Access & Identity Management Handbook

Biometrics Selection Guide 2020
Access & Identity Management Handbook 2020, Biometrics Selection Guide


Read more...
Biometrics Selection Guide
October 2014, Biometrics Selection Guide


Read more...
Access Selection Guide
October 2014, Access Selection Guide


Read more...
Access and Identity Management Providers
October 2014, Access Control & Identity Management


Read more...
A vault in the cloud
October 2014, Access Control & Identity Management
Fides Cloud is taking identity control and making it simple and secure in the cloud, empowering individuals and companies to securely store and share sensitive information.

Read more...
Top 3 global mechanical lock trends
October 2014, Access Control & Identity Management
IHS estimates the world market to be valued at $5.2 billion in 2013, which includes products such as electromagnetic locks, electric strikes, mechanical locks, exit devices, and accessories.

Read more...
Simple keys are going the way of the fax machine
October 2014, Access Control & Identity Management
Advances in technology and security have seen us graduate from standard metal keys to smarter devices, many of them complete with transponders and programmed microchips, while locks have become increasingly sophisticated and secure.

Read more...
Identity and access governance
October 2014, Access Control & Identity Management
Dean Weich discusses the means to enable the right individuals to access the right resources at the right times for the right reasons.

Read more...
Added access control benefits with PT AD
October 2014, Powell Tronics, Access Control & Identity Management
Powell Tronics takes access control one step further with its incorporation of MS Active Directory into the ImproNet access control system.

Read more...
Of fuzzy logic and fusion engines
October 2014, Access Control & Identity Management
The post-modern Sherlock Holmes would do well to have identity search and match capabilities in his Watson that can do fuzzy logic and fusion engines, all in one.

Read more...
Mobile access adoption is growing – with a twist
October 2014, HID Global, Access Control & Identity Management
Today’s secure identity technologies enable organisations to use a combination of smartcards and other smart devices in a growing ecosystem of interoperable products and applications.

Read more...
Integrated border protection in the 21st century
October 2014, Access Control & Identity Management
Border safeguarding is constantly challenged by the ever-changing threats of the 21st century. It is vital to providing a strong defence against external threats such as international terrorism, drugs and foreign disease.

Read more...
Local manufacturing goes international
October 2014, Technews Publishing, Access Control & Identity Management
While there are concerns about the viability of manufacturing in South Africa for the long term; security companies are still committed to the local market, even as their international business grows.

Read more...
The biometric and card market
October 2014, Technews Publishing, Access Control & Identity Management
Biometrics work well, but so do cards. Hi-Tech Security Solutions finds out what the state of the market for these authentication solutions is.

Read more...
      Page 1 of 4   Next >   Last >>