Integrated Solutions



A question of trust and ­accountability
Access & Identity Management Handbook 2018, Technews Publishing, Access Control & Identity Management
Access and identity management is about trust, how you assign it, how much you allow and how you manage it.

Read more...
Trusting your privilege
Access & Identity Management Handbook 2018, Technews Publishing, Editor's Choice, Access Control & Identity Management
Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.

Read more...
Integrating surveillance and access
Access & Identity Management Handbook 2018, Cathexis Technologies, Gallagher, Milestone Systems, Paxton, Access Control & Identity Management, Surveillance
Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.

Read more...
The access edge
Access & Identity Management Handbook 2018, Johnson Controls, Editor's Choice, Access Control & Identity Management, Security Services & Risk Management
With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.

Read more...
Integration and communication
Access & Identity Management Handbook 2018, Black Point Tech cc t/a BPT
Integration and communication are two essential features when considering security systems and access control in a residential environment for both security and convenience of the residents.

Read more...
Home run for integrated security
Access & Identity Management Handbook 2018, Milestone Systems, Surveillance, Access Control & Identity Management, Infrastructure
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.

Read more...
Access on the edge
Access & Identity Management Handbook 2018, Suprema, Access Control & Identity Management
CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.

Read more...
Automated facial recognition
Access & Identity Management Handbook 2018, Access Control & Identity Management
NEC provides facial recognition system to South Wales Police in the UK, contributes to safe management of Champions League final.

Read more...
Using biometrics to prevent financial crime
Access & Identity Management Handbook 2018, Access Control & Identity Management
Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.

Read more...
IP intercom for mining
Access & Identity Management Handbook 2018, Black Point Tech cc t/a BPT, Access Control & Identity Management
Came BPT’s IP360 IP intercom system was installed for a new mining head office in Middelburg.

Read more...
QR code access integration
Access & Identity Management Handbook 2018, Axis Communications SA, Access Control & Identity Management
Have you ever thought of sending QR codes to manage the visitors and suppliers permitted to access your facility?

Read more...
Portable biometric solutions gain ground
Access & Identity Management Handbook 2018, Access Control & Identity Management, Infrastructure
Portable devices offer a cost-effective and reliable alternative for a number of traditional access control applications.

Read more...
Access at speed
Access & Identity Management Handbook 2018, Hikvision South Africa, Verifier, Cathexis Technologies, Surveillance, Access Control & Identity Management
Automated number plate recognition is finding traction in a number of vertical markets with specialised edge or server-based analytical software.

Read more...
Enhanced visitor management
Access & Identity Management Handbook 2018, Access Control & Identity Management, Products & Solutions
A number of residential estates and business parks have installed access control systems which aim to control the passage of pedestrian and vehicular traffic into and out of the facilities.

Read more...
Migrating to IP access control
Access & Identity Management Handbook 2018, Genetec, Access Control & Identity Management, Infrastructure
Migrating from an existing legacy access control system to an IP-based system offers companies many benefits and even cost savings.

Read more...
Measurable policies and multi-layered approach hit the mother lode
October 2017, Editor's Choice, Mining (Industry)
Securing mines is often a logistical nightmare as threats from common thieves to illegal miners are added to the inherent safety and security risks synonymous with mine complexes.

Read more...
What’s in a platform?
October 2017, Milestone Systems, Genetec, Editor's Choice, Surveillance
Hi-Tech Security Solutions looks at what today’s security management platforms offer users from both small and large organisations.

Read more...
Changing the SMB VMS landscape
October 2017, Surveillance
Video surveillance innovations have changed the landscape for enterprise security with the ability to provide real-time monitoring, forensic investigations, risk mitigation and business operations management.

Read more...
Beware of PoPI non-compliance
1 October 2017, iFacts, Security Services & Risk Management
Ignorance of the law may not be sufficient to save you from the Act when it comes into operation.

Read more...
Qognify secures global bank
1 October 2017, Security Services & Risk Management, Surveillance
Qognify announced that one of the world’s largest banks and financial services companies has selected Qognify Situator and its Operational Intelligence Centre (OIC) module to help manage its global security ...

Read more...



<< First   < Previous   Page 28 of 82   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.