Identity and Access Management

Security

The Legislative Balancing Act For Facial Recognition Technology

April 26th, 2022
Security

Exploring The SALTO Group Business and M&A Strategy

March 18th, 2022
Security

Will the Pandemic Drive More Growth for Access Control as a Service?

Memoori’s World Market 2020-2025 Report on the Physical Security business shows that all types of organizations across the world are investigating how they can leverage the cloud, as it is proving to be a very attractive proposition. We estimate that in 2019 ACaaS investment was worth $620 million and of this approximately 40% was installed […]

Security

Access Control & Identity Management Withstand the Worst of COVID-19

Memoori has charted the performance of the Access Control business during the last decade, witnessing demand for products expanded by a CAGR of 8.2%; and at the beginning of 2020 reaching sales of $8.7Bn. It has been problematic to size the market with confidence in 2020 because the COVID-19 pandemic has not yet been controlled […]

Security

“Opening” the Door to the Future of Access Control

“Open” is not a term generally used to describe improvements in security but in this age of highly connected buildings, access control stands increasingly alone with it’s siloed and proprietary technology. Open access control is not particularly new, it has been over six years since Axis introduced its open Network Door Controllers, but they and […]

Security

Major Trends in the Global Access Control Market 2019

Memoori’s 2019 Physical Security report shows that the market for Access Control products reached over $8Bn this year, a growth of 8.2%. We forecast that by 2024 the world market will be worth over $12Bn, a CAGR of 8.48%. Demand has been driven by growth in IP Networking products, Access Control as a Service (ACaaS), […]

Smart Cities

Public Key Infrastructure could Emerge as De Facto Credential for IoT Devices

You can’t just walk into a secure building and start tampering with the air conditioning or access control systems without proper authorization, such as a pre-registered ID from a trusted company. On the cyber-side of our smart buildings, however, security failings mean that hackers can virtually stroll into the building and access whichever system they […]

Subscribe to the Newsletter & get all our Articles & Research Delivered Straight to your Inbox.

    1. Please enter a valid email

    2. Please enter your name

      Please enter company name

    3. By signing up you agree to our privacy policy