a complete solution for intrusion/fire that integrates cohesively with access control. IS2000 is a world-class access control platform that offers users many options through integration with the industry’s most trusted brands. Employ comprehensive solutions for access control with features that support sites from office buildings, banks, retail, community facilities to airports, multi-tenant facilities, and hospitals. Use wired or wireless solutions for cost-effective site installation and management. Powerful control with an intuitive interface, IS2000 provides the most extensive integrated platform in the industry. About IMRON Corporation Founded in 1997, IMRON Corporation is […]
Source www.sfgate.com
HID Global Sees Gradual Shift From Smart Cards to NFC
With NFC on access control, it will be able to drive to a level of critical acceptance Interviews | by Sharath Kumar BANGALORE, INDIA: We are about to embark on a new generation of access control technology in which mechanical keys – and even plastic smart cards – are either replaced – or at least, augmented — by digital keys and portable digital identity credentials that can be securely provisioned onto NFC-enabled smartphones and other mobile devices. In an interaction with CIOL, Ranjit Nambiar, director of sales, India and SAARC, HID Global shared insights on applications of NFC technology day-to-day businesses that are set to take off in India. Excerpts: CIOL: Can you share with us your journey from RFID cards to NFC Ranjit Nambiar: HID Global comes with an identity security background, which means, we are into the business of basically securing identities. Identities could be in any form. It could be in biometrics, access control, IT authentication, card control. If you look at the core of our technology, most of the solutions of what we have, Radio-frequency identification (RFID) is one of them. We extensively use RFID with respect to secure identity solution. We have other businesses also, which are non RFID centric. It’s a secure identity business with RFID as a core technology is what we use. We have come out with a new series of physical access control readers which are NFC enabled. The platform is called the ICLASS SE. ICLASS is a brand of […]
Source www.ciol.com
