Access Control & Identity Management



Network door controller
November 2017, Johnson Controls, Products & Solutions
Special edition iSTAR Ultra door controller brings scalable IP architecture to smaller security deployments.

Read more...
Awareness and trust in context
Access & Identity Management Handbook 2018, Security Services & Risk Management
Markus Krauss, senior director, Digital Identity and Security, CA Technologies, spoke to Hi-Tech Security Solutions about making identity work for people and things.

Read more...
People on the move
Access & Identity Management Handbook 2018, Editor's Choice, Integrated Solutions, Infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.

Read more...
Access and identity: looking ahead
Access & Identity Management Handbook 2018, neaMetrics, ZKTeco, Editor's Choice, Integrated Solutions
Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.

Read more...
A question of trust and ­accountability
Access & Identity Management Handbook 2018, Technews Publishing, Integrated Solutions
Access and identity management is about trust, how you assign it, how much you allow and how you manage it.

Read more...
Trusting your privilege
Access & Identity Management Handbook 2018, Technews Publishing, Editor's Choice, Integrated Solutions
Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.

Read more...
Involve users in design
Access & Identity Management Handbook 2018, Elvey Security Technologies
One of the biggest obstacles to the successful operation of an access control system is the end user not being involved in the design of the solution.

Read more...
Integrating surveillance and access
Access & Identity Management Handbook 2018, Cathexis Technologies, Gallagher, Milestone Systems, Paxton, Surveillance, Integrated Solutions
Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.

Read more...
The access edge
Access & Identity Management Handbook 2018, Johnson Controls, Editor's Choice, Integrated Solutions, Security Services & Risk Management
With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.

Read more...
Home run for integrated security
Access & Identity Management Handbook 2018, Milestone Systems, Integrated Solutions, Surveillance, Infrastructure
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.

Read more...
Facing the future
Access & Identity Management Handbook 2018, neaMetrics, Editor's Choice, Infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?

Read more...
The growth of biometrics
Access & Identity Management Handbook 2018, ZKTeco
Biometric verification is the future, we live in a time where a person can be uniquely identified by evaluating one or more distinguishing biological traits.

Read more...
Access on the edge
Access & Identity Management Handbook 2018, Suprema, Integrated Solutions
CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.

Read more...
Capturing fingerprints in direct sunlight
Access & Identity Management Handbook 2018, Suprema
Suprema developed and patented its multi-dynamic range (MDR) technology to ensure consistency in the quality of fingerprint images.

Read more...
Automated facial recognition
Access & Identity Management Handbook 2018, Integrated Solutions
NEC provides facial recognition system to South Wales Police in the UK, contributes to safe management of Champions League final.

Read more...
Using biometrics to prevent financial crime
Access & Identity Management Handbook 2018, Integrated Solutions
Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.

Read more...
Now your phone is a key
Access & Identity Management Handbook 2018, Salto Systems Africa, Products & Solutions
With an electronic lock, you can use your smartphone app to check if the door is locked, and lock it (for them) if not.

Read more...
Key management in 2018
Access & Identity Management Handbook 2018, Traka Africa, Security Services & Risk Management
With all the technology available today, you would think we were past using old-fashioned keys for security, but far from it.

Read more...
Securing your access security
Access & Identity Management Handbook 2018, G4S Secure Solutions SA, Impro Technologies, Editor's Choice, Information Security
While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.

Read more...
Ding dong, it’s IP
Access & Identity Management Handbook 2018, Elvey Security Technologies , TOA Electronics, Dahua Technology South Africa, Black Point Tech cc t/a BPT, Editor's Choice
IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.

Read more...



<< First   < Previous   Page 55 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.