Access Control & Identity Management



Access control, integrated
April 2013
There is no doubt that integration has become something of a buzzword in the security industry in recent years. There is a danger that integration becomes a slightly over-used claim; so what do we actually mean by a term that potentially covers a multitude of definitions and probably means many different things to many different people?

Read more...
Central Bank of Nigeria secured by CEM Systems
May 2013, Financial (Industry)
CEM Systems, from Tyco Security Products, announced that the Central Bank of Nigeria has selected the AC2000 SE (Standard Edition) access control and security management to secure many of its premises ...

Read more...
Smart retail security solutions
May 2013, Centurion Systems
With the wireless slant that security technology has taken, it is possible to create an infrastructure that is highly effective, comprehensive and free from the constraints that, until recently, plagued the industry.

Read more...
More than a digital squiggle
May 2013
There is more to electronic signatures than a business reducing its carbon footprint or complying with corporate governance regulation. Its legal implications are often taken for granted say legal experts.

Read more...
In the palm of your hand
May 2013
Fujitsu launches innovative authentication solutions based on its PalmSecure technology. Italian banking group UniCredit has developed the first commercially-viable biometric payment system, based on PalmSecure.

Read more...
Open integration from Honeywell
May 2013
Honeywell opens up WIN-PAK integrated security platform with new application programming interface. Software enables integration of access control and third party systems on single host platform.

Read more...
Intelligent access terminal
May 2013, Tyco Security Products - Johnson Controls
CEM releases the industry’s most multi functional intelligent IP access terminal. emerald features an IP reader and controller in one, a built in Voice over IP (VoIP) intercom and a range of remote applications, all in one powerful, integrated device.

Read more...
Automated hospital access
May 2013, ASSA ABLOY South Africa
ASSA ABLOY Entrance Systems installed three Besam Unislide mechanisms for automated sliding doors to replace non-functioning doors and allow for easy entrance and access into operating theatres at a hospital based in Limpopo Province, South Africa.

Read more...
Visitor management central to security
April 2013, Technews Publishing
At the end of the day, while visitor management is often seen as a separate component of the security process, it cannot be if the company concerned is to have comprehensive control over its environment. It is, first and foremost, an element of access control and identity management that controls the access and permissions of staff, strangers or infrequent visitors to a site.

Read more...
Biometrics and integration defines commercial security
April 2013, SA Technologies
In South Africa, service providers within the corporate security market are maintaining steady pace with the development of solutions designed to empower businesses to effectively protect their environments. Management ...

Read more...
Barrier chosen for Audi Rivonia
April 2013, Turnstar Systems
Turnstar recently installed two Talon Tyre-Spike Vehicle Barriers at the new Audi Rivonia premises. The 3,5 m barriers are installed flush with the roadway and the double sided spikes offer protection ...

Read more...
A finger on data centre security
April 2013
Security is now a watchword in all data centres, but as Mark Hirst, product manager with Cannon T4 Data Centre Solutions explains, fingerprint biometrics – even at the cabinet level – is now a real contender ...

Read more...
AFGRI enhance building security with Controlsoft
April 2013
Sometimes commonsense statements are more logical than we give them credit for. When authorities began to wonder why motor car crashes killed so many people on our roads, or why there were so many deaths ...

Read more...
Transformer access
April 2013
HID Global announced that its network access control solutions and contactless readers have been selected by Shenyang Transformer Group in China to enable access level settings and area control to prevent ...

Read more...
Kantech releases EntraPass v5.02
April 2013, Tyco Security Products - Johnson Controls
Kantech, part of Tyco Security Products, has introduced the latest version of its flagship EntraPass security software, offering expanded video integration options to assist customers in managing their ...

Read more...
Securing complex sites since 1929
March 2013, Elvey Security Technologies , Government and Parastatal (Industry)
Government institutions are notoriously difficult to secure. They require a specialised system that will ensure the safety and security of employees and the back office while accommodating a constant flow of visitors in and out of the premises without hindering public access or infringing on people’s privacy.

Read more...
Identity and access governance unfurled
March 2013
The need for identity and access governance (IAG) has never been greater.

Read more...
IAM crucial for the cloud
March 2013
Although still in its infancy, the cloud has proved that its flexible, collaborative nature can transform an enterprise overnight. While Gartner recently predicted that 2013 is going to be about the wider adoption of cloud computing, the analyst firm still believes that much of the focus will be on enterprises’ capabilities to put the right levels of security in place to support it.

Read more...
Green savings
March 2013, ASSA ABLOY South Africa
The installation of two Besam ADS Unislide bi-parting units by Pedestrian Door Solutions (PDS), a division of ASSA ABLOY Entrance Systems South Africa, has improved the efficiency of refrigerators and air conditioning at The Hill KwikSpar in Pretoria, Gauteng.

Read more...
Market shift to biometric security
March 2013
In a market in which as much as a quarter of people are unemployed, the issue of crime perpetuated against business remains a concern. It is a primary influence behind the rollout of biometric solutions ...

Read more...



<< First   < Previous   Page 92 of 174   Next >   Last >>