Access Control & Identity Management



The new security perimeter
Access & Identity Management Handbook 2015, Information Security
CA Southern Africa’s Security B.U. manager, Michael Horn, expands on the new security perimeter and how ID and access management ensure the business environment is protected against outside intruders.

Read more...
The key to security
Access & Identity Management Handbook 2015, Amaya Industries, Traka Africa
Hi-Tech Security Solutions spoke to a number of key management companies to find out the latest in this quiet, but critical field.

Read more...
Integrating key control into a networked security system
Access & Identity Management Handbook 2015
As part of the requirement for the safety and security of people, assets and facilities, the management of keys is a fundamental tactic in controlling access.

Read more...
Electronic signatures in the digital economy
Access & Identity Management Handbook 2015, Security Services & Risk Management
Traditional methods of signing documents are also costly, environmentally unfriendly, and expose the organisation to the risks of fraud and identity theft.

Read more...
Managing identities across the ­organisation
Access & Identity Management Handbook 2015, Information Security
Identity management (IDM) is essentially the management and administration of individual identities within a system, such as a business or a network.

Read more...
Five reasons for IT to get ­physical with access control
Access & Identity Management Handbook 2015, Information Security
While many network security systems are now built to support IT best practices and standards, such as, virtualisation, physical access control systems (PACS) have traditionally been designed without IT professionals in mind.

Read more...
Increased complexity complicates identity management
Access & Identity Management Handbook 2015, Information Security
Mobile identity and access management services can help organisations ensure ­security in the digital revolution.

Read more...
P@$$wORD_1: How secure is your password?
Access & Identity Management Handbook 2015, Information Security
One of the simplest means of acquiring this information, for an attacker, is to enter an organisation with the key to the door itself, users’ passwords.

Read more...
The what, who and why of RBAC
Access & Identity Management Handbook 2015, Information Security
In the world of identity and access management, Role-Based Access Control is gradually becoming a frequently used term.

Read more...
Secure education environment
Access & Identity Management Handbook 2015, Paxton, Education (Industry)
The school was looking for a system that could be instantly switched into lockdown and flexible enough to manage the movement of students and changing schedules of a busy school.

Read more...
Nigeria opts for Turnstar access controls
Access & Identity Management Handbook 2015, Turnstar Systems
Turnstar supplies high-security Nigerian facility with turnstiles and automatic traffic bollards.

Read more...
Petcare time and attendance
Access & Identity Management Handbook 2015
Econz Wireless pilots Timecard GPS for Marltons Pet Care Products.

Read more...
Rinsing errors out of T&A
Access & Identity Management Handbook 2015
AWM360 provides technical efficiency for time and attendance tracking for ­Johannesburg Water.

Read more...
Ghana Ports Authority opts for Turnstar
Access & Identity Management Handbook 2015, Turnstar Systems
The Ghana Ports and Harbours Authority ordered Speedstile Express lanes from Turnstar to control access into the various buildings within the organisation’s compound.

Read more...
Gatwick Airport upgrades access
Access & Identity Management Handbook 2015, Johnson Controls - (Tyco Security Products), Integrated Solutions
The CEM AC2000 Airport system at Gatwick has been expanded to include an ­additional 260 CEM S600 card readers to provide access control and monitoring at Pier 6 including control of common use passenger lifts.

Read more...
Museum secures its history
Access & Identity Management Handbook 2015, Bosch Building Technologies, Surveillance, Fire & Safety
Preserving a thousand years of life, Museum of the History of Polish Jews secured by Bosch.

Read more...
AfriSam takes WFM into Africa
Access & Identity Management Handbook 2015
AfriSam to expand WFM solution in Africa using Kaba technology.

Read more...
HQ calls for integrated security
Access & Identity Management Handbook 2015
Honeywell integrated solution controls access for multi-tenant building in London.

Read more...
Access module eases admittance
Access & Identity Management Handbook 2015, Milestone Systems, Surveillance
Milestone access control solution with Axis products secures commercial premises controlled by Milestone XProtect Professional.

Read more...
Keeping guests safe at City Lodge
Access & Identity Management Handbook 2015, Centurion Systems
Waterfall City Lodge upgrades access control system with Bsuresec and ­Centurion.

Read more...



<< First   < Previous   Page 76 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.