Access & Identity Management Handbook

Improved residential estate security
October 2014, Access Control & Identity Management
EVIM visitor transactions are also recorded, processed and archived in a POPI compliant manner. All data is stored offsite and visitors’ fingerprints are recorded, transmitted and stored in an encrypted format, which cannot be reverse engineered to a latent fingerprint image.

Read more...
Taking control of visitor management
October 2014, Access Control & Identity Management
Residential estate and office park managers are becoming more discerning about the type of visitor management systems they require.

Read more...
Selecting the right audio or video access system
October 2014, Access Control & Identity Management
Best practices for choosing audio and video entry systems. A brief end user and ­installer perspective.

Read more...
Understanding workforce management
October 2014, neaMetrics, Bidvest Protea Coin, Access Control & Identity Management
Hi-Tech Security Solutions asked the experts to tell us more about WFM, what it is, who’s doing it and its growth in the local market.

Read more...
Synerion provides enterprise WFM
October 2014, Access Control & Identity Management
Powell Tronics expands its footprint and complements its access control and T&A offering with Synerion Workforce Management.

Read more...
IP makes the access control grade
October 2014, ZKTeco, Access Control & Identity Management
Hi-Tech Security Solutions examines the continuing trend to build access control ­systems based on IP technology.

Read more...
Hosted and managed access control
October 2014, Tyco Security Products - Johnson Controls, Impro Technologies, Access Control & Identity Management
Do companies do it themselves or do they make use of hosted or managed access control services?

Read more...
Outsmart fakes
October 2014, Ideco Biometrics, Access Control & Identity Management
Do you know exactly how well the ‘fake finger detection’ or ‘liveness detection’ on your biometric solution works? Mark Paynter, business solutions executive at Ideco expands.

Read more...
Local access technology integrated with biometrics
October 2014, Suprema, Access Control & Identity Management
The Saflec Group has integrated Suprema’s biometric terminals into its Saflec Access Control System (SACS).

Read more...
Biometrics in the VMS
October 2014, Suprema, Access Control & Identity Management
Milestone and Suprema users can now seamlessly link cameras to access control devices, track access control events in Milestone VMS and display related recorded video.

Read more...
Biometrics and the unbanked
October 2014, Access Control & Identity Management
Biometric technology has the potential to radically transform the banking industry by securing identities while improving user-friendliness.

Read more...
Taking time out with T&A
October 2014, Eco Time , Uniclox, Access Control & Identity Management
While companies like to think of the most complex uses for technology, sometimes the simplest solutions deliver the best results. Time & Attendance (T&A) is one of those solutions.

Read more...
Reading up on T&A
October 2014, Tyco Security Products - Johnson Controls, Access Control & Identity Management
Security today has gone so much further than just protecting against robberies, it has become more about assessing and understanding risk, offering insights and information on market trends and behaviour, and coming up with the most appropriate solution.

Read more...
Of fuzzy logic and fusion engines
October 2014, Access Control & Identity Management
The post-modern Sherlock Holmes would do well to have identity search and match capabilities in his Watson that can do fuzzy logic and fusion engines, all in one.

Read more...
<< First   < Previous   Page 3 of 4   Next >   Last >>