Access Control & Identity Management



NFC works well with biometrics
Access & Identity Management Handbook 2014, HID Global
These days, more biometric templates are being carried inside an NFC-enabled smart phone along with other digital ID credentials for physical and logical access control.

Read more...
Cost effective access control system for residential estate
Access & Identity Management Handbook 2014
The system from Comb Communications allows the security staff and residents at the complex to see who has provided access to visitors in a complete report that includes duration, times and the unit number.

Read more...
Securing the island of Eden
Access & Identity Management Handbook 2014
EIDC was appointed by the VMA to install, amongst other things, the access control solution for the Eden Island Residential Estate.

Read more...
Integrated estate access
Access & Identity Management Handbook 2014, Impro Technologies
Impro Technologies optimised an automated access control solution for all entering and exiting through the six entrances of the two estates.

Read more...
Speedy access to luxury
Access & Identity Management Handbook 2014, Asset Management
The visitor management and processing system comprises an Impro IXP400i system with customised visitor management back-end system as well as 22 Sagem MA500 biometric fingerprint readers and 16 Impro keypads attached to Impro iTRT controllers.

Read more...
Safe banking in Ghana
Access & Identity Management Handbook 2014, Turnstar Systems
African bank turns to Turnstar for security and easy flow of customers. The Turnstar Man-Trap security booths have been installed at the main entrances to the bank’s key branches.

Read more...
Auckland Airport chooses AC2000
Access & Identity Management Handbook 2014, Johnson Controls - (Tyco Security Products)
CEM Systems, part of Tyco Security Products, has announced it has been awarded the contract to secure Auckland Airport. The CEM AC2000 security management system will be installed to ensure the highest level of security.

Read more...
Anglo American Platinum grants VIP access with facial biometrics
Access & Identity Management Handbook 2014
Facial biometric project makes the grade at Anglo head office in Johannesburg. The solution secures the environment by ensuring that only authorised personnel are allowed in a particular area.

Read more...
Controlling access at UAE’s second largest mall
Access & Identity Management Handbook 2014, Turnstar Systems
The harsh climatic conditions including constant salty sea spray and dust from the physical construction work, coupled with the rough handling by the workers, meant that the initial turnstiles, supplied by a Far East manufacturer, failed to perform to specification.

Read more...
Turnstiles manage the smooth flow of people
Access & Identity Management Handbook 2014, Gunnebo Safe Storage Africa
Gunnebo turnstiles installed in Middle Eastern stadiums for the FIFA world cup. The Shaikh Khalifa Sports City was a new venue which used 14 RotaTech FH Stadia turnstiles. The King Saud University Stadium order for 32 RotaTech FH Stadia turnstiles was based on the successful implementation of the turnstiles at the other two stadia.

Read more...
Biometric and Access Selection Guides
Access & Identity Management Handbook 2014, Technews Publishing
Click here to see the Biometric Selection Guide http://www.securitysa.com/6279r Click here to see the Access Selection Guide http://www.securitysa.com/7889a

Read more...
Biometrics Selection Guide
Access & Identity Management Handbook 2014, Biometrics Selection Guide
AWM360 Data Systems       Device/Solution: B-Web 93 20    Manufacturer/brand name: Kaba    Distributor/Supplier: AWM360 Data Systems    Biometric technology: Fingerprint    Hardware description: The new B-web 93 ...

Read more...
BT makes the right call on security
Access & Identity Management Handbook 2014, Traka Africa
Management systems from Traka are being used by BT to track keys at its £90m data centre. Operations at the centre are supported by stringent security measures which ensure access to and use of site keys has clear audit trail capability.

Read more...
On track with access control
Access & Identity Management Handbook 2014
The new multi-storey premises being constructed for a major transportation company in Midrand required a reliable access control system for the 100 employees as well as visitors.

Read more...
Dairy-based access control
Access & Identity Management Handbook 2014, Johnson Controls - (Tyco Security Products)
Honeydew Dairies has selected CEM’s AC2000 Lite security management system to secure its factory and warehousing facilities in Nottingham Road, South Africa. The system was supplied by CEM Approved Distributor, Mustek and installed by CEM Installer Brandfin Trade.

Read more...
Centralising Telkom’s national security access system
Access & Identity Management Handbook 2014
A solution of this magnitude is primarily dependent on a team that is fully conversant with IT and communication networks with the ability to adapt to an ever-evolving landscape such as cloud-based servers and virtual environments.

Read more...
Compliance with detention centre rules and policies
Access & Identity Management Handbook 2014
Detention Centre follows strict guidelines, policies and procedures to ensure that security and control of the facility are maintained by using the Morse Watchmans KeyWatcher key control and management system.

Read more...
Security intelligence at the edge
Access & Identity Management Handbook 2014, Johnson Controls - (Tyco Security Products)
emerald is an evolution of the traditional access control reader. It offers advanced access control reader functionality, integrated Voice over IP (VoIP) intercom and a range of remote server-based applications.

Read more...
Wireless access to remote sites
Access & Identity Management Handbook 2014, Transaction Control Technologies
The Supra TRACcess system, available from Transaction Control Technologies (TCT), makes it possible to manage access control in sensitive widespread areas. The wireless system reduces the risks and expenses associated with managing physical keys.

Read more...
Versatile local biometric device
Access & Identity Management Handbook 2014, Elvey Security Technologies
Whereas most other biometric readers require the input of a back-end system to make decisions, the iPB7 can make complex decisions in offline mode without intervention from a traditional controller or server.

Read more...



<< First   < Previous   Page 93 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.