Looking ahead with mobile access technologies Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher, Integrated Solutions Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...
Mobile access is more secure than card systems Access & Identity Management Handbook 2020 The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.
This is the future. This is what we do. Access & Identity Management Handbook 2020, ZKTeco ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.
The security of biometrics Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.
A picture spoofs a thousand cameras Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.
IoT and behavioural authentication Access & Identity Management Handbook 2020, CA Southern Africa IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.
Border crossing and national identification Access & Identity Management Handbook 2020 Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.
Scalable access solution Access & Identity Management Handbook 2020, Integrated Solutions Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.
Integrated security solution Access & Identity Management Handbook 2020, Elvey Security Technologies The ability of access control solutions to seamlessly work with surveillance and building management systems is so important it cannot be overemphasised.
People mobility management Access & Identity Management Handbook 2020, Secutel Technologies Defining, controlling and monitoring entries and exits at each site, zone, floor, area and location is of utmost importance.
Efficient access management Access & Identity Management Handbook 2020, Regal Distributors SA ZKBioSecurity contains multiple integrated modules such as access control, time and attendance, consumption management, elevator control, hotel lock management, visitor management and more.
Process control lockout in the petrochemical industry Access & Identity Management Handbook 2020 Procedures for managing access to, and the maintenance of, pipelines involve processes that control and securely lock out sections. These procedures need to be enforced and rigorously policed.
Visitor management for estates Access & Identity Management Handbook 2020, Powell Tronics, Residential Estate (Industry) Residential estates and business parks around South Africa have installed access control systems that aim to streamline access for both pedestrians and vehicular traffic.
A smarter way to manage access Access & Identity Management Handbook 2020, Genetec ClearID is Genetec’s unified physical identity and access management solution designed for better control of organisational access control policies.
Biometrics in identity Access & Identity Management Handbook 2020, Security Services & Risk Management With multiple identity providers offering to manage digital identities for the general public, the root identity – the single sovereign trusted identity upon which all others are based – must start with government.
Managing the insider threat Access & Identity Management Handbook 2020, CA Southern Africa Gerard King discusses best practices for the management of privileged users in the mainframe environment in a world where the insider threat is always growing.
Waving goodbye to residents’ access cards Access & Identity Management Handbook 2020, IDEMIA Midlands Estate sought to remedy the security risks posed by access cards by enrolling the fingerprints of all its residents, but this proved more challenging than expected.
Access control security at In2Foods Access & Identity Management Handbook 2020, Turnstar Systems It is extremely important, with the pervasive threat of crime, for organisations to protect their perimeters and entry and exit points.