Access Control & Identity Management



Convergence of logical and physical security
Access & Identity Management Handbook 2004
Abstract This paper addresses the benefits and value of the convergence of logical and physical security systems by using a common token such as a smartcard. Issues from architecture to pricing to user ...

Read more...
Open security exchange best practices
Access & Identity Management Handbook 2004
Guidelines for selection and issuance of identification tokens for logical and physical systems There are many factors involved in planning for enterprise deployment of identification tokens and credential ...

Read more...
How to design automated access and parking systems for medical centres
Access & Identity Management Handbook 2004
Abstract: This handbook is designed to assist the administrator, developer or manager of a medical centre. Besides offering an introduction to the problems and users in this application, the key objective ...

Read more...
How to design automated access and parking systems for hotels and resorts
Access & Identity Management Handbook 2004
Abstract: Large multidimensional resort hotels have been gaining immense popularity, and with this increasing popularity security and parking becomes a major concern for the administrators of these resorts. ...

Read more...
How to design automated access and parking systems for office buildings
Access & Identity Management Handbook 2004
Abstract: Expanding business opportunities create a need to provide secure facilities, safeguard people and, of course, property. From the most heavily trafficked facilities to the loneliest, out of ...

Read more...
How to design automated access and parking systems for private residential complexes
Access & Identity Management Handbook 2004
Abstract: This handbook is designed to assist the administrator, developer or manager of a private residential complex. Besides offering an introduction to the problems and users in this application, ...

Read more...
Data centre physical security checklist
Access & Identity Management Handbook 2004
Abstract: This paper presents an informal checklist compiled to raise awareness of physical security issues in the data centre environment. Information security specialists should use this checklist ...

Read more...
Sensitive but unclassified information: a threat to physical security
Access & Identity Management Handbook 2004
Alexander J. Breeding    SANS security essentials GSEC practical assignment       Abstract: Considerable effort has gone into analysing the possibilities of an 'electronic Pearl Harbor' attack against the ...

Read more...
Pluggable and compact spring cage terminal
8 September 2004, Phoenix Contact, Interconnection
Phoenix Contact's CPT 1 pluggable, compact spring cage terminal features a user friendly spring cage double connector with a 5,0 mm pitch. This compact connection technology enables the rapid and convenient ...

Read more...
Versatile 2 mm open potentiometers
8 September 2004, Passive Components
Murata's 2 mm open potentiometers have special features and are useful in pick-up modules, cellular phones, digital cameras and other tight spaces. With a 2,1 by 2,7 mm footprint, 1,0 mm or less in height, ...

Read more...
ID card design
September 2004
Security comes from a combination of media features, printer capability, database verification and special security - unusual, covert and forensic features

Read more...
Multisource announces BEE deal with Zonkiziziwe
September 2004, News
The announcement that Zonkiziziwe Investments has secured a 23% shareholding in leading wireless telecommunications company, Multisource Telecoms, comes at a time when demonstration of a black economic ...

Read more...
Smartcard briefs
September 2004, Information Security
China embracing smartcards Zhao Bo, deputy director of the computer and information advancing department of the Ministry of Information Industry, told the opening session of the 7th International Fair ...

Read more...
Portable rapid deployment observation and monitoring system
September 2004, Surveillance
The Portable Rapid Deployment Observation Monitoring System (PROMS) from Pyser-SGI, represented locally by AfriMeasure, is designed for all static urban and rural surveillance operations. PROMS provides ...

Read more...
Legrand entry control
September 2004, Centurion Systems, Products & Solutions
Legrand audio and video door entry control kits, distributed by Centurion Systems, are designed to enhance safety and provide peace of mind in almost any application. "As crime increases, well-designed ...

Read more...
A new level of security with GE Addressable Security System
September 2004
Increasing the security level for commercial installations and lowering the installation time and cost were the drivers in the development of the GE Addressable Security System (GE-A2S) by GE Infrastructure's ...

Read more...
Blue Line modular intrusion sensors
September 2004, Bosch Building Technologies, Security Services & Risk Management
In a perfect world, security system installers would leave their shop or warehouse with everything they needed to complete their work orders for the day. In the real world, however, installers often encounter ...

Read more...
PinLock - access control keypads from GSC
September 2004
GSC Systems has released PinLock and PinLock-Plus, two new standalone access control keypads. The keypads are cost effective, user friendly and are simple to program. The attractive housing allows quick ...

Read more...
RFID OEM proximity readers for system integrators
September 2004
GSC Systems has developed a range of RFID proximity readers and modules for system integrators. Technologies offered include MIFARE 13,56 MHz, RS485 Reader and 125 kHz EM4000 readers. The readers were ...

Read more...
Enhanced access control from Unilock
September 2004
Unilock has combined the simplicity of a mechanical lock with the flexibility of computer technology in a unique locking system, which provides customers with the best of both worlds. Unlike traditional ...

Read more...



<< First   < Previous   Page 144 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.