Access Control & Identity Management



Most influential access control
October 2005
The following are subjective choices, and the list is an alphabetical one devoid of ranking

Read more...
Best of the rest ...
October 2005
ASSA ABLOY ASSA ABLOY (SA) is Southern Africa's largest supplier of quality locking systems and associated products. The company has two large manufacturing units in southern Africa and boasts six agencies ...

Read more...
Palm vein identification
October 2005
Growing customer fears over the security of banking services and the increase of phishing attacks, card cloning and PIN number theft, are leading to a demand for biometric identification security, according ...

Read more...
Industrial door automation
October 2005, Black Point Tech cc t/a BPT
Used exclusively for industrial entrances, the CBX system is designed especially for sectional doors with 'direct grip' transmission and is ideal for the motorised driving of all types of industrial sliding ...

Read more...
Retractable bollards
October 2005, Black Point Tech cc t/a BPT
Urbaco retractable bollards can withstand the shock of a 7-ton truck travelling at 50 km/h, this is partly due to the structural parts cast in steel. Invented in 1984 by Yvan Verra, the founder of Urbaco, ...

Read more...
Access control - past, present and future
Access & Identity Management Handbook 2005, Centurion Systems
Access control follows closely on the heels of cutting-edge technology. New discoveries at an embedded as well as PC level are quickly adopted by the access control industry. This has led to radical changes ...

Read more...
The smartcards are coming ... really
Access & Identity Management Handbook 2005
You have heard it before, but this time technological advances and security demands in a post 9-11 world make the move to smartcards more likely. Mark Twain once famously quipped that rumours of his ...

Read more...
Smartcard technology gains importance in access control
Access & Identity Management Handbook 2005
The advent of contactless personal computer/smartcard (PC/SC) reader technology marks a significant development for the smartcard market in general and the access control segment in particular. Manufacturers ...

Read more...
Which biometric solution? The right biometrics provide convenience and security in low and high volume applications
Access & Identity Management Handbook 2005
From the hand reader at the front door to the finger scanner securing the pharmacy, biometric solutions are becoming ubiquitous in large-scale installations. If you think biometrics are only suitable ...

Read more...
Selecting a biometric technology
Access & Identity Management Handbook 2005
The selection of the appropriate biometric technology will depend on a number of application-specific factors, including the environment in which the identity verification process is carried out, the ...

Read more...
When installing card readers: build a pathway to future card-based technologies
Access & Identity Management Handbook 2005
The 125 KHz proximity and Wiegand standards currently constitute the majority of the card-based access control market worldwide. The reluctance among these card issuers to move towards the more advanced ...

Read more...
Security up front
Access & Identity Management Handbook 2005
First impressions count! Both the interview candidate and the salesperson dress smartly, shine their shoes and put on their most confident smiles. So too the architect who uses the front lobby of a building ...

Read more...
Visitor control - the flaw in most access control installations
Access & Identity Management Handbook 2005
How often have you been tempted to fill in the Visitors Book with something as equally foolish as the above? Certainly, in strategically important installations they have a security team and without ...

Read more...
Contactless smart chip technology - the business benefits
Access & Identity Management Handbook 2005
This briefing provides an overview of why businesses are implementing contactless smart chip technology in broadly different environments and applications around the world. Contactless smart chip technology, ...

Read more...
The where's, when's and why's of wireless access systems
Access & Identity Management Handbook 2005
Depending on the application - from regular doors to elevators - wireless locking systems should be a consideration for every installation. Wireless or RF on-line locking systems are gaining momentum. ...

Read more...
Upgrading access solutions
Access & Identity Management Handbook 2005
Access control systems have, as a general rule, been developed as proprietary systems. System manufacturers are mainly interested in developing a system they believe is better than other systems on the ...

Read more...
Testing and measuring automatic door and gate safety
Access & Identity Management Handbook 2005
According to the latest European standards governing doors and gates, all automatic closing systems are governed by the Machinery Directives. The aim of the new standards is to define the technical, ...

Read more...
Enterprise access control over IP
Access & Identity Management Handbook 2005
This case study describes how and why Cisco Systems transitioned from standalone access control systems to an IP networked system to help secure its business facilities. Cisco's global security network ...

Read more...
Access around the world
Access & Identity Management Handbook 2005
"At Sun Microsystems we created a new smartcard solution for network security and physical access control called JavaBadge," said Chris Saleh, marketing manager and programme manager for JavaBadge. "We ...

Read more...
In the heart of Hillbrow
Access & Identity Management Handbook 2005, Turnstar Systems
Project scope The Ponte Building in Hillbrow, Johannesburg, has 470 apartments and 2200 residents. Two main access points, previously controlled by a tag access control system, were replaced by the ...

Read more...



<< First   < Previous   Page 136 of 179   Next >   Last >>