The expanding world of access control

November 2016 News

Welcome to the Access & Identity Management Handbook 2017. We have packed an enormous amount of information into these pages, all focusing on the access and identity market. Unfortunately, even with 120 pages, we have to limit what can be printed due to space restrictions. Such is the size and expanding nature of this market.

As has become the norm over the years, biometrics plays a significant role in the handbook as more companies look at additional ways of identifying and authenticating people in the most reliable and quickest manner possible. That’s not to say cards and fobs are a thing of the past, this market is still growing and will continue to grow for a long time, as will the uptake and popularity of electronic locks which use biometrics and traditional access mechanisms.

In fact, we’re looking at a market in which everything is integrated into a working solution, using whatever products and devices are best suited to the job at hand. This is why mobility is also a factor in access and authentication. Since the small smartphones we have come to accept as being part of our normal day have such powerful processing capabilities, people want to make use of them in various situations, including access control. Moreover, smartphones will soon become another management console linked to a central server in order to control access permissions and so on.

An interesting trend in the world of authentication at the moment is for people to report that biometrics are no longer a good option for security because your fingerprints, voice or face can be stolen and you can’t change them like you can a password or PIN. We asked some biometrics players to deal with this issue in one of the articles, but it’s fair to say that the leading brands are ahead of the game in terms of liveness detection and other means of proving a biometric belongs to a real live person – the one they are supposed to belong to. This is also where multi-factor authentication comes into play.

It’s also fair to say that criminal syndicates have almost unlimited research funding and will always be finding ways to outsmart whatever security system one has in place. And in an environment where people often compromise on security in favour of cost, you have to expect that the cheap products will be easier targets for criminals.

However, criminals aside, we hope you enjoy the content we have put together for the handbook. By the time you receive the magazine it will also all be online. We will also be sending out a few email newsletters with a few articles in the new year. And although the handbook is a once-per-year affair, we welcome your feedback which always assists in improving the next year’s Access & Identity Management Handbook. Please feel free to send your comments to andrew@technews.co.za.

Andrew Seldon, Editor


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

TAPA: The role of an effective treasury function in business risk management
June 2019, Technews Publishing , News
Neil Le Roux, the Founder of Diligent Advisors will speak at the TAPA SA (Transported Asset Protection Association) annual conference on 26 July 2019.

Read more...
iLegal 2019: Enhancing and empowering your control rooms
July 2019, Technews Publishing , News, Conferences & Events
iLegal 2019 will be held on 12 September 2019 at The Rosebank Crowne Plaza in Johannesburg. iLegal is the surveillance industry’s premier one-day conference hosted jointly by Hi-Tech Security Solutions and Dr Craig Donald.

Read more...
Residential Estate Security Conference 2019: Managing for efficiency
July 2019, Technews Publishing , News, Conferences & Events
The Residential Estate Security Conference 2019 will be held on 20 August 2019, once again at the Indaba Hotel in Fourways, Johannesburg.

Read more...
Spending to save
August 2019, Technews Publishing , News
As residential estates and complexes grow like weeds across South Africa, often promoting themselves as more secure than a stand-alone house, many are finding that close proximity to a neighbour or a ...

Read more...
Risk assessment or product placement?
August 2019, Technews Publishing, Alwinco, SMC - Security Management Consultants , Editor's Choice, Security Services & Risk Management, Residential Estate (Industry)
Hi-tech security solutions asked a couple of experts to provide estate managers and security managers with some insights into what a ‘real’ risk assessment includes.

Read more...
Renewable energy for estates and homes
August 2019, Drensky Technologies, Technews Publishing, Specialised Battery Systems , Security Services & Risk Management
While individual homeowners might choose to install solar photovoltaic (PV) systems for when there’s load shedding or a power failure, for an entire estate to harness its energy requirements from solar, and particularly their crucial security systems, would require that a large area of the property be dedicated to solar panels.

Read more...
From the editor's desk: The difference between potential and skills
August 2019, Technews Publishing , News
This issue of Hi-Tech Security Solutions includes our annual Local Manufacturing feature and it’s great to know that local security manufacturers are still going strong, even if the general manufacturing ...

Read more...
A customised solution for backup power
August 2019, Specialised Battery Systems , News, Integrated Solutions
Specialised Battery Systems designed and implemented a bespoke solution for Stallion Security Electronics to deploy at almost any site.

Read more...
Addressing risks in the healthcare sector
August 2019, Secnovate, Technews Publishing, ZKTeco , Healthcare (Industry), Security Services & Risk Management
The healthcare sector poses unique challenges and risks. Hospitals, for example, need to have a more-or-less ‘open door’ policy when it comes to people entering the premises and the main reception area.

Read more...
Patient critical – healthcare’s cybersecurity pulse
August 2019, Wolfpack Information Risk , News, Cyber Security, Healthcare (Industry)
The healthcare industry has become one of the leading cybersecurity attack vectors worldwide for several reasons.

Read more...