Access Control & Identity Management



Working in mysterious ways
November 2007, Fourier IT Innovation
Motivation The Salesian Institute, a charitable organisation that works with Cape Town's street children, is one of the latest converts to biometrics. The organisation, a Roman Catholic religious order, ...

Read more...
Bridging the Great Divide: the convergence of physical and logical security
Access & Identity Management Handbook 2007
What do a padlock key and an application password have in common? In one sense, almost nothing. After all, one is a 4000-year-old hardware device and the other is a modern-day software-based technology ...

Read more...
The do's and do nots of identity and access management
Access & Identity Management Handbook 2007
Many enterprises are planning or implementing identity access management projects. These initiatives are complex and expensive, requiring an approach that is both strategic and flexible. Many enterprises ...

Read more...
Converging security technologies
Access & Identity Management Handbook 2007
The convergence of physical and logical security technologies has come a long way, with the IT industry coming to terms with voice/data/video convergence, and the security industry taking advantage of ...

Read more...
Combine and standardise physical and IT security measures to minimise risk
Access & Identity Management Handbook 2007
Organisations incur significant overheads, as well as generate increased security risks, when employees misuse or abuse network resources. Serious losses – of financial and competitive edge in particular ...

Read more...
Physical security in mission-critical facilities
Access & Identity Management Handbook 2007
Physical security – controlling personnel access to facilities – is critical to achieving data centre availability goals. As new technologies such as biometric identification and remote management of ...

Read more...
Iometrics, identity chains and the four dimensions of identity
Access & Identity Management Handbook 2007
A Johannesburg company is taking a radical new approach to identity. Lynne Larsen discovered more about the innovative thinking and its practical applications. With one product already in the market ...

Read more...
Presence establishment - the art of integrating where I am with what I am doing
Access & Identity Management Handbook 2007
The establishment of presence can be defined as the verification of a subject or item’s presence at a specific location, at a specific point in time. This presence can be the physical presence of a ...

Read more...
Combined systems ease the burden on physical security, IT compliance
Access & Identity Management Handbook 2007
Security policy has typically meant different things to different people within an organisation. The facilities management department covers all physical access points, teaching staff to lock all doors ...

Read more...
Access control the key to integration for businesses
Access & Identity Management Handbook 2007
An access control solution can be as simple as the use of electronic cards instead of keys to unlock a front door. This limited functionality still retains a considerable level of value. In most cases, ...

Read more...
Biometrics and access control - a formidable combination
Access & Identity Management Handbook 2007, Johnson Controls
Minimising risk, protecting organisational assets and taking back control. South African businesses are more aware of the importance of a secure environment than their international counterparts. Since ...

Read more...
Smart buildings need smart security systems
Access & Identity Management Handbook 2007
Simplicity and comfort are the main objectives of smart buildings, which provide occupants with quality of life through automation and improved security. Smart buildings function through high levels ...

Read more...
Biometrics - the logical route to securing your data
Access & Identity Management Handbook 2007, Ideco Biometrics
The convergence of different IT systems and the integration of different solutions such as HR, CRM and supply chain management into one centralised system has resulted in increased data-sharing, and with ...

Read more...
High security mandate
Access & Identity Management Handbook 2007
What is ‘high’ security, and who should have it? Certain building types, such as data centres, utilities, healthcare and governmental offices, of course require an industrial-grade, high security, access ...

Read more...
Redefining security
Access & Identity Management Handbook 2007
The difference between just delivering security and ensuring secure business operations. The 'current state' enterprise is unprepared for the security ramifications of global changes and must redefine ...

Read more...
Keeping it confidential
Access & Identity Management Handbook 2007, Ideco Biometrics
Motivation Sizwe Ntsaluba Chartered Accountants (Siswe), founded in 1985 primarily as a business consultancy, has developed over the years into a well-established South African firm of accountants, auditors ...

Read more...
Safety first? Yebo gogo
Access & Identity Management Handbook 2007
Motivation Vodacom Group, which provides and maintains cellular telecommunications network including infrastructure and services throughout South Africa, considers its own employees, employees of its ...

Read more...
A perfect fit across the board
Access & Identity Management Handbook 2007, Fourier IT Innovation
Motivation Midas Group, distributor of branded automotive parts, services and accessories in southern Africa, has its head office in Meadowdale, Johannesburg and regional distribution centres in Durban ...

Read more...
Campus control
Access & Identity Management Handbook 2007, Impro Technologies
Motivation The University of Johannesburg is one of the largest universities in South Africa with campuses in Auckland Park, Doornfontein, Daveyton and Soweto. In total, all five campuses currently accommodate ...

Read more...
Upgraded access control at Wits
Access & Identity Management Handbook 2007
Motivation The University of the Witwatersrand (Wits), based in Johannesburg, is one of Africa's leading research and teaching institutions. The university's old access control system was becoming slow ...

Read more...



<< First   < Previous   Page 125 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.