biometric access control

Boon Edam Showcases Next-Gen Biometric Security Entrances

Boon Edam highlights its latest biometric-enabled security entrances at ISC West 2026, featuring advanced integrations such as facial recognition, iris scanning, and fingerprint authentication. These solutions are designed to enhance security, streamline access, and support modern zero-trust environments across various industries.

Smart Access Goes Invisible With Xthings Smart Locks

Xthings is redefining smart home entry by shifting from traditional “smart locks” to a seamless Smart Access experience where presence, identity, and interoperability work together naturally at the front door. At CES 2026, the company unveiled its “Connect Future” vision, highlighting how smart access should feel intuitive, automatic, and secure—without friction or complexity.

Morpho Launches Secure, Multifunction Biometric Tablet

(NEW YORK) — Joaquin Guzman, better known by the nickname "El Chapo," didn’t get to be one of the world’s most notorious and elusive drug lords without knowing a thing or two about how to cover his tracks. According to senior law enforcement officials, Guzman used some of the latest counter-surveillance gadgets to keep out of sight. Though El Chapo might have been able to be harder to find if he went completely off the grid, Todd Morris, the founder of Brickhouse Security, said that wasn’t a likely option. "You could go to the most extreme case and live a cave with messengers coming and going, but then what’s the point [of being a drug lord]?" he told ABC News. "Typically, the goal [of a drug dealer] is to maximize invisibility without minimizing the joy of the billions of dollars you have." Top-notch security means more than just a thorough pat-down for every visitor and a handful of security cameras looking over the premises. Here’s a couple of the gadgets that Guzman may have used to keep out of sight from the law: Spectrum Analyzer Chances are that Guzman wasn’t trusting a Wi-Fi password to keep his cyber activity hidden. "There’s no way you could make that secure, so more likely, all of his computers were Ethernet connected," Morris said, referring to the hard-wired connection to the Internet. But in the case that someone planted a bug to turn the computer into a surveillance device, Guzman could buy a […]