classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


More than a talking device
October 2013, Access Control & Identity Management

Mobile technology is rapidly reshaping the way people live their everyday lives, from the dynamics of dating to online banking, there has been a move to total integration of smartphones into our daily lives. The cellphone was once the size of a shoe with limited capabilities. Now a typical smartphone has more computing power than Apollo II had when it landed a man on the moon.

People are now connected to everyone and everything all the time. Information is literally available at your fingertips and the cellphone has become an indispensable tool, owned by millions and it may soon even replace your wallet. Microsoft has also entered this arena by purchasing Nokia, but what is it that makes this technology so appealing to global corporate giants and the average Joe? It is that it effectively allows you to be someplace other than where you are, and to share and gain information.

As the physical and digital worlds fuse, this is a very resourceful technology from an access control perspective. A Web-based access control system can prove invaluable for remote site management, adjusting personnel access and running customised reports, from any network or mobile device. It is not only the standard information that is useful, but real-time transactions and live data about the state of your site’s security that can be critical.

Roadblocks to effective security can be a lack of response, but alerts sent directly to one or more mobile devices ensures the information is in the right hands, at the right time. So you are instantly alerted if the security situation of your site has changed. It is security intelligence, combined with mobile solutions that makes mobile access to your Web-based security system such an effective tool.

Mobile technology has created a vast spectrum of opportunities, and at a time when consolidation is prevalent in the security industry, Impro Technologies has launched its Access Portal. It is a Web-based access control system, so you can access the system remotely anytime via any mobile device or network. The Access Portal range is compiled of Access Portal Lite, Access Portal Pro and Access Portal Enterprise.

For more information contact Impro Technologies, +27 (0)31 700 1087, www.impro.net


Credit(s)
Supplied By: Impro Technologies
Tel: +27 31 717 0700
Fax: +27 31 700 1511
Email: impro@impro.net
www: www.impro.net
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Awareness and trust in context
    November 2017, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Markus Krauss, senior director, Digital Identity and Security, CA Technologies, spoke to Hi-Tech Security Solutions about making identity work for people and things.
  • People on the move
    November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
  • Access and identity: looking ahead
    November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
  • A question of trust and ­accountability
    November 2017, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Access and identity management is about trust, how you assign it, how much you allow and how you manage it.
  • Trusting your privilege
    November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
  • Involve users in design
    November 2017, Elvey, Access Control & Identity Management
    One of the biggest obstacles to the successful operation of an access control system is the end user not being involved in the design of the solution.
  • Integrating surveillance and access
    November 2017, Cathexis Technologies, Gallagher, Milestone Systems, Paxton Access, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.
  • The access edge
    November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
  • Home run for integrated security
    November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
    Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
  • Facing the future
    November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
  • The growth of biometrics
    November 2017, ZKTeco, Access Control & Identity Management
    Biometric verification is the future, we live in a time where a person can be uniquely identified by evaluating one or more distinguishing biological traits.
  • Access on the edge
    November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
    CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.