Access Control & Identity Management



Multimodal biometrics
Access & Identity Management Handbook 2006
Biometrics measure an individual’s unique physical or behavioural characteristics, as a means to recognise or authenticate their identity. Common physical biometrics includes fingerprints; hand or palm ...

Read more...
Integration: access control with digital surveillance
Access & Identity Management Handbook 2006
The ‘convergence trend’ taking place in the security industry brings with it a host of really interesting market developments. Fuelled by a general awareness of information technology the market is ...

Read more...
Intelligent buildings make intelligent security possible
Access & Identity Management Handbook 2006, Schneider Electric South Africa
Comfort, safety and security in ­commercial buildings are not 'nice-to-haves'. They are essential to worker satisfaction and demanded for commercial buildings everywhere. Architects, developers and ...

Read more...
The total opening - an electrifying proposition
November 2006
Tying together access control, egress safety, data mining, building ­management and more makes financial and security sense. The growing sophistication and broader spectrum of choices available ...

Read more...
Vein scanning - undisputed identification and authentication
Access & Identity Management Handbook 2006
The use of biometrics is unlimited and highly accurate. Among many others, it provides the solution to eliminate fraud with drivers' licences, ID documents, passports and confidential records such as ...

Read more...
Alternative to biometrics
Access & Identity Management Handbook 2006
If a sophisticated biometric-based access control solution is beyond your budget, do not despair: it is likely you can achieve a similar level of security using a carefully designed but less costly ­card-based ...

Read more...
Automated access and parking for office buildings
Access & Identity Management Handbook 2006
Expanding business opportunities create a need to provide secure facilities and safeguard people and property. From the most heavily trafficked facilities to the loneliest, out-of-the-way places, the ...

Read more...
Keeping up with the Joneses
Access & Identity Management Handbook 2006
Growthpoint Office Park in Midrand is a busy place, with over 2500 tenants and visitors requiring entry and exit every day.       The history The main issues confronting Growthpoint were security, the ...

Read more...
Automated access and parking for university campuses
Access & Identity Management Handbook 2006
Safety and security on American ­campuses is a topic of wide US national debate these days – there was a case in the last week of September in which ­students were held hostage and one young woman lost ...

Read more...
Residents only!
Access & Identity Management Handbook 2006
The history The Cape Peninsula University of Technology (CPUT) was experiencing a major problem at one of its student residences, the temporary home of 865 students, because some students were bringing ...

Read more...
Automated access and parking for medical centre campuses
Access & Identity Management Handbook 2006
Designing and implementing a ­comprehensive parking and security ­control system for medical centres is a fascinating and challenging assignment. The system has to be reliable, secure and user-friendly. Several ...

Read more...
Network technology improves hospital security
Access & Identity Management Handbook 2006
NAMC required higher levels of security than were already in place, but, like most healthcare organisations, also needed to find ways to manage costs.       The history Securing a facility that covers ...

Read more...
Biometrics vs passwords: passwords - a weak link in an organisation's IT security
Access & Identity Management Handbook 2006
People tend to use short and easy-to-­remember passwords as they do not wish to be troubled each time they gain access to a system. Biometric technology uses one or more physical identifiers to determine ...

Read more...
Security, right from the start
Access & Identity Management Handbook 2006, Pentagon Distribution, Impro Technologies
IT companies have a greater need for security than most, so when a Cape Town-based company specialising in e-commerce and Internet solutions for a global client base, decided to build a new three-storey­building ...

Read more...
Smartcards
Access & Identity Management Handbook 2006
Smartcards provide a convergence link between physical and IT security. When companies let partners, customers and suppliers connect to their networks, they open themselves to illegitimate access and ...

Read more...
Turnkey solution
Access & Identity Management Handbook 2006
Meatco, Namibia’s leading processed meat exporter, recently upgraded its time and access systems to meet new ­business challenges. European Union (EU) health standards now require stringent access control ...

Read more...
T&A and access covered
Access & Identity Management Handbook 2006
The history Based in Umgeni Road, Durban, Ninian & Lester, manufacturer of the Jockey brand, has 850 employees. Factory staff were clocking in and out at old manual clocking machines. Calculating these ...

Read more...
Staying ahead of the curve
Access & Identity Management Handbook 2006
The history Brits-based furniture manufacturer, Pat Cornick, a division of Steinhoff Africa, wanted to upgrade its card-based access control (AC) and time and attendance (T&A) systems because new technology ...

Read more...
A stitch in time
Access & Identity Management Handbook 2006
The history Aluvert, a large manufacturer of a variety of blinds, is located on the edge of the Johannesburg CBD. The company was experiencing huge problems with staff time-keeping. Besides late-coming, ...

Read more...
Strong combination
Access & Identity Management Handbook 2006
The history Macsteel, a formidable player in the steel industry, and the largest non-listed company in South Africa, has an ongoing interest in the best technology for security and workforce management ...

Read more...



<< First   < Previous   Page 131 of 179   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.