Best of the rest ... October 2005 ASSA ABLOY
ASSA ABLOY (SA) is Southern Africa's largest supplier of quality locking systems and associated products. The company has two large manufacturing units in southern Africa and boasts six agencies ...
Palm vein identification October 2005 Growing customer fears over the security of banking services and the increase of phishing attacks, card cloning and PIN number theft, are leading to a demand for biometric identification security, according ...
Industrial door automation October 2005, Black Point Tech cc t/a BPT Used exclusively for industrial entrances, the CBX system is designed especially for sectional doors with 'direct grip' transmission and is ideal for the motorised driving of all types of industrial sliding ...
Retractable bollards October 2005, Black Point Tech cc t/a BPT Urbaco retractable bollards can withstand the shock of a 7-ton truck travelling at 50 km/h, this is partly due to the structural parts cast in steel.
Invented in 1984 by Yvan Verra, the founder of Urbaco, ...
Access control - past, present and future Access & Identity Management Handbook 2005, Centurion Systems Access control follows closely on the heels of cutting-edge technology. New discoveries at an embedded as well as PC level are quickly adopted by the access control industry. This has led to radical changes ...
The smartcards are coming ... really Access & Identity Management Handbook 2005 You have heard it before, but this time technological advances and security demands in a post 9-11 world make the move to smartcards more likely. Mark Twain once famously quipped that rumours of his ...
Smartcard technology gains importance in access control Access & Identity Management Handbook 2005 The advent of contactless personal computer/smartcard (PC/SC) reader technology marks a significant development for the smartcard market in general and the access control segment in particular. Manufacturers ...
Selecting a biometric technology Access & Identity Management Handbook 2005 The selection of the appropriate biometric technology will depend on a number of application-specific factors, including the environment in which the identity verification process is carried out, the ...
When installing card readers: build a pathway to future card-based technologies Access & Identity Management Handbook 2005 The 125 KHz proximity and Wiegand standards currently constitute the majority of the card-based access control market worldwide. The reluctance among these card issuers to move towards the more advanced ...
Security up front Access & Identity Management Handbook 2005 First impressions count! Both the interview candidate and the salesperson dress smartly, shine their shoes and put on their most confident smiles. So too the architect who uses the front lobby of a building ...
Visitor control - the flaw in most access control installations Access & Identity Management Handbook 2005
How often have you been tempted to fill in the Visitors Book with something as equally foolish as the above? Certainly, in strategically important installations they have a security team and without ...
Contactless smart chip technology - the business benefits Access & Identity Management Handbook 2005 This briefing provides an overview of why businesses are implementing contactless smart chip technology in broadly different environments and applications around the world.
Contactless smart chip technology, ...
The where's, when's and why's of wireless access systems Access & Identity Management Handbook 2005 Depending on the application - from regular doors to elevators - wireless locking systems should be a consideration for every installation.
Wireless or RF on-line locking systems are gaining momentum. ...
Upgrading access solutions Access & Identity Management Handbook 2005 Access control systems have, as a general rule, been developed as proprietary systems. System manufacturers are mainly interested in developing a system they believe is better than other systems on the ...
Testing and measuring automatic door and gate safety Access & Identity Management Handbook 2005 According to the latest European standards governing doors and gates, all automatic closing systems are governed by the Machinery Directives.
The aim of the new standards is to define the technical, ...
Enterprise access control over IP Access & Identity Management Handbook 2005 This case study describes how and why Cisco Systems transitioned from standalone access control systems to an IP networked system to help secure its business facilities. Cisco's global security network ...
Access around the world Access & Identity Management Handbook 2005 "At Sun Microsystems we created a new smartcard solution for network security and physical access control called JavaBadge," said Chris Saleh, marketing manager and programme manager for JavaBadge. "We ...
In the heart of Hillbrow Access & Identity Management Handbook 2005, Turnstar Systems Project scope
The Ponte Building in Hillbrow, Johannesburg, has 470 apartments and 2200 residents.
Two main access points, previously controlled by a tag access control system, were replaced by the ...