The many faces of access and identity

Access & Identity Management Handbook 2011 Access Control & Identity Management

Compare the first Access Control Handbook and this version of the Access & Identity Management Handbook and you cannot help but notice how far the industry has evolved over the years. Not only has technology changed and advanced rapidly, but the identity aspect has and is causing consternation in many industries and in companies of all sizes.

As you will read in our identity management round-table 'A can of identity worms', identity means different things to different people at different times. It is really a mishmash of ideas and best practices at the moment.

We have tried to extract a few opinions and trends from industry leaders, as well as a white paper or two to provide our readers with a good overview of identity management. Our goal is to empower our readers to make the better decisions in the real world.

Of course, it is not all about identity management as the principles of access control are still a critical function in all businesses and homes today. Whether it is card- or biometric-based access, technology is there to support and secure, and, whether we believe it or not, make it easier, quicker and more accurate to manage the flow of people and information.

The practical side of things is covered in the second part of the Access & Identity Management Handbook 2011 with a variety of case studies. These articles reflect what has been accomplished in various industries by a selection of vendors and service providers. From ensuring poor kids get a meal, through to keeping mines and even countries secure, we have got it all.

Whether you approach access and identity management from a strategic top down or more practical bottom up approach, we hope the Access & Identity Management Handbook 2011 will point you in the right direction and, at the very least, help you to ask the right questions for your specific situation. I hope you enjoy and find value in this year’s handbook, and, as always, your comments, criticisms and opinions on what we need to cover in the next handbook are welcome.

Andrew Seldon, editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Entries to southern Africa OSPA Awards now open
Technews Publishing Securex South Africa Editor's Choice News & Events
The southern Africa OSPAs are part of a global awards scheme that recognises and rewards teams, individuals and organisations for their commitment and outstanding performance within the security sector.

Read more...
Securex has moved to June
Technews Publishing Editor's Choice News & Events
Following the formal announcement of the date for South Africa’s national election, 29 May 2024 , which happened to be in the middle of the planned dates for Securex South Africa, Securex will now take place from 11 – 13 June 2024 at Gallagher Estate in Midrand.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...