Access Control & Identity Management



Networked access solutions for China
1 November 2012
HID Global completes one of the largest access control deployments in China at Anhui Wantong Expressway Building. Network controllers and contactless smartcard readers enables central monitoring and area control.

Read more...
CCTV puts access control, T&A in the picture
1 November 2012
The inclusion of CCTV monitoring technology as part of a company’s access control and time and attendance strategy is a key emerging trend within business management.

Read more...
C·CURE 9000 integrates with Elpas
October 2012, Johnson Controls - (Tyco Security Products)
Software House, part of Tyco Security Products, has announced the integration of the Elpas Active RFID/RTLS system with the C·CURE 9000 access control and event management system, providing a cost-effective solution to protect the safety of individuals and secure valuable assets.

Read more...
Boxed identity management
October 2012
Brand New Technologies has now announced it has secured the rights to incorporate the Lumidigm Multi Spectral Imaging (MSI) fingerprint sensor into GreenBox.

Read more...
Student access with NFC
October 2012
SALTO Systems in collaboration with partners Banco Santander, Vodafone, Gemalto and the public local government, have launched a pilot project at the University Católica of Murcia (UCAM) that allows staff ...

Read more...
Entry-level access control software
October 2012
Honeywell has announced WIN-PAK XE (Xpress Edition) access control software, the latest addition to its WIN-PAK access control software family and suitable for businesses that require access control functionality ...

Read more...
The new age of access control
Access & Identity Management Handbook 2013, Bosch Building Technologies
Access control has become a vital component of any security concept worldwide. However, operated in isolation from other safety and security systems, even the most sophisticated access control system cannot live up to its promises.

Read more...
Biometrics by the book
Access & Identity Management Handbook 2013, Technews Publishing
All biometric readers are not created equal. Hi-Tech Security Solutions spoke to Marius Coetzee to find out more about how end users should be choosing biometric readers.

Read more...
Make the right biometric choice
Access & Identity Management Handbook 2013, Ideco Biometrics
Fingerprint biometrics are now an established feature in access control and time and attendance (T&A) systems at thousands of organisations across southern Africa. Marius Coetzee, MD of SA’s largest supplier of biometric technology, Ideco Biometric Security Solutions, offers advice on how to maximise your returns on an investment in biometrics.

Read more...
Selecting the right biometric technology for your needs
Access & Identity Management Handbook 2013, IDEMIA
Biometrics can offer great convenience of use, increased security and accuracy, decrease in fraud, and great return on investment (ROI). However, each biometric has its pros and cons and one need to carefully select an adapted technology depending on the specific end-user needs.

Read more...
Biometric myth busting
Access & Identity Management Handbook 2013, Fourier IT Innovation, Mining (Industry)
Biometrics may now be commonplace in the South African workplace, but do you really know enough about them? There is still a big gap between perception and reality.

Read more...
Identity and access governance, a future in the cloud
Access & Identity Management Handbook 2013
Identity and access governance (IAG) solutions may seem like a burden brought on by increasing regulation and compliance issues, but when used effectively, IAG solutions become the catalyst to meet the challenges of a complex and changing world.

Read more...
Face it
Access & Identity Management Handbook 2013, neaMetrics
Variations in background illumination have been one of the main challenges for practical face recognition systems. Variations of the same face due to illumination are generally greater than the variations of different face identities.

Read more...
The changing face of access control
Access & Identity Management Handbook 2013, Johnson Controls - (Tyco Security Products)
Many experts predict that in a few short years, the effects of the software-as-a-service (SaaS) model on the security industry will be just as transformative as it was on IT, as it rapidly gains acceptance among end users, dealers and integrators and manufacturers.

Read more...
Balancing security and convenience to beat fraud
Access & Identity Management Handbook 2013
Financial institutions walk a fine line between convenience, security, and cost when it comes to preventing fraud. Ugan Naidoo, head of security solutions, CA Southern Africa, explores how Web-based fraud detection and risk-based authentication solutions stop real-time fraud in its tracks—without unnecessary friction for genuine users.

Read more...
Foolproof fingerprint detection
Access & Identity Management Handbook 2013
Programmes like Myth Busters, Nikita and CSI screen information on how to produce and use a fake fingerprint. Stories of students with time on their hands using these methodologies to access supposedly secure locations abound.

Read more...
iCLASS SE implementation and migration
Access & Identity Management Handbook 2013
HID Global iCLASS Secure Identity Object (SIO)-enabled (iCLASS SE) platform delivers trust-based security, improved usability and enhanced performance.

Read more...
Biometrics Buyers' Guide 2013
Access & Identity Management Handbook 2013, Technews Publishing
Regular readers will have seen the Hi-Tech Security Solutions Biometric Buyers’ Guide in various issues over the past few years. This year, we decided to include it in the Access and Identity Management ...

Read more...
Access Control Selection Guide 2013
Access & Identity Management Handbook 2013, Technews Publishing
Once again, space is limited so the suppliers cannot go into detail, but readers will see what potential these devices have to be integrated into existing infrastructures as well as the integration services ...

Read more...
Identity in Africa, the mobile upwards
Access & Identity Management Handbook 2013
In Africa, many more people are likely to reap the benefits of mobile telephony, in many more ways, than any other continent before. It may sound like a contradiction, but these are the facts. Today, a little over 500 million people on the continent, possibly constituting 60% of its population, have a personal mobile connection, in many cases their only institutionalised identification.

Read more...



<< First   < Previous   Page 99 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.