Cloud Security – Download Document

Cloud Security – Download Document

Borealis – Cloud-Based Access Control Is the cloud really more secure?   Exploring the security benefits associated with a cloud solution. A Cloud Based Security ApproachComplete the form below to receive the free document: A Cloud based security approach system...
Keri Systems Partners with Geokey

Keri Systems Partners with Geokey

Keri Systems’ customers can utilize Geokey’s mobile access control technology, and Geokey’s customers can now access Keri Systems’ hardware solutions on their cloud platform, Borealis® creating a seamless, simple solution for cloud-based access. What this partnership...
Notice Regarding Mercury Security Firmware Vulnerability

Notice Regarding Mercury Security Firmware Vulnerability

Notice Regarding Mercury Security Firmware Vulnerability Mercury Security has been informed of a firmware security issue affecting the following hardware: LP1501, LP1502, LP2500, LP4502, and EP4502. This issue makes it possible for a hacker to have a level of access...
Familiar with Mercury controllers? NXT-MSC uses Mercury firmware

Familiar with Mercury controllers? NXT-MSC uses Mercury firmware

Familiar with Mercury hardware? If so, then you already know how to install Keri NXT-MSC (Mercury Powered) Controllers Over 90,000 Organizations Chose Keri When Security Mattered Most "Our lead tech, John McCleery, and I are very appreciative of your support with this...
The Cloud: Total Cost Of Ownership

The Cloud: Total Cost Of Ownership

Borealis – Cloud-Based Access Control Utilizing The Cloud:Total Cost of Ownership   Exploring the cost benefits associated with a cloud solution. Total Cost of Ownership DocumentComplete the form below to receive the free document: Total cost of ownership for a...