Biometric myth busting Access & Identity Management Handbook 2013, Fourier IT Innovation, Mining (Industry) Biometrics may now be commonplace in the South African workplace, but do you really know enough about them? There is still a big gap between perception and reality.
Identity and access governance, a future in the cloud Access & Identity Management Handbook 2013 Identity and access governance (IAG) solutions may seem like a burden brought on by increasing regulation and compliance issues, but when used effectively, IAG solutions become the catalyst to meet the challenges of a complex and changing world.
Face it Access & Identity Management Handbook 2013, neaMetrics Variations in background illumination have been one of the main challenges for practical face recognition systems. Variations of the same face due to illumination are generally greater than the variations of different face identities.
The changing face of access control Access & Identity Management Handbook 2013, Tyco Security Products - Johnson Controls Many experts predict that in a few short years, the effects of the software-as-a-service (SaaS) model on the security industry will be just as transformative as it was on IT, as it rapidly gains acceptance among end users, dealers and integrators and manufacturers.
Balancing security and convenience to beat fraud Access & Identity Management Handbook 2013 Financial institutions walk a fine line between convenience, security, and cost when it comes to preventing fraud. Ugan Naidoo, head of security solutions, CA Southern Africa, explores how Web-based fraud detection and risk-based authentication solutions stop real-time fraud in its tracks—without unnecessary friction for genuine users.
Foolproof fingerprint detection Access & Identity Management Handbook 2013 Programmes like Myth Busters, Nikita and CSI screen information on how to produce and use a fake fingerprint. Stories of students with time on their hands using these methodologies to access supposedly secure locations abound.
Biometrics Buyers' Guide 2013 Access & Identity Management Handbook 2013, Technews Publishing Regular readers will have seen the Hi-Tech Security Solutions Biometric Buyers’ Guide in various issues over the past few years. This year, we decided to include it in the Access and Identity Management ...
Access Control Selection Guide 2013 Access & Identity Management Handbook 2013, Technews Publishing Once again, space is limited so the suppliers cannot go into detail, but readers will see what potential these devices have to be integrated into existing infrastructures as well as the integration services ...
Identity in Africa, the mobile upwards Access & Identity Management Handbook 2013 In Africa, many more people are likely to reap the benefits of mobile telephony, in many more ways, than any other continent before. It may sound like a contradiction, but these are the facts. Today, a little over 500 million people on the continent, possibly constituting 60% of its population, have a personal mobile connection, in many cases their only institutionalised identification.
Points to consider in selecting biometrics Access & Identity Management Handbook 2013 The landscape in access control is constantly changing with respect to the technologies, products, costs and end-user requirements. As South Africa becomes a more dangerous place, heightened security starts to make more sense.
Access control does not equal time and attendance Access & Identity Management Handbook 2013, Regal Distributors SA There is a strong misconception, both by installers and end users, that any access control system that can connect to a PC is automatically a time and attendance (T&A) system. Just download the logs and you have a T&A report.
Local digital identity innovation Access & Identity Management Handbook 2013 The recent Identity Indaba saw, among other presentations, the introduction of a new South African innovation in digital identity management. It is called GreenBox and it takes identity management to a new level.
State of the access control market Access & Identity Management Handbook 2013, Tyco Security Products - Johnson Controls The access control market has evolved consistently over the last five to eight years, with new solutions being introduced that have taken technology originally designed for the commercial market and making it viable for the small business market.
A guide to access control and sustainabililty Access & Identity Management Handbook 2013 With sustainability and financial concerns high on the agenda of many businesses, it is important to understand the many ways in which an effective access control system can also help cut energy bills by both reducing energy wastage and improving an organisation’s environmental footprint.
High security access at nuclear site Access & Identity Management Handbook 2013, Gallagher, Government and Parastatal (Industry) Security is layered throughout the organisation and is structured around various security grades of facilities. The Gallagher security integration platform (formerly Cardax FT) is the backbone of electronic access control and intruder alarms at ANSTO.
Access to mixed-use development Access & Identity Management Handbook 2013, Residential Estate (Industry) Upmarket mixed use development at Melrose Arch benefits from high-tech access control system.
A taste of integrated access control Access & Identity Management Handbook 2013, Retail (Industry) Integrated access control, time and attendance and HR system for food packaging company took advantage of non-contact smartcards to allow easy access for authorised personnel. The system was also interfaced with the company’s existing intruder alarm and CCTV systems.
Xpanding access control Access & Identity Management Handbook 2013, Impro Technologies, Industrial (Industry) Impro solves T&A and access control issues for security barrier manufacturer using the IXP400 access control system, Time Manager software and Morpho MA100 biometrics readers.