Access Control & Identity Management



Panasonic’s Face Recognition Server
Access & Identity Management Handbook 2019, Surveillance, Products & Solutions
Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.

Read more...
A better approach to fingerprint biometrics
Access & Identity Management Handbook 2019, Editor's Choice
Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.

Read more...
Your face tells a story
Access & Identity Management Handbook 2019, Technews Publishing, Surveillance, Government and Parastatal (Industry)
Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.

Read more...
Key components of access control
Access & Identity Management Handbook 2019, Paxton, Integrated Solutions
Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.

Read more...
The right access decisions
Access & Identity Management Handbook 2019, Technews Publishing, Editor's Choice
Making the right access control decision depends on what you want secured and how secure it should be.

Read more...
IP is no stranger to access control
Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions, Infrastructure
Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).

Read more...
Applying the SaaS model to access control
Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions
The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.

Read more...
Cloud-based access control
Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions
Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.

Read more...
Controlling access in the cloud
Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions
In the access control arena, hosted or managed services have been around for a few years, and the adoption of cloud-based access control only continues to grow as companies become more and more open to the idea of relying on it to perform such a vital function within their business.

Read more...
They sure don’t make them like they used to
Access & Identity Management Handbook 2019, Technews Publishing, Surveillance, Integrated Solutions
The latest offerings in the market with respect to doorbells and intercoms, and what functionality they offer.

Read more...
Integrating access with OHS and operations
Access & Identity Management Handbook 2019, Veracitech, Integrated Solutions
Veracitech has developed access control plug-ins on the Babylon platform to add certifications and key management decision-making to traditional access control.

Read more...
Questions on workforce management
Access & Identity Management Handbook 2019, Technews Publishing
To find out a little more about workforce management today, Hi-Tech Security Solutions asked Paul Chari from dormakaba for his insights.

Read more...
43 years of workforce optimisation
Access & Identity Management Handbook 2019
Workforce management solutions empower organisations to track the relation between productivity outputs and the cost of employment, as well as the health and safety of its workforce.

Read more...
Video-based parking management
Access & Identity Management Handbook 2019, Surveillance, Integrated Solutions
Using surveillance video for vehicle counting improves parking management at an attractive cost and limited installation hassles.

Read more...
Deploying an integrated access control solution
Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions
The challenge of controlling access into premises and then controlling where staff and visitors go within the premises is one that requires careful consideration and planning.

Read more...
Identifying good visitor management practices
Access & Identity Management Handbook 2019, Excellent ID, Asset Management
There are a number of factors that security managers need to consider when implementing visitor management and access control protocols.

Read more...
Reliability a fundamental in visitor management
Access & Identity Management Handbook 2019, Integrated Solutions, Security Services & Risk Management
With the rapid evolution of biometric technology, there are many options available in the marketplace that promise varying levels of performance.

Read more...
Digital channels and the evolution of ID
Access & Identity Management Handbook 2019, Editor's Choice, Infrastructure
While the concept of identity (ID) remains unchanged, the rapid evolution of digital technology has dramatically extended both its application and form factor.

Read more...
Using tomorrow’s tools to solve ­today’s security problems
Access & Identity Management Handbook 2019, Information Security, Integrated Solutions
It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.

Read more...
Fingerprints protect privacy for AIDS testing
Access & Identity Management Handbook 2019, Editor's Choice
A creative, progressive NGO uses biometric fingerprint scanning to redefine confidentiality and AIDS treatment in South Africa.

Read more...



<< First   < Previous   Page 39 of 174   Next >   Last >>