Access Control & Identity Management



A password you can’t forget
Access & Identity Management Handbook 2017, Security Services & Risk Management
Voice biometrics doesn’t receive the same level of publicity that other forms of biometric technology do, but it is a fast growing form of identity authentication.

Read more...
Using smart devices to provide recognition of individuals
Access & Identity Management Handbook 2017, Technews Publishing, Editor's Choice, Security Services & Risk Management
[ezine teaser] The very idea of a computer being able to recognise people in a similar way to which we as humans instinctively recognise individuals, is mind boggling.

Read more...
Protecting against criminal use of stolen biometric data
Access & Identity Management Handbook 2017, HID Global, Integrated Solutions
Biometric technology is not invulnerable, but with the correct planning it is an effective authentication mechanism that binds a myriad of digital and physical credentials to a person.

Read more...
Mobility and access meet
Access & Identity Management Handbook 2017, Impro Technologies, Salto Systems Africa, Integrated Solutions
Mobile technologies have made biometrics a household word and are now changing the face of access control with on-device credentials and simplified management functionality.

Read more...
The future of access control credentials
Access & Identity Management Handbook 2017, Impro Technologies
Mobile technology is coming to the fore, with both Bluetooth and NFC capabilities allowing users to safely perform the functions traditionally assigned to RFID cards.

Read more...
The reliability of mobile credentials
Access & Identity Management Handbook 2017, Products & Solutions
The use of a PIN or personal access code (PAC) to provide visitors with access to residential estates and business complexes has increased in the past few years.

Read more...
Access with no strings attached
Access & Identity Management Handbook 2017, Elvey Security Technologies , Salto Systems Africa, ASSA ABLOY South Africa, Editor's Choice, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Wireless access solutions abound, but most installed solutions still rely on cables with only 5% of those using electronic access solutions going completely wireless.

Read more...
Electronic locks are the new black
Access & Identity Management Handbook 2017, ASSA ABLOY South Africa, Salto Systems Africa
The use and versatility of electronic locks is growing and gaining traction in more organisations. Hi-Tech Security Solutions speaks to two leaders in the field.

Read more...
IP’s access control capture
Access & Identity Management Handbook 2017, Pinnacle, Reditron, Paxton, Integrated Solutions, Infrastructure
IP delivers many benefits to the access market, but it’s a case of slow and steady wins the race as companies gradually upgrade to hybrid solutions.

Read more...
A turnstile for every requirement
Access & Identity Management Handbook 2017, BoomGate Systems, Turnstar Systems, Products & Solutions
Turnstiles are a versatile and reliable tool in an organisation’s access control kit. Hi-Tech Security Solutions speaks to Turnstar and BoomGate.

Read more...
Best barrier practice on residential estates
Access & Identity Management Handbook 2017, Turnstar Systems
Craig Sacks, CEO of ISO 9001:2015-accredited Turnstar discusses the various physical access barriers available to estates and other secure environments.

Read more...
Ergonomic design delivers practical benefits
Access & Identity Management Handbook 2017
When Morse Watchmans was first making its way into the security industry with an automated key control and management system, ergonomics was fundamental to its design.

Read more...
Managing visitors and contractors
Access & Identity Management Handbook 2017, Ideco Biometrics, Editor's Choice, Integrated Solutions, Infrastructure
Accessing gated communities and campuses, be it business, government or residential, has become a key point for newer access control technologies.

Read more...
Accessing cyber security
Access & Identity Management Handbook 2017, Johnson Controls - (Tyco Security Products), Editor's Choice, Information Security, Security Services & Risk Management
Tyco Security Products is taking a proactive role in securing its range of physical security products by developing its Cyber Protection Programme.

Read more...
Making the case for Identity-as-a-Service
Access & Identity Management Handbook 2017
The different evaluation criteria in approaching cloud-based Identity and Access Management (IAM). It maps key considerations in the evaluation process, as well as perceived barriers to achieving Identity-as-a-Service (IDaaS).

Read more...
Access control solutions need to embrace open platforms
Access & Identity Management Handbook 2017, Integrated Solutions
Optimising video and access control within the broader surveillance or security solution is no longer about synergy, interfacing or integration.

Read more...
Eight best practices for identity and access management
Access & Identity Management Handbook 2017, Editor's Choice, Integrated Solutions, Infrastructure
Identity and access management (IAM) isn’t something you do once and then forget about. It’s an ongoing process, a critical part of your infrastructure that demands continuous management.

Read more...
The perimeter security challenge
Access & Identity Management Handbook 2017, Residential Estate (Industry), Perimeter Security, Alarms & Intruder Detection
The rising threat of violent and organised crime in South Africa in recent months has undoubtedly increased awareness of perimeter security and security in general.

Read more...
Improving security at Helderberg
Access & Identity Management Handbook 2017, Surveillance, Integrated Solutions
Access control remains the crux of residential estate living and homeowners’ associations are realising the benefits of deploying an electronically driven system.

Read more...
Mantrap access control for data centre in Qatar
Access & Identity Management Handbook 2017, Turnstar Systems
Mantrap cubicles control access and enhance security at leading international communications company in the Middle East.

Read more...



<< First   < Previous   Page 66 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.