Continuum launches centralised access and identity management

Issue 6 2025 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Facilities & Building Management

Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems offered by established players.


Nicolas Garcia.

Founded by seasoned professionals in both the hardware and software aspects of the industry, Continuum Identity offers a secure, cloud-based solution. Their newly developed application provides integrated, secure, and reliable identity management for diverse access control readers, including its own readers. As a cloud solution, users will always have access to the latest version of the application and any new modules as they are released.

Continuum Identity is EU-based, meaning it complies with the requirements of GDPR and, by extension, PoPIA. Of local interest, one of its founders and the CEO, Nicolas Garcia, spent many decades in South Africa in various positions within the AIM market, where he is well known and respected.

Continuum Identity defines its mission as empowering “active digital citizenship by providing innovative and seamless identity solutions”. Moreover, it focuses on the privacy of the individual, enabling accurate identity management without compromising privacy. The platform's launch functionality includes access control management and eKYC (electronic Know-Your-Customer) services that operate in most countries.

The services are secured so that identity information is available only to authorised people, and companies can create their own ‘identity templates’ to enrol individuals in accordance with their corporate standards or governmental regulations.

Services available

The services available on the platform range from verifying people through a third-party vetting company to enrolling and managing their access to physical and digital assets using biometrics. Customer or employee onboarding can include verification of the identity of an individual, or company, and company representatives; verification of financial credibility and income; verification in external databases (AML, credibility data); checking the credibility of browser and device data (KYU); and electronic signature verification with EIDAS (an EU legal framework for electronic identification (eID) and trust services, like digital signatures and time stamps, for cross-border electronic transactions within the European Union. It promotes interoperability between national eID schemes, ensuring that an eID from one EU member state is recognised in another, and makes trust services provided by compliant providers legally valid across the EU, creating a secure and efficient digital single market).

With offices currently in France and Switzerland, the company works via partners, including technology and reseller partners, as well as end users. Partners can provide a managed access control service to clients, or companies can manage it themselves.

CID readers and packages

In addition, Continuum Identity has also released a range of facial biometric readers that automatically integrate into its platform. Currently, there are three CID facial recognition readers, offering different capabilities depending on customer requirements (the CID Face Ultra, for example, can save up to 50 000 facial biometric records). As an open platform, other brands are also integrated into the system, including IDEMIA and Suprema, with more to follow. Technology partners play a crucial role in this ecosystem, as they will be able to develop modules to integrate their own hardware into the platform and even offer identity-based services via their own ‘apps’ integrated into the platform.

As a cloud-based system, there are four options customers can sign up for. The first is the free Starter Package, which provides basic access and people management for up to five access control readers and 100 individuals. The Essentials Package supports up to 15 readers, token-based eKYC services, and can handle up to 3000 people.

The Professional Package offers advanced services for up to 50 000 people and 50 readers. The Enterprise package supports unlimited readers, and most features and functions can be customised to the customer's requirements.

The Continuum Identity team will launch in South Africa in November and will host a breakfast on 06 November. Interested parties can register at continuum-identity.com/breakfast-club.html.

For more information contact Continuum Identity, contact@continuum-identity.com, www.continuum-identity.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.