Access Control & Identity Management



Vodacom integrates identity with Novell
Access & Identity Management Handbook 2009
Effective control of permanent and contract staff drove Vodacom to Novell’s Identity Manager. Vodacom is using Novell Identity Manager to formalise and automate its identity and security management processes. ...

Read more...
Improving nuclear power plant security
Access & Identity Management Handbook 2009
Customised bar-coded access control solutions manages the movements of staff in US nuclear facilities. In response to the increased potential of terrorist attacks against key infrastructures facilities, ...

Read more...
Biometrics booms in SA
April 2009, Ideco Biometrics
Biometrics is being incorporated into a variety of business environments where it can add value and increase security

Read more...
Beget leaps ahead in local biometrics
April 2009
Finger vein scanners ignore the details on the skin, identifying the person from the pattern of his/her veins

Read more...
A gate is more than a gate
April 2009, Centurion Micro Electronics
In a country where crime has almost become an acceptable profession, our criminals have devised some nifty techniques to get at your belongings. Fortunately, we have companies that devote their time to ...

Read more...
Effective security uses several technologies
April 2009
Golf courses with attendant residential complexes adjacent to or within the course to ensure views over the park-like surroundings created by fairways, greens, trees and water features, have become very ...

Read more...
A logical dimension to physical access control
April 2009
HID Global has announced the launch of HID on the Desktop, a set of logical access control solutions that can extend the reach of an organisation’s existing physical access infrastructure. Mirroring the ...

Read more...
neaMetrics launches BioLite
April 2009
neaMetrics has launched Suprema’s BioLite net, a small IP-based fingerprint terminal offering full functionality of access control and time and attendance. The BioLite Net also offers durability in extreme ...

Read more...
Pointing a finger at mine security
March 2009
The mining industry is one of the largest industries in South Africa, and is busy gearing up for further growth. However, given the value of the mined product and the variability of the mining workforce, ...

Read more...
Protection, safety and more
March 2009, Ideco Biometrics
Biometric technology is being increasingly adopted and accepted by the mining sector. The technology offers mines a multitude of applications that help protect the organisations from threats that loom ...

Read more...
As unique as a fingerprint
March 2009
Dimension Data partnership with PerSay fights identity theft and offers secure authentication and risk management in contact centre environments. Dimension Data is now able to offer secure voice transactions ...

Read more...
Effective security makes sense
March 2009
Small businesses are particularly vulnerable to crime, but the actual costs for larger firms can be disturbingly high. An investment in an effective security solution is key to sustaining a good business. ...

Read more...
New HID smartcard reader
March 2009
The new HID bioCLASS RKLB57 is a read-only, contactless smartcard reader (operating with 13,56 Mhz iClass technology) with a keypad and biometric sensor that provides access control verification and fingerprint ...

Read more...
Fingerprint reader from GSC
March 2009
GSC Systems has added a new fingerprint reader to its range. The 647-50 is a combined fingerprint and RFID reader with a durable, anti-static optical sensor. The unit is easily integrated with both the ...

Read more...
ScramblePad access security
March 2009
The Hirsch ScramblePad keypad/reader provides a very high security approach to access, because the ID code or PIN number cannot be accidentally shared with, or stolen by, onlookers. Each numeral is randomly ...

Read more...
Pointing fingers at access control
February 2009, Ideco Biometrics
Unauthorised entry into the workplace creates potential threats of theft, injury to people and damage to property

Read more...
Security is also a physical issue
February 2009
In the digital age, one tends to consider the notion of attack and penetration of corporate systems or data in a purely online sense. However, there is much more to it and miscreants can gain access to ...

Read more...
Yale's digital door lock
February 2009
With Yale Digital Door Lock users are no longer constrained to use a mechanical key to unlock their doors. Instead they can choose the secure electronic key, the iButton or the PIN keypad – for a completely ...

Read more...
Creating trust across borders
January 2009
Come April 2010 travel documents must have a specified machine readable zone, referred to as the MRZ, if they are to be recognised as ICAO-compliant

Read more...
Security versus access control
January 2009, Impro Technologies
Impro Technologies is gearing up for the worldwide launch of its state-of-the-art IXP220 access control system

Read more...



<< First   < Previous   Page 121 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.