Access Control & Identity Management



Global identity concerns
Access & Identity Management Handbook 2015
Sanjay Dharwadker applies many years of experience in the security field to ask if security is a cultural and civilisational construct?

Read more...
From drawbridge to biometrics
Access & Identity Management Handbook 2015
The access control industry may just be a lot older than we believe.

Read more...
Global access control standards
Access & Identity Management Handbook 2015
ONVIF publishes release candidate for Profile A, enabling advanced access control configuration.

Read more...
Why integrate physical and logical security?
Access & Identity Management Handbook 2015, Integrated Solutions
Despite the fact that physical and logical security depend on each other, it is surprising to find that a number of companies still treat them as separate systems.

Read more...
Increasing protection through multi-factor authentication
Access & Identity Management Handbook 2015, Reditron, Elvey Security Technologies
Hi-Tech Security Solutions asks how necessary and successful mutli-factor authentication is at improving security.

Read more...
Multi-factor improves security and convenience
Access & Identity Management Handbook 2015, HID Global
An effective strong authentication solution must be able to add security without adding significant costs or complexity.

Read more...
A reader alone doesn’t cut it anymore
Access & Identity Management Handbook 2015, Suprema, ZKTeco
Hi-Tech Security Solutions asked ZKTeco and Suprema how the functionality of ­readers is expanding to integrate more business functionality than merely access control.

Read more...
Faster, easier, cheaper and more reliable than ever
Access & Identity Management Handbook 2015, iPulse Systems, Suprema, ZKTeco, IDEMIA , Editor's Choice
To find out more about the state of biometrics and for a glimpse into the near future, Hi-Tech Security Solutions asked a few experts for their take on this thriving industry.

Read more...
Biometrics goes mainstream
Access & Identity Management Handbook 2015, Editor's Choice
Hi-Tech Security Solutions spoke to Dr Nick van der Merwe, director of technology & business development at Muvoni to find out how far biometrics has advanced and how it is being used in the real world today.

Read more...
More ways to do more
Access & Identity Management Handbook 2015, Suprema, Products & Solutions
The new Suprema BioStar 2.1 includes a number of software and hardware updates that further improve the usability and expandability of the platform.

Read more...
Physical ­access via ­mobile
Access & Identity Management Handbook 2015, Salto Systems Africa, Infrastructure
Using smartphones for a variety of non-telecommunications purposes is the norm today and it is becoming the new normal in this market as well.

Read more...
Selecting the right entrance
Access & Identity Management Handbook 2015, Centurion Systems, Turnstar Systems, ASSA ABLOY South Africa
Hi-Tech Security Solutions asked three experts in entrance systems to elaborate on what systems are available and how to select the best one for your business’s entrance.

Read more...
IP video door stations
Access & Identity Management Handbook 2015, Axis Communications SA, Surveillance
Enhancing video surveillance with communication and entry control. Pace and progress may differ, but industry after industry is adopting IP technology.

Read more...
Online control offline
Access & Identity Management Handbook 2015, Johnson Controls, Integrated Solutions
Adding offline control to cloud-based and hosted access control. Johnson Controls’ P2000 provides seamless ID management, online and offline.

Read more...
Leveraging ERP investment with WFM
Access & Identity Management Handbook 2015, Information Security
Many companies have an enterprise resource planning (ERP) system in place but fail to leverage its potential for saving them manpower costs and boosting produc­tivity.

Read more...
Electronic locks take centre stage
Access & Identity Management Handbook 2015, Salto Systems Africa, ASSA ABLOY South Africa
Electronic locks offer numerous benefits to users at home and in the professional world, but can they stand the Eskom effect?

Read more...
Access control in healthcare
Access & Identity Management Handbook 2015
Access control and security in healthcare facilities have their unique challenges, largely due to the presence of large people flow which makes it difficult in many cases to control access and identify trespassers.

Read more...
Directory of access and identity management providers
Access & Identity Management Handbook 2015


Read more...
Multi-dimensional perimeter ­security
Access & Identity Management Handbook 2015, C3 Shared Services, Perimeter Security, Alarms & Intruder Detection
Is an electric fence enough to keep the criminal element out of private and business premises or are businesses demanding additional technology?

Read more...
Optical fibre perimeter protection
Access & Identity Management Handbook 2015, Perimeter Security, Alarms & Intruder Detection
Odet Systems has launched the SmartSense solution suite to provide a scalable fibre optic perimeter intrusion detection system.

Read more...



<< First   < Previous   Page 75 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.