Access Control & Identity Management



Biometric myth busting
Access & Identity Management Handbook 2013, Fourier IT Innovation, Mining (Industry)
Biometrics may now be commonplace in the South African workplace, but do you really know enough about them? There is still a big gap between perception and reality.

Read more...
Identity and access governance, a future in the cloud
Access & Identity Management Handbook 2013
Identity and access governance (IAG) solutions may seem like a burden brought on by increasing regulation and compliance issues, but when used effectively, IAG solutions become the catalyst to meet the challenges of a complex and changing world.

Read more...
Face it
Access & Identity Management Handbook 2013, neaMetrics
Variations in background illumination have been one of the main challenges for practical face recognition systems. Variations of the same face due to illumination are generally greater than the variations of different face identities.

Read more...
The changing face of access control
Access & Identity Management Handbook 2013, Tyco Security Products - Johnson Controls
Many experts predict that in a few short years, the effects of the software-as-a-service (SaaS) model on the security industry will be just as transformative as it was on IT, as it rapidly gains acceptance among end users, dealers and integrators and manufacturers.

Read more...
Balancing security and convenience to beat fraud
Access & Identity Management Handbook 2013
Financial institutions walk a fine line between convenience, security, and cost when it comes to preventing fraud. Ugan Naidoo, head of security solutions, CA Southern Africa, explores how Web-based fraud detection and risk-based authentication solutions stop real-time fraud in its tracks—without unnecessary friction for genuine users.

Read more...
Foolproof fingerprint detection
Access & Identity Management Handbook 2013
Programmes like Myth Busters, Nikita and CSI screen information on how to produce and use a fake fingerprint. Stories of students with time on their hands using these methodologies to access supposedly secure locations abound.

Read more...
iCLASS SE implementation and migration
Access & Identity Management Handbook 2013
HID Global iCLASS Secure Identity Object (SIO)-enabled (iCLASS SE) platform delivers trust-based security, improved usability and enhanced performance.

Read more...
Biometrics Buyers' Guide 2013
Access & Identity Management Handbook 2013, Technews Publishing
Regular readers will have seen the Hi-Tech Security Solutions Biometric Buyers’ Guide in various issues over the past few years. This year, we decided to include it in the Access and Identity Management ...

Read more...
Access Control Selection Guide 2013
Access & Identity Management Handbook 2013, Technews Publishing
Once again, space is limited so the suppliers cannot go into detail, but readers will see what potential these devices have to be integrated into existing infrastructures as well as the integration services ...

Read more...
Identity in Africa, the mobile upwards
Access & Identity Management Handbook 2013
In Africa, many more people are likely to reap the benefits of mobile telephony, in many more ways, than any other continent before. It may sound like a contradiction, but these are the facts. Today, a little over 500 million people on the continent, possibly constituting 60% of its population, have a personal mobile connection, in many cases their only institutionalised identification.

Read more...
Points to consider in selecting biometrics
Access & Identity Management Handbook 2013
The landscape in access control is constantly changing with respect to the technologies, products, costs and end-user requirements. As South Africa becomes a more dangerous place, heightened security starts to make more sense.

Read more...
Access control does not equal time and attendance
Access & Identity Management Handbook 2013, Regal Distributors SA
There is a strong misconception, both by installers and end users, that any access control system that can connect to a PC is automatically a time and attendance (T&A) system. Just download the logs and you have a T&A report.

Read more...
Local digital identity innovation
Access & Identity Management Handbook 2013
The recent Identity Indaba saw, among other presentations, the introduction of a new South African innovation in digital identity management. It is called GreenBox and it takes identity management to a new level.

Read more...
State of the access control market
Access & Identity Management Handbook 2013, Tyco Security Products - Johnson Controls
The access control market has evolved consistently over the last five to eight years, with new solutions being introduced that have taken technology originally designed for the commercial market and making it viable for the small business market.

Read more...
A guide to access control and sustainabililty
Access & Identity Management Handbook 2013
With sustainability and financial concerns high on the agenda of many businesses, it is important to understand the many ways in which an effective access control system can also help cut energy bills by both reducing energy wastage and improving an organisation’s environmental footprint.

Read more...
High security access at nuclear site
Access & Identity Management Handbook 2013, Gallagher, Government and Parastatal (Industry)
Security is layered throughout the organisation and is structured around various security grades of facilities. The Gallagher security integration platform (formerly Cardax FT) is the backbone of electronic access control and intruder alarms at ANSTO.

Read more...
Access to mixed-use development
Access & Identity Management Handbook 2013, Residential Estate (Industry)
Upmarket mixed use development at Melrose Arch benefits from high-tech access control system.

Read more...
A taste of integrated access control
Access & Identity Management Handbook 2013, Retail (Industry)
Integrated access control, time and attendance and HR system for food packaging company took advantage of non-contact smartcards to allow easy access for authorised personnel. The system was also interfaced with the company’s existing intruder alarm and CCTV systems.

Read more...
Compliance via biometrics
Access & Identity Management Handbook 2013, Industrial (Industry)
Trac-Tech biometric access solutions ensures Environ remains compliant with medicines control council.

Read more...
Xpanding access control
Access & Identity Management Handbook 2013, Impro Technologies, Industrial (Industry)
Impro solves T&A and access control issues for security barrier manufacturer using the IXP400 access control system, Time Manager software and Morpho MA100 biometrics readers.

Read more...



<< First   < Previous   Page 95 of 174   Next >   Last >>