Access Control & Identity Management



You keep on knocking but you can’t come in
Access & Identity Management Handbook 2014, Technews Publishing
What are companies using to control the access of people within their facilities? Are proximity cards still in fashion or has biometric fingerprint technology taken the lead?

Read more...
Visiting visitor management
Access & Identity Management Handbook 2014, Asset Management
As visitor management becomes more important to control who enters a building or business park, we’re seeing more technology being adopted to allow management companies to better control access.

Read more...
The importance of visitor ­management for installers
Access & Identity Management Handbook 2014, HID Global, Asset Management
Many security dealers and integrators overlook visitor management. It doesn’t often carry the high system sales cost of access control or CCTV systems. But the fact is that a modern, professional visitor ...

Read more...
Pitfalls to avoid when migrating to an enterprise solution
Access & Identity Management Handbook 2014, Johnson Controls - (Tyco Security Products)
The main factor to keep in mind when you begin to plan the migration to an enterprise access control solution is preparation. You need to know what resources are available to you, who the key players are to help you in this process, and how to develop a solid plan to get the system up and running successfully.

Read more...
Choose your biometric carefully
Access & Identity Management Handbook 2014, Ideco Biometrics
Biometrics may soon be commonplace in the SA workplace, but do you really know how to select a reliable solution? Marius Coetzee offers practical advice in selecting a biometric solution.

Read more...
Mathematics at the heart of biometrics
Access & Identity Management Handbook 2014
Biometric algorithms are complex logical mathematical equations and the complexity of the algorithm ultimately determines the success of the biometric device.

Read more...
Biometrics and T&A, a match made in heaven
Access & Identity Management Handbook 2014, ERS Biometrics
Time and attendance (T&A) technologies have come a long way from the day when workers clocked in by punching cards on the way into factories. Today biometrics has changed the game and delivered enormous benefits.

Read more...
Using biometrics to beat fraud
Access & Identity Management Handbook 2014
With fraud on the increase in the financial and retail markets, Nick Perkins from Bytes talks about the BNT acquisition and the identity life cycle.

Read more...
Access and surveillance integrated
Access & Identity Management Handbook 2014, neaMetrics, Asset Management
SmartProtect links all access control events from BioStar (Suprema’s access control management system) to Milestone, linking specific camera feeds to Suprema access readers. The SmartProtect plug in stores the access events next to the video feed related to accessing the premises.

Read more...
Maturing security market requires value add
Access & Identity Management Handbook 2014, iPulse Systems
Gary Chalmers, CEO of iPulse Systems, spoke to Hi-Tech Security Solutions about the changes he sees the security industry, and specifically the access control industry going through, which are similar to the changes the IT industry went through about 10 years ago.

Read more...
Optimising your workforce
Access & Identity Management Handbook 2014, Technews Publishing, Asset Management
The term Workforce Management is becoming more common in the security industry as more companies integrate technologies and processes to gain operational and cost efficiencies. But what does workforce management entail?

Read more...
Selling biometrics to your employees
Access & Identity Management Handbook 2014, Uniclox
In some cases, companies implementing biometrics will initially receive employee resistance with the issues of privacy and hygiene taking centre stage. This will invariably be the case if a union is involved and looking for negotiating points.

Read more...
The business of identity
Access & Identity Management Handbook 2014
How to reduce risk and accelerate and secure business processes throughout the workplace by applying the fundamental rules that drive identity management.

Read more...
Managing identity in the workplace
Access & Identity Management Handbook 2014
Accurate identity authentication simply has to be the foundation for accurate identity management. If we can’t positively identify people, then what hope do we have for managing their access and activities?

Read more...
Biometric fingerprint technology still dominates
Access & Identity Management Handbook 2014, ZKTeco
While biometric facial recognition access technology is gaining some ground in the market, fingerprint technology continues to retain a 90% share. The biggest obstacles to the ready adoption of facial recognition technology, after its price, are the physical restraints.

Read more...
Business-driven IAM
Access & Identity Management Handbook 2014
This white paper by RSA Aveksa, explains why today’s IAM systems fail to properly reflect business context, describes why embracing business-driven identity and access management (BDIAM) reduces costs while increasing security, and describes a step-by-step methodology for implementing it.

Read more...
Enemy at the gates
Access & Identity Management Handbook 2014
The potential for unauthorised access to sensitive data and intellectual property presents a constant, pervasive threat to the brand equity, competitive posture and reputation of any enterprise.

Read more...
Trust but verify
Access & Identity Management Handbook 2014, HID Global
The term "trust but verify" captures the practical reality of a world in which so many of our interactions occur online and we need mechanisms to verify the identity of the entities with whom we interact.

Read more...
Protecting critical infrastructure with IP surveillance
Access & Identity Management Handbook 2014, Axis Communications SA
A system that permits supervision of all processes, video surveillance, intrusion protection and access control from remote sites, several locations and if needed into one centrally located control room.

Read more...
Opening the door to global standards in access control
Access & Identity Management Handbook 2014
Profile C will provide common language enabling a system that allows IP door controllers to browse devices, creating a list of types of readers and connections, and subscribe to card reader and door controller events.

Read more...



<< First   < Previous   Page 92 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.