ASSA ABLOY Announces Integration of Aperio Wireless Technology with BadgePass Access Manager

ASSA ABLOY announced the integration of their Aperio™ wireless lock technology with Access Manager from BadgePass, an integrated credential management solution.

The Aperio integration offers BadgePass customers an easy, affordable way to connect additional openings to their existing Access Manager system. Aperio is a global wireless platform available across a broad range of locking hardware from ASSA ABLOY Group brands, offering the flexibility to address a variety of applications throughout any facility.

BadgePass is pioneering technologies that are revolutionizing the Identification industry. They are the fastest growing provider of credentialing solutions in the United States, headquartered in Jackson, Mississippi. BadgePass software products include Photo ID, Access Control, Visitor Management, Point of Sale, Tracking and more.

“We are focused on creating the most innovative solutions possible and this partnership with a global leader like ASSA ABLOY will allow both of us to open more doors in the credential management marketplace,” said Phillip King, President and CEO of BadgePass, Inc. “BadgePass’ emergence as a pace setter for integrated one card solutions has been thoroughly tested by customers nationwide and is only further established by our connection with ASSA ABLOY.”

“Our integration with BadgePass affirms our commitment to enabling easy and flexible expansion of access control systems like Access Manager,” stated Martin Huddart, President Access and Egress Hardware Group, ASSA ABLOY Americas. “The ability to secure more doors as well as a new range of opening types, such as cabinets, lockers, and server racks, gives even greater control and visibility to BadgePass customers.”

Aperio is a global wireless platform that allows you to expand your access control footprint – quickly, easily, and affordably. It uses wireless communication (IEEE 802.15.4) between the lock and an Aperio hub to provide real-time communication to the access control system, simplifying installation and reducing costs.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3