Agenda: What access control is and its transformation Door fastening devices and accessories Identification Technology Standalone controllers and software-based controllers Attendance time software Intercoms and Video Door Phones: New technology via IP Special Solutions: Hotel Software X-Ray Machines Credentialing Metal Detectors Asset Protection Patrol Control Armored Equipment Access controls tell you 3 fundamental things: Who? […]
Category Archives: Cybersecurity
In this tutorial, I will explain the security issues when working with remote collaborators on projects that require any kind of credentials such as WiFi or any type of confidential information. I will also explain some recommended security layers as well as the solution of best practice recommendations. Additionally, I will show you how to […]
In this case, we share the success story of a company that faced major technological limitations due to its on-premises infrastructure. With over 30 desktop computers connecting to a physical server via the MRA (Microsoft Remote Access) protocol, bottlenecks were frequent, sessions were constantly interrupted, and the team’s productivity was compromised. Our goal was clear: […]
This question came to me out of curiosity, since I had been working for years with virtual computers from AWS, which I always connected to from my local computer (MacBook Pro) via SSH through port 22. The purpose of these virtual servers was generally to provide services for small and medium-sized businesses, such as cloud […]