Video Surveillance Can Mitigate Risk During COVID-19 ISG Marketing May 12, 2020 Security, LENSEC, Video Surveillance, Campus Safety, Coronavirus, COVID-19, Video Management System, VMS
Get UHF Tags from Your Local ISG Expert ISG Marketing May 5, 2020 Tracking, Access Control, Identiv, RFID, ID Supplies, ID accessories, UHF, Tags, Ultra High Frequency
5 Things You Should Know about Biometric Technology ISG Marketing April 21, 2020 Identification, Security, patient identification, positive patient id, Biometrics, Cybersecurity, M2SYS, IT security, Fingerprint
Virus Management Solutions for Your Organization ISG Marketing April 14, 2020 ISG, patient identification, EPIC Track, emergency response, Wristbands & Labels, Coronavirus, COVID-19, Crisis Management, Elliott Mobile Solutions, Mobile ID, Temperature Check, Virus Management
Understanding ID Badging & Access Control – Part III ISG Marketing March 31, 2020 Smart Card, Access Control, Campus Safety, Mobile Credentials, Credential Management, Card Readers, ID Badging, Proximity Cards, 433 MHz
Understanding ID Badging & Access Control – Part II ISG Marketing March 24, 2020 Identification, Smart Card, Access Control, Campus Safety, Credential Management, Card Readers, ID Badging, Proximity Cards, 13.56 MHz, MIFARE DESFire EV1
Understanding ID Badging & Access Control – Part I ISG Marketing March 17, 2020 Identification, Smart Card, Access Control, Campus Safety, 125 KHz, Card Readers, ID Badging, Passive Radio Frequency, Proximity Cards
Top 6 Advantages of a Biometric ID System ISG Marketing February 25, 2020 ID System, Identification, ID Software, Integration, Student ID, healthcare id, patient identification, positive patient id, Biometrics, M2SYS, Employee ID
How Using PoE Products Can Improve School Safety & Security ISG Marketing February 18, 2020 Security, Integration, Campus Safety, Low Voltage, POE, Power Over Ethernet
4 Steps to Faster Security & IT Convergence ISG Marketing February 11, 2020 Security, Access Control, Identiv, Cybersecurity, Logical Access, IT security, Convergence