Access Control & Identity Management



IP access control
May 2009
Suprema’s BioStar access control software and biometric security technology combines IP connectivity and biometric security. A biometric device installed at each door works not only as a reader but also ...

Read more...
Lattice proximity access control
May 2009, Centurion Systems
Are you trying to track, control or monitor the movement of staff and/or visitors in and out of your premises? The Lattice range of networkable proximity readers is an affordable access control system ...

Read more...
M2SYS selected by BSSL Technologies for biometric fingerprint software solution
May 2009
M2SYS Technology, a biometrics research and development firm, announced that BSSL Technologies, a Nigerian IT firm, has chosen M2SYS to provide them and their customers with the Bio-Plugin fingerprint ...

Read more...
Integration is a thorny fact
Access & Identity Management Handbook 2009
Integrating identity management and access control is a fact in the business world today, however, its implementation is fraught with difficulties including who is responsible for the project and how ...

Read more...
Checklist for converged access control solutions
Access & Identity Management Handbook 2009
Jeremy Kimber, Honeywell’s EMEA marketing leader, lays out the key points to consider when choosing a converged access control solution. In the past few years, perhaps no security industry buzzword has ...

Read more...
Human capital management
Access & Identity Management Handbook 2009
Integrating systems is crucial for efficient and cost-effective management, but do not forget your people are the most important aspect of your business. In a recent briefing we were informed that the ...

Read more...
A revolution in access control
Access & Identity Management Handbook 2009, Elvey Security Technologies
Access control has come a long way and been through many changes. Jack Edery, CEO of Elvey Security Technologies, believes it is about to undergo even more dramatic changes, all for the benefit of users. ...

Read more...
Convenient security
Access & Identity Management Handbook 2009
Biometric technologies are being adopted in more situations than ever. Which product and underlying technology one chooses can make a difference in the speed of the system’s performance and its associated ...

Read more...
Networking the scholar patrol
Access & Identity Management Handbook 2009
The issue of security remains an area of concern for most companies and institutions – irrespective of size or core focus. Factors like access control as well as time and attendance have developed into ...

Read more...
Geeks working with guards
Access & Identity Management Handbook 2009
An integrated approach to managing physical access to premises and logical access to IT systems is desirable, but made difficult by the processes being owned by different parts of the organisation. There ...

Read more...
Protecting the wires
Access & Identity Management Handbook 2009
Access control systems are only as good as the lightning and surge protection systems protecting them. Lightning is one of the most spectacular meteorological phenomena and the most common severe weather ...

Read more...
uShaka Marine World keeps a fin on access control
Access & Identity Management Handbook 2009
uShaka Marine World opts for an efficient and flexible security system, consisting of access control and video surveillance from GE Security. Located at the entrance to the busiest port in Africa, the ...

Read more...
Supply Chain Services structures staff control
Access & Identity Management Handbook 2009
Supply Chain Services uses biometrics to control access and attendance. When a company needs to control the working hours and movements of over 1500 permanent and casual staff on a daily basis, dependable ...

Read more...
Spar buys into biometric access control
Access & Identity Management Handbook 2009
Protecting its distribution operations and boosting HR operations through the use of biometric access control solutions proved a bargain for Spar. With the 1960s emergence of grocery chains in South ...

Read more...
Nampak updates time and attendance
Access & Identity Management Handbook 2009
The Nampak Group has selected a Kronos automated time and attendance solution implemented by Bytes Systems Integration (SI) as its group standard. To date, Nampak Tissue, Divfood Paarl, Rigids Cluster ...

Read more...
Integrated electronic security at Barloworld
Access & Identity Management Handbook 2009
Securing its campus meant protecting its future for Barloworld. Barloworld Corporate Office in Katherine Street, Sandton, comprises various buildings in an extended office park that houses different ...

Read more...
Getting to the meat of access control
Access & Identity Management Handbook 2009
Enterprise Foods turned to biometrics to improve its access control and employee management. Enterprise Foods, manufacturer and distributor of meat products, has factories in various parts of South Africa. ...

Read more...
Opening on time
Access & Identity Management Handbook 2009, Impro Technologies
Impro’s access control solutions ensure Carrefour is able to effectively manage its operations in Dubai. The Carrefour Group is one of the world’s largest distribution groups in the fast moving consumer ...

Read more...
Steeling time no longer
Access & Identity Management Handbook 2009
Biometrics softens steel employees. JBM Steel, suppliers of raw steel, stainless steel and aluminium for construction, industrial and domestic purposes was founded in 1987 and is now located in Pietersburg. It ...

Read more...
Engineering security
Access & Identity Management Handbook 2009, Impro Technologies
Sandwell Engineering integrated its security solutions with Impro IXP400i technology. Sandwell Engineers is an international engineering contractor in bulk materials handling for ports and marine, rail, ...

Read more...



<< First   < Previous   Page 119 of 179   Next >   Last >>