eCommerceNews Asia - Technology news for digital commerce decision-makers

HID stories - Page 58

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

20160624 2k17 coverart 1920x1080  5be62609d2363365139d7dd04807a686

Review: WWE 2K17 is still lingering in the midcard

Mon, 17th Oct 2016
#
gaming
#
digital entertainment
#
wwe 2k17
WWE 2K17 is the newest addition of the long running wrestling series. While it adds new features, it still fails to reach the main event.
Thinkstockphotos 605956402

Ransomware: Expert advice on how to keep safe and secure

Tue, 11th Oct 2016
#
malware
#
ransomware
#
cybersecurity
Paying criminals is never a good idea, even when it seems expedient. Ransomware authors are under no obligation to give you back what you pay.
Lenovo

Hands-on Review: Lenovo's ThinkPad X1 Tablet

Mon, 3rd Oct 2016
#
gaming
#
digital entertainment
#
lenovo
With so much thought going into the engineering I can report nothing negative about his little beauty. Certainly a worthwhile investment.
Download

10 cybersecurity lessons learned from Season 2 of Mr. Robot

Mon, 26th Sep 2016
#
robots
#
cybersecurity
#
mr.robot
Cybersecurity and hacking are just plot devices the series uses to achieve its goals, but they play a major role in the series.
Thinkstockphotos 101131042

The incredible system that every IT department needs

Sat, 24th Sep 2016
#
uc
#
network infrastructure
#
sdn
Discover Netscout, the hidden gem revolutionising IT monitoring with InfiniStream, the 'big data device' essential for any tech department.
Thinkstockphotos 146925361

'Modern cities' may be smarter, but they're not much safer

Wed, 21st Sep 2016
#
smart cities
#
kaspersky
#
cyber attacks
'Modern cities' may make up thousands of different components that keep people safe and convenient, but they also come with huge vulnerabilities.
Jeffrey rodman polycoma

Polycom's Jeff Rodman on partnerships, innovation, collaboration & creativity

Wed, 21st Sep 2016
#
uc
#
hybrid & remote work
#
healthtech
Jeff Rodman, founder of Polycom, talks to TechDay about creativity, innovation, and the keys to business success.
Fallback

Selling enterprise security solutions - tips for success

Tue, 20th Sep 2016
#
firewalls
#
network infrastructure
#
network security
Ingram Micro's Andrew Khan shares proven sales strategies for demonstrating return on investment when pitching security solutions to NZ businesses.
Untitled 1

Hands-on Review: Sony MDR1000x Bluetooth Headphones

Mon, 19th Sep 2016
#
gaming
#
digital entertainment
#
headphones
​Sony have an impeccable sense of timing. Almost straight after Apples headphone socketless iPhone 7 launched, their new Bluetooth headphones arrived.
Thinkstockphotos 585302424

Trend Micro tackles ransomware threat with new software

Mon, 19th Sep 2016
#
malware
#
ransomware
#
wireless networks
Trend Micro unveils its latest defence against cyber threats, promising robust protection from ransomware and evolving malware.
1

PHOTO GALLERY: The all new iPhone and Series 2 Apple Watch

Thu, 8th Sep 2016
#
wearables
#
apple
#
apple iphone
Today Apple unveiled the iPhone 7, iPhone 7 Plus and the Apple Watch Series 2 - have a geeze at how they look.
Aufanfesthero

Xbox Fanfest event is beaming down to Sydney, Australia

Wed, 7th Sep 2016
#
gaming
#
digital entertainment
#
microsoft
The Xbox Fanfest event is coming to Sydney, Australia later this year allowing you to try all of the latest games from Microsoft.
Untitled 1

Hands-on Review: Parallels Desktop 12 for Mac

Tue, 6th Sep 2016
#
virtualisation
#
gaming
#
digital entertainment
Applications such as Parallels Desktop 12 aim to make your life a whole lot easier by running Virtual Machines (VMs) within your Mac environment.
Thinkstockphotos 587200388

Fighting a hidden enemy: Singapore cybersecurity in this hyper-connected era

Mon, 5th Sep 2016
#
hyperscale
#
dc
#
risk & compliance
Today Singapore is dubbed the data center hub of Southeast Asia with over 60% of the region's market based on its limited land mass.
Thinkstockphotos 544727370

Measuring the high costs of web malware protection

Mon, 5th Sep 2016
#
malware
#
cybersecurity
#
notebook
The costs of recovering from a ransomware or other cyberattack are well understood…but how much should an organization spend to prevent one?.
Untitled 1 mnlqged

Hands-on Review: Lenovo MiiX 700 Tablet - the best of all worlds

Mon, 5th Sep 2016
#
gaming
#
digital entertainment
#
lenovo
Recently I've been fortunate to review a range of tablets. The Lenovo MiiX 700 is the latest one and the specifications suggest it's a goody.
Thinkstockphotos 476599470

Intel Skull Canyon NUC: When size doesn't matter

Mon, 5th Sep 2016
#
intel
#
tablets
#
gpu
Under its hood the hardware includes Intel's latest quad-core i7 CPU. The usually anaemic Intel integrated graphics got a serious dose of steroids.
Thinkstockphotos 507331853 ixxkzpf

The unbalanced fight against network security threats

Wed, 31st Aug 2016
#
malware
#
cybersecurity
#
ixia
Network security is an unfair fight, according to Ixia, as hackers exploit vulnerabilities. Swift action can help prevent breaches.
Twitter android 623x432

ESET discovers new Android botnet controlled by Twitter

Mon, 29th Aug 2016
#
malware
#
cybersecurity
#
x
ESET uncovers a novel Android botnet, Android/Twitoor, controlled via Twitter instead of a traditional server, marking a first in mobile malware tactics.
2817029 trailer armikrog tommynaut 20150225

Review: Armikrog brings back the old-school point and click adventure

Mon, 29th Aug 2016
#
gaming
#
digital entertainment
#
armikrog
Point and click adventures were abundant on PCs back in the '90s, but the genre is back for one more round thanks to the release of Armikrog.