Access Control & Identity Management



Trusting your privilege
Access & Identity Management Handbook 2018, Technews Publishing, Editor's Choice, Integrated Solutions
Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.

Read more...
Involve users in design
Access & Identity Management Handbook 2018, Elvey Security Technologies
One of the biggest obstacles to the successful operation of an access control system is the end user not being involved in the design of the solution.

Read more...
Integrating surveillance and access
Access & Identity Management Handbook 2018, Cathexis Technologies, Gallagher, Milestone Systems, Paxton, Surveillance, Integrated Solutions
Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.

Read more...
The access edge
Access & Identity Management Handbook 2018, Johnson Controls, Editor's Choice, Integrated Solutions, Security Services & Risk Management
With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.

Read more...
Home run for integrated security
Access & Identity Management Handbook 2018, Milestone Systems, Integrated Solutions, Surveillance, Infrastructure
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.

Read more...
Facing the future
Access & Identity Management Handbook 2018, neaMetrics, Editor's Choice, Infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?

Read more...
The growth of biometrics
Access & Identity Management Handbook 2018, ZKTeco
Biometric verification is the future, we live in a time where a person can be uniquely identified by evaluating one or more distinguishing biological traits.

Read more...
Access on the edge
Access & Identity Management Handbook 2018, Suprema, Integrated Solutions
CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.

Read more...
Capturing fingerprints in direct sunlight
Access & Identity Management Handbook 2018, Suprema
Suprema developed and patented its multi-dynamic range (MDR) technology to ensure consistency in the quality of fingerprint images.

Read more...
Automated facial recognition
Access & Identity Management Handbook 2018, Integrated Solutions
NEC provides facial recognition system to South Wales Police in the UK, contributes to safe management of Champions League final.

Read more...
Using biometrics to prevent financial crime
Access & Identity Management Handbook 2018, Integrated Solutions
Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.

Read more...
Now your phone is a key
Access & Identity Management Handbook 2018, Salto Systems Africa, Products & Solutions
With an electronic lock, you can use your smartphone app to check if the door is locked, and lock it (for them) if not.

Read more...
Key management in 2018
Access & Identity Management Handbook 2018, Traka Africa, Security Services & Risk Management
With all the technology available today, you would think we were past using old-fashioned keys for security, but far from it.

Read more...
Securing your access security
Access & Identity Management Handbook 2018, G4S Secure Solutions SA, Impro Technologies, Editor's Choice, Information Security
While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.

Read more...
Ding dong, it’s IP
Access & Identity Management Handbook 2018, Elvey Security Technologies , TOA Electronics, Dahua Technology South Africa, Black Point Tech cc t/a BPT, Editor's Choice
IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.

Read more...
Accommodating a multi-purpose solution
Access & Identity Management Handbook 2018, Black Point Tech cc t/a BPT
Farm obtains an integrated intercom and CCTV solution for surveillance, access and internal communications.

Read more...
Game on in Sutherland
Access & Identity Management Handbook 2018, Black Point Tech cc t/a BPT
Controlling access at their Northern Cape game farm was critical to the owners to ensure that the livestock was unable to escape when the gates are opened to allow vehicles in.

Read more...
IP intercom for mining
Access & Identity Management Handbook 2018, Black Point Tech cc t/a BPT, Integrated Solutions
Came BPT’s IP360 IP intercom system was installed for a new mining head office in Middelburg.

Read more...
QR code access integration
Access & Identity Management Handbook 2018, Axis Communications SA, Integrated Solutions
Have you ever thought of sending QR codes to manage the visitors and suppliers permitted to access your facility?

Read more...
A mobile holiday
Access & Identity Management Handbook 2018, Infrastructure
The use of mobile devices, specifically smartphones for access control has taken off over the past year or two, with expectations that its adoption will grow even more.

Read more...



<< First   < Previous   Page 55 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.