For more than 50 years, Radio Frequency Identification (RFID) technology has been available for use in business and security applications. We’re all familiar with RFID tag systems in retail stores as a theft prevention device. However, its use has expanded to include widely diverse applications including embedding tags in a casino’s high value poker chips and tagging test equipment and tools used at a jet engine maintenance facility. RFID tags are also a reliable solution for asset control of high value items such as laptop computers or tablets that may contain proprietary information. Similar solutions can be used to help ensure the security of evidence obtained by law enforcement officers.
Monthly Archives: February 2017
Key Management Systems’ Open Platform Eases Operational Issues in Mergers and Acquisitions
Mergers and acquisitions, or M&A as it’s commonly known, is a growing trend in the security marketplace as reported by several industry reports. The convergence of technology is one of the driving reasons for this, according to various M&A trends reports (e.g. Deloitte), and the momentum includes both smaller strategic deals as well as major transformational deals.