Articles

Posted: 05/20/13

As both personal and corporate data and applications move to the cloud and mobile devices, the saying “trust but verify” takes on new meaning.  It captures the practical reality of a world in which so many of our interactions occur online.  More than ever, we need mechanisms to verify the identity of the entities with whom we interact. 

Among the most important best practices is...


Posted: 12/20/11

As a Security Dealer and Integrator (SD&I) magazine Fast50 advisory board member,...

...I'd like to invite fast-growing system integrators to highlight your successes in the field through SD&I's new best practices program called...


Posted: 10/19/09

When embarking upon our “Customers Come First” campaign to breathe new life into our Physical Access (PACS) business, we recognized, particularly in North America, that we had to link our past success and stronghold in PACS (our “crown jewels”) with a platform for our future success (Genuine HID™).

So what is Genuine HID? Genuine HID represents a unique set...