Largest integrated access control solution February 2011, Gallagher, Integrated Solutions Controlling 736 doors and 841 access zones unobtrusively requires seamless integration of technology.
Reliance Infocomm HQ, Petroleum HQ, National HQ and a number of other organisations are based at ...
Securing Nelson Mandela Bay February 2011 iPulse technology features in FIFA World Cup success story.
Aurecon was responsible for the design, implementation, training, staffing, operation and maintenance of the Nelson Mandela Bay (NMB) Transport ...
Technology, people on the move February 2011, Ideco Biometrics Access control and regulation of resources are cornerstones of modern commercial security strategies and are driving growth within ICT infrastructure solution development and implementation. Experts in ...
Biometrics: hype or hope? February 2011, Ideco Biometrics The ongoing adoption of biometrics has been driven by traditional applications such as access control; time and attendance; protecting access to devices, networks and IP; and using authentic identities ...
The many faces of access and identity Access & Identity Management Handbook 2011, Technews Publishing Compare the first Access Control Handbook and this version of the Access & Identity Management Handbook and you cannot help but notice how far the industry has evolved over the years. Not only has technology ...
A can of identity worms Access & Identity Management Handbook 2011, Technews Publishing (SA Instrumentation & Control) The thing with identity management is every person has an opinion, and they are all right.
Hi-Tech Security Solutions recently asked a few industry experts to join our round-table discussing identity ...
The three Ps of identity management Access & Identity Management Handbook 2011, Ideco Biometrics Marius Coetzee, COO, Ideco Biometric Security Solutions says an effective identity and access management solution must involve people, possessions and processes.
The many access and identity management ...
Identity management best practice planning Access & Identity Management Handbook 2011 Best practices, insights and recommendations. A Novell technical white paper.
Given its complexity, breadth, implications and importance, the phrase 'do not attempt this at home' might well apply to ...
Too complex, too rigid, too expensive and out of date? Access & Identity Management Handbook 2011, Fourier IT Innovation Hi-Tech Security Solutions spoke to Charlie Stewart of SuperVision Biometric Systems about the current state of identity management and the directions it is likely to take in the future.
To begin, Stewart ...
Automated identity? Access & Identity Management Handbook 2011 Ugan Naidoo, MD Security, CA Southern Africa discusses how effective service management processes help organisations build a solid IT infrastructure for delivering high quality services.
Identity and ...
Individual access and privacy controls Access & Identity Management Handbook 2011 ATEC’s i-Dentifid keeps both estates and the privacy of individuals secure.
Reports in the press around the identity verification solutions used by certain residential estates, as well as their potential ...
Taking biometrics beyond the door Access & Identity Management Handbook 2011 Conventional biometrics relies on unobstructed, complete and unrealistic contact between fingerprint and sensor.
For many years now, the promise of biometrics has not been fully realised in large part ...
The future for smartcards Access & Identity Management Handbook 2011, HID Global Access all areas.
For many of us, smartcards are now part of our daily lives. We rely on their technology to use transport systems, gain access into our office buildings and give us access to networked ...
Web-based access control Access & Identity Management Handbook 2011, Elvey Security Technologies Staying in control of your building wherever you are.
“The fundamentals of good security have not changed, even if the technology has,” says Ingo Mutinelli, national sales manager for Elvey Security ...
Web-based technology offers access for all Access & Identity Management Handbook 2011 Jeremy Kimber, channel marketing leader EMEA, Honeywell Systems Group, explains the benefits of Web-based access control.
Access control has long been a pillar of the security industry, but it was historically ...
The biometric route to improved access control Access & Identity Management Handbook 2011 Biometrics is not the silver bullet some would have you believe.
The choice of what technology to use in order to bolster access control in business warrants serious consideration – especially given ...
Biometrics and identity on the international stage Access & Identity Management Handbook 2011 At the recent Citizen ID conference held in Sandton, industry experts presented to stakeholders on current use and implementation of biometrics as a tool for security and identification. One such speaker ...
Securing access control and ID management Access & Identity Management Handbook 2011 Smartcard identity solutions are converging with biometrics for uncompromised physical and logical security.
The security industry, as with most industries affected by advancements in technology, is ...
Preventing biometric breakdown Access & Identity Management Handbook 2011, Regal Distributors SA Michael Horvitch, technical advisor at Regal Security, discusses some solutions for preventing biometric reader tampering and destruction.
The past few years have seen a steady increase in the demand ...
Carbon footprint Access & Identity Management Handbook 2011, G2 Security Energy-efficient access solutions are the way forward.
There is a common perception that the security industry is fairly recession-proof. The theory goes that when there is an economic downturn, crime ...