Access Control & Identity Management



Pepkor opts for turnstile access
Access & Identity Management Handbook 2013, Turnstar Systems, Industrial (Industry)
Theft and time and attendance fraud had to be limited. However, the access control solution should not hinder the day-to-day operations of the warehouse, nor the flow of goods through the distribution centre.

Read more...
Integrated access roars with flavour
Access & Identity Management Handbook 2013, Industrial (Industry)
Bytes Systems Integration continues to expand business benefits for Pepsico Simba from implementing access control and attendance management solution for production units.

Read more...
Back to school
Access & Identity Management Handbook 2013, Information Security, Infrastructure, Education (Industry)
Somerset College selected Impronet and Morpho biometrics to control access to facilities.

Read more...
New York City Transit
Access & Identity Management Handbook 2013
New York City Transit automated identity management for 85 000 users and provided single sign-on access to applications. The agency has 49 000 employees across 500 locations, and also manages benefits for 36 000 retirees and spouses.

Read more...
Hospital access controlled
Access & Identity Management Handbook 2013, Healthcare (Industry)
HID Global’s network access control solution provides centralised management and advanced access level settings to improve the overall security at First Affiliated Hospital of Jinan University in Guangzhou, China.

Read more...
Ministry of Finance, Nigeria
Access & Identity Management Handbook 2013, Tyco Security Products - Johnson Controls
AC2000 SE offers the Ministry of Finance a fully integrated and comprehensive access control, alarms processing, and photo ID badging system. The system comes with a suite of applications including AC2000 VIPPS (Visual Imaging Pass Production System).

Read more...
Wireless IP security system
Access & Identity Management Handbook 2013, Integrated Solutions, Industrial (Industry)
Air Products needed a single partner to manage the roll out of security upgrades to 25 sites across eight countries in mainland Europe. All the sites are operating facilities with live process systems, significant large vehicle traffic and, often, thousands of cylinder movements.

Read more...
Electrical time and attendance in an integrated solution
Access & Identity Management Handbook 2013, Industrial (Industry)
Time and attendance and integrated security system for a major electricity generator comprised smart card visitor management, time and attendance and access control including automatic door monitoring and fire roll call monitoring.

Read more...
Taking IAM to the next level
Access & Identity Management Handbook 2013
Today, decision-makers can be less concerned about whether technology works and more interested in how access control can be integrated into identity management systems for goals beyond the simple transaction of opening a door.

Read more...
Welcome to the identity revolution
September 2012, Ideco Biometrics
As we all know, dynamite comes in small packages. Right now, a new South African product – and a world first - is about to have an explosive impact in the world of Identity Control.

Read more...
International airline chooses BioLite
September 2012, neaMetrics, Suprema
When a large international airline relocated to larger premises in Sandton this year, it required a high level of security for their staff and IT infrastructure. The Suprema BioLite Net is an IP-based fingerprint terminal with time, attendance and access control capabilities.

Read more...
The maintenance of biometric equipment is vital to its effective use
September 2012
Biometric technology has become an integral part of many of the access control, security, asset protection and risk management systems commonly used by businesses today. The benefits are significant, ...

Read more...
Automate T&A to focus on strategy
September 2012
Experts in the field of business management solutions and application believe it is important for companies to use advanced systems in order to free up the time of decision makers and allow them to focus on client service.

Read more...
Steria secures offices with CEM access control
September 2012, Tyco Security Products - Johnson Controls
CEM Systems supplied Steria UK with AC2000 SE (Standard Edition) access control and security management solution. Since its original installation, CEM’s AC2000 SE has grown and expanded to match the success and growth of Steria within the UK.

Read more...
Mobile application for biometrics
September 2012
The ViRDI Smart-i biometric reader from Virdi Distribution is a solution for applications where a dedicated network is unavailable. Designed for use with Android mobile devices and iPhones, the Smart-i utilises iUNIS software to capture and manage system users.

Read more...
Virtual credentials
August 2012
For decades, we have carried our identities around on magnetic stripe (magstripe) and smart cards, but in today’s mobile world, we now have the opportunity to embed them on a variety of portable devices.

Read more...
Fike protects Tanzanian hotels from fire
August 2012
When the Dafoudill Company in Dar es Salaam, Tanzania, was asked to provide a fire alarm installation for a retail development attached to the city’s most prestigious five-star hotel, it chose a solution based on the Fike Quadnet addressable system.

Read more...
FingerTec going places in Angola
August 2012
FingerTec is now being implemented in the transportation industry, specifically the Luanda’s Urban Public Transport Firm known as Transporte Colectivo Urbano de Luanda or TCUL.

Read more...
IXP220 for protection of medical facilities
August 2012, Elvey Security Technologies , Healthcare (Industry)
Vulnerable to a range of crimes, including assaults on personnel and the theft of drugs, equipment and confidential patient information, modern medical facilities are a challenge to secure.

Read more...
Wireless access in healthcare
August 2012, Healthcare (Industry)
Access control and security in healthcare facilities has its unique challenges, largely due to the presence of large people flow which makes it difficult in many cases to control access and identify trespassers.

Read more...



<< First   < Previous   Page 96 of 174   Next >   Last >>