Biometric and Access Selection Guides

Access & Identity Management Handbook 2014 Access Control & Identity Management

A biometric or card reading device on its own is basically a piece of expensive electronics. It’s only when these devices are combined with software and implemented within business processes that they are able to deliver value and a return on investment.

The easiest way to understand how these systems can improve business processes and deliver a measurable return is to look at the time and attendance (T&A) market in South Africa. Over the past few years, many companies have discovered how implementing efficient technology not only streamlines their access and payroll processes, but actually saves money from the first month they are in use. It’s quite common to hear of T&A implementations paying for themselves in less than a year just through the money saved.

Of course, biometrics and access control solutions are used in a variety of different areas of business, from basic access control through to logical access and financial authorisation in the fight against fraud. The common denominator in all of these solutions, however, is the device.

Choosing the correct device, whether a biometric, card, PIN or a combination of these, is crucial to the success of the solution. It doesn’t matter how well designed your software is, or how streamlined your business processes are, if you select the incorrect device, you are unlikely to have a successful solution.

With this in mind, Hi-Tech Security Solutions brings you the annual Biometric Selection Guide and Access Selection Guide. Our goal in this section of the Access and Identity Management Handbook 2014 is to offer a broad selection of the latest devices on the market, giving our readers the opportunity to see what systems are available and what their capabilities are. As you can see, there are a significant number of devices with a variety of capabilities available from reputable companies.

As always, however, space is limited so we’ve only provided a brief overview of the devices available. We have also included contact information for each product to allow you to find devices that may suit your needs and then contact the respective parties for more information.

Click here to see the Biometric Selection Guide http://www.securitysa.com/6279r

Click here to see the Access Selection Guide http://www.securitysa.com/7889a

Readers are also able to refer to the Hi-Tech Security Business Directory (www.hsbd.co.za) to search for additional information on distributors, installers and integrators of their preferred products. Should you have any suggestions as to how we can improve our selection guides, please let me know on [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.