Fired up security at MTN Access & Identity Management Handbook 2004 Project scope
The MTN project currently comprises an access control system with a central server, controlling approximately 20 buildings across the country. There are in excess of 60 controllers, with ...
uShaka Marine World Access & Identity Management Handbook 2004, Turnstar Systems Project scope R735-million total development with 22 000 m3 of marine tanks, Water Park, 12 000 m2 retail, 475 m beach frontage. Estimated paid attendance of 1,5 million per annum with Design Day of ...
Tighter control at Macsteel Access & Identity Management Handbook 2004, Turnstar Systems Project scopeNumber of users: projected group project 1000. At present +250 users at one site. Number of buildings: One. Number of enrolment stations: One Sagem MEMS. Number of biometric readers:...
The role of time and attendance in access control Access & Identity Management Handbook 2004 Time and attendance is an expensive afterthought to an access control system and vice versa. By pre-planning, one can use their synergies, save money and avoid ending up with incompatible systems that ...
Buddy-clocking - a thing of the past Access & Identity Management Handbook 2004, Turnstar Systems, Impro Technologies Project scopeNumber of users: 300. Number of buildings: One. Number of enrolment stations: One Sagem MEMS. Number of biometric readers: Six Sagem MorphoAccess. Mode of biometric operation: Identification ...
SA technology 'cleaning-up' Hillbrow Access & Identity Management Handbook 2004 DEX Security Solutions was approached six months ago to help solve many of the problems affecting Hillbrow in Johannesburg. The problem
Hillbrow is notorious as one of SA's largest crime areas where ...
An overview of biometrics standards Access & Identity Management Handbook 2004 The past two years have seen significant developments at an international level in the generation of standards in the field of biometrics. This article gives a brief overview of the current state of affairs ...
Protecting their privacy Access & Identity Management Handbook 2004, Turnstar Systems Project scope Residential apartment block with 600 tenants. The history
Providers of accommodation for residential tenants, this is how Gerald Kaplan describes what his company, The Monsy Group, ...
Keeping the records straight Access & Identity Management Handbook 2004, Exys Africa Project scopeNumber of users: Staff 900, visitors 3000. Number of buildings: One. Number of enrolment stations: Three Sagem MEMS. Number of biometric readers: 21 Sagem MorphoAccess. Mode of biometric ...
How to design automated access and parking systems for university campuses Access & Identity Management Handbook 2004 Identification is the action where an identity is assigned to a specific individual, and authentication the action designed to verify a user's identity. An individual can be identified and authenticated ...
User's basic guide to access control Access & Identity Management Handbook 2004 The outcome of the risk assessment of your premises will determine the level of security you require and in turn influence your choice of access control system to be used. 1. Risk assessment: Carry ...
How secure are the remote controls we use? Access & Identity Management Handbook 2004 Remote controls are being used more and more to operate various devices around the home, office or factory, from entrance gates, to garage or industrial door motors, access control booms to alarms systems. ...
Sliding gate automation Access & Identity Management Handbook 2004 Automatic gates form an important part of perimeter security. Consequently, the emphasis in the design of gate automation products, particularly in this country, focuses more on security than convenience. ...
Convergence of logical and physical security Access & Identity Management Handbook 2004 Abstract
This paper addresses the benefits and value of the convergence of logical and physical security systems by using a common token such as a smartcard. Issues from architecture to pricing to user ...
Open security exchange best practices Access & Identity Management Handbook 2004 Guidelines for selection and issuance of identification tokens for logical and physical systems
There are many factors involved in planning for enterprise deployment of identification tokens and credential ...
How to design automated access and parking systems for medical centres Access & Identity Management Handbook 2004 Abstract:
This handbook is designed to assist the administrator, developer or manager of a medical centre. Besides offering an introduction to the problems and users in this application, the key objective ...
How to design automated access and parking systems for hotels and resorts Access & Identity Management Handbook 2004 Abstract:
Large multidimensional resort hotels have been gaining immense popularity, and with this increasing popularity security and parking becomes a major concern for the administrators of these resorts. ...
How to design automated access and parking systems for office buildings Access & Identity Management Handbook 2004 Abstract:
Expanding business opportunities create a need to provide secure facilities, safeguard people and, of course, property. From the most heavily trafficked facilities to the loneliest, out of ...