SMART Security Solutions
SMARTpod talks about HomeSec Expo 2026
February 2026, Technews Publishing, News & Events, Residential Estate (Industry), Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.
Read more...
The challenges of cybersecurity in access control
SMART Access & Identity 2026, Technews Publishing, Access Control & Identity Management, Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”
Read more...
Access as a Service is inevitable
SMART Access & Identity 2026, Technews Publishing, ATG Digital, Access Control & Identity Management, Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.
Read more...
Securing your access hardware and software
SMART Access & Identity 2026, Technews Publishing, RBH Access Technologies, Access Control & Identity Management, Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.
Read more...
Access trends for 2026
SMART Access & Identity 2026, Technews Publishing, RR Electronic Security Solutions, Enkulu Technologies, IDEMIA , neaMetrics, Editor's Choice, Access Control & Identity Management, Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.
Read more...
Beyond the fence
SMART Access & Identity 2026, Technews Publishing, Fang Fences & Guards, Perimeter Security, Alarms & Intruder Detection, Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.
Read more...
Zero Trust access control
SMART Access & Identity 2026, Technews Publishing, CASA Software, NEC XON, Editor's Choice, Access Control & Identity Management, Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.
Read more...
Holding all the cards
SMART Access & Identity 2026, neaMetrics, Suprema, Technews Publishing, Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.
Read more...
Here’s to a SMART 2026
Issue 6 2025, News & Events
This is the final news brief from SMART Security Solutions for 2025, and the teams would like to take this opportunity to thank our readers, advertisers and partners and wish everyone a safe and secure festive season.
Read more...
Onsite AI avoids cloud challenges
Issue 6 2025, Technews Publishing, Editor's Choice, Infrastructure, AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.
Read more...
Cybersecurity operations done right
Issue 6 2025, LanDynamix, Technews Publishing, Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?
Read more...