Access Control & Identity Management



Sherlotronics releases new access control receiver
June 2009
Sherlotronics has announced the local availability of a new version of its long range one and four channel 500 m receiver product line, for use in home automation and security systems. Designed, developed ...

Read more...
D-Tec launches new CCTV-based FireVu
June 2009
D-Tec - part of AD Group - used IFSEC and International Firex to launch a new, more capable, version of its award-winning FireVu VSD (video smoke detection) system to offer both CCTV-based smoke and flame ...

Read more...
A finger on fun
May 2009
Biometrics can speed the frustrating process of gaining access to theme parks. Theme parks promise fun for all, but securing them can be a challenge. There are many areas within this entertainment environment ...

Read more...
HID Global's updated SmartID family
May 2009
SmartID, SmartTRANS and SmartTOUCH are HID Global’s access control readers, suitable for single technology 13,56 MHz, dual technology 13,56 MHz and 125 kHz and biometric fingerprint. The three components ...

Read more...
Finding a vein
May 2009
Biometric identification working off the veins of a finger is ideal for harsh working environments. Fingerprint-based biometric access control and time and attendance systems are reputed to be somewhat ...

Read more...
IP access control
May 2009
Suprema’s BioStar access control software and biometric security technology combines IP connectivity and biometric security. A biometric device installed at each door works not only as a reader but also ...

Read more...
Lattice proximity access control
May 2009, Centurion Systems
Are you trying to track, control or monitor the movement of staff and/or visitors in and out of your premises? The Lattice range of networkable proximity readers is an affordable access control system ...

Read more...
M2SYS selected by BSSL Technologies for biometric fingerprint software solution
May 2009
M2SYS Technology, a biometrics research and development firm, announced that BSSL Technologies, a Nigerian IT firm, has chosen M2SYS to provide them and their customers with the Bio-Plugin fingerprint ...

Read more...
Integration is a thorny fact
Access & Identity Management Handbook 2009
Integrating identity management and access control is a fact in the business world today, however, its implementation is fraught with difficulties including who is responsible for the project and how ...

Read more...
Checklist for converged access control solutions
Access & Identity Management Handbook 2009
Jeremy Kimber, Honeywell’s EMEA marketing leader, lays out the key points to consider when choosing a converged access control solution. In the past few years, perhaps no security industry buzzword has ...

Read more...
Human capital management
Access & Identity Management Handbook 2009
Integrating systems is crucial for efficient and cost-effective management, but do not forget your people are the most important aspect of your business. In a recent briefing we were informed that the ...

Read more...
A revolution in access control
Access & Identity Management Handbook 2009, Elvey Security Technologies
Access control has come a long way and been through many changes. Jack Edery, CEO of Elvey Security Technologies, believes it is about to undergo even more dramatic changes, all for the benefit of users. ...

Read more...
Convenient security
Access & Identity Management Handbook 2009
Biometric technologies are being adopted in more situations than ever. Which product and underlying technology one chooses can make a difference in the speed of the system’s performance and its associated ...

Read more...
Networking the scholar patrol
Access & Identity Management Handbook 2009
The issue of security remains an area of concern for most companies and institutions – irrespective of size or core focus. Factors like access control as well as time and attendance have developed into ...

Read more...
Geeks working with guards
Access & Identity Management Handbook 2009
An integrated approach to managing physical access to premises and logical access to IT systems is desirable, but made difficult by the processes being owned by different parts of the organisation. There ...

Read more...
Protecting the wires
Access & Identity Management Handbook 2009
Access control systems are only as good as the lightning and surge protection systems protecting them. Lightning is one of the most spectacular meteorological phenomena and the most common severe weather ...

Read more...
uShaka Marine World keeps a fin on access control
Access & Identity Management Handbook 2009
uShaka Marine World opts for an efficient and flexible security system, consisting of access control and video surveillance from GE Security. Located at the entrance to the busiest port in Africa, the ...

Read more...
Supply Chain Services structures staff control
Access & Identity Management Handbook 2009
Supply Chain Services uses biometrics to control access and attendance. When a company needs to control the working hours and movements of over 1500 permanent and casual staff on a daily basis, dependable ...

Read more...
Spar buys into biometric access control
Access & Identity Management Handbook 2009
Protecting its distribution operations and boosting HR operations through the use of biometric access control solutions proved a bargain for Spar. With the 1960s emergence of grocery chains in South ...

Read more...
Nampak updates time and attendance
Access & Identity Management Handbook 2009
The Nampak Group has selected a Kronos automated time and attendance solution implemented by Bytes Systems Integration (SI) as its group standard. To date, Nampak Tissue, Divfood Paarl, Rigids Cluster ...

Read more...



<< First   < Previous   Page 119 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.