Network technology improves hospital security Access & Identity Management Handbook 2006 NAMC required higher levels of security than were already in place, but, like most healthcare organisations, also needed to find ways to manage costs. The history
Securing a facility that covers ...
Biometrics vs passwords: passwords - a weak link in an organisation's IT security Access & Identity Management Handbook 2006 People tend to use short and easy-to-remember passwords as they do not wish to be troubled each time they gain access to a system.
Biometric technology uses one or more physical identifiers to determine ...
Security, right from the start Access & Identity Management Handbook 2006, Pentagon Distribution, Impro Technologies IT companies have a greater need for security than most, so when a Cape Town-based company specialising in e-commerce and Internet solutions for a global client base, decided to build a new three-storeybuilding ...
Smartcards Access & Identity Management Handbook 2006 Smartcards provide a convergence link between physical and IT security.
When companies let partners, customers and suppliers connect to their networks, they open themselves to illegitimate access and ...
Turnkey solution Access & Identity Management Handbook 2006 Meatco, Namibia’s leading processed meat exporter, recently upgraded its time and access systems to meet new business challenges.
European Union (EU) health standards now require stringent access control ...
T&A and access covered Access & Identity Management Handbook 2006 The history
Based in Umgeni Road, Durban, Ninian & Lester, manufacturer of the Jockey brand, has 850 employees. Factory staff were clocking in and out at old manual clocking machines. Calculating these ...
Staying ahead of the curve Access & Identity Management Handbook 2006 The history
Brits-based furniture manufacturer, Pat Cornick, a division of Steinhoff Africa, wanted to upgrade its card-based access control (AC) and time and attendance (T&A) systems because new technology ...
A stitch in time Access & Identity Management Handbook 2006 The history
Aluvert, a large manufacturer of a variety of blinds, is located on the edge of the Johannesburg CBD. The company was experiencing huge problems with staff time-keeping. Besides late-coming, ...
Strong combination Access & Identity Management Handbook 2006 The history
Macsteel, a formidable player in the steel industry, and the largest non-listed company in South Africa, has an ongoing interest in the best technology for security and workforce management ...
Precious metals, precious lives Access & Identity Management Handbook 2006 Steve Conradie, head of asset protection at Anglo Gold Ashanti, explains the difficulties faced by mines, and the importance of controlling the access of people into the mines – for safety as well as ...
Maintaining security and safety Access & Identity Management Handbook 2006 Security and access control (AC) has always been a major focus for Lonmin, the world's third largest platinum producer, with four operational mines in South Africa and over 26 000 employees. The history...
Security Port of Tauranga Access & Identity Management Handbook 2006, Gallagher At the front line of the supply chain, ports have a critical role to maintain the credibility of their country as secure trading partners. The history
New Zealand's preferred export gateway and ...
Tracking of the containers Access & Identity Management Handbook 2006, Turnstar Systems The major challenges facing SETV, a division of European-based Bollerey PLC, when it took over the operation of the container terminals from the Ivory Coast Ports authorities, subsequent to the privatisation ...
The new lager Access & Identity Management Handbook 2006 Under the previous government, the story of the Voortrekkers was mercilessly driven into the brains of impressionable youngsters.
Of the things we were taught was the concept of the lager, in which ...
Property protection Access & Identity Management Handbook 2006 Ithemba Property Trust 2 is a property development company based in Berea, Johannesburg, with several residential properties in the Johannesburg CBD. The history
Crime, overcrowding and hijacking ...
Directing heavy traffic Access & Identity Management Handbook 2006 The sheer volume of stock moving through Vector Logistics, a wholly-owned subsidiary of Rainbow Farms, is on a scale that defies imagination.
Vector provides specialist logistic services to the food ...
Farmstyle T&A Access & Identity Management Handbook 2006 Manjoh Ranch is a farm in the Nigel area whose main activities are growing mielies and breeding cattle. The farm also has a mill that is used to convert some of the maize into various products. The ...
Extinguishing the fire Access & Identity Management Handbook 2006 The City of Johannesburg’s Emergency Management Services (EMS) recently installed a state-of-the-art time and attendance (T&A) solution system for all its fire stations. The history
EMS consists ...
Safeguarding a sanctuary Access & Identity Management Handbook 2006 The history
Hatfield Christian Church in Pretoria had been experiencing theft and vandalism in spite of having a full time security company on site. In addition, venues and equipment were being misused.
"We ...
Integrating T&A Access & Identity Management Handbook 2006 The history
Steinmüller Engineering Services, a member of the Babcock Borsig Service Group, decided in 2005 to seek a time and attendance (T&A) solution that could meet the complex needs of the company.
The ...