It is about business value

Access & Identity Management Handbook 2012 News & Events

Welcome to the Access & Identity Management Handbook for 2012. We have managed to collect a range of interesting articles dealing with the access and identity market today, backed up by a number of case studies reflecting what companies are doing in the real world.

Sadly, for those of us who love technology, there are few companies on the bleeding edge of access and identity management these days. It seems that while companies are investing in access technologies such as biometric readers, most of them are only doing it where the business case makes sense and the decision makers can see the value.

The reality is that while biometrics is still growing, there is no end in sight for


card-based technologies, especially when one considers what you can do with smartcards and the different applications you can install on a single card. Is it a factor of the cost of biometrics or an economy that nobody really trusts? On the other hand, is it simply people sticking with what they know because biometrics seems like too much trouble?

This is one of the main topics in our annual Access & Identity Management round-table held a few weeks ago (see ‘Integration rules’). While all the people taking part could talk about cool technologies and groundbreaking research, the fact is they have to deal with a reticent market that, on the whole, is not prepared to be the company that puts new technologies through its paces.

That is not to say there are not new technologies worth talking about. In the field of near-field communications (NFC), we were first introduced to a new technology at IFSEC that will combine your cellphone with your access credentials (there is a brief introduction in ‘Phone for access’). Instead of a card, you hold your phone near a reader and identify yourself in that way. It will be interesting to see if employees are as careless with their cellphones as they are with their access cards.

We also delve into the murky world of identity management (‘Identity and access management in the cloud’), which, sad to say is still seen as an ‘IT thing’. There is no doubt it is a complicated field, but centralising your identity and access seems to be a logical step. There is also an eye-opening article highlighting the weaknesses in our logical access control (page 39).

On the topic of logical, we also introduce a new concept of identity control (‘Losing control’), which tries to do just that. Using a single credential, your employees should gain access to the building as well as the logical assets they are entitled to. We will let you decide if it is the future or one of those ‘let us see how it pans out’ things.

We also decided to include a few technology snippets at the end of the handbook to give readers an idea of what is available. As usual, we had too much technology and not enough space to give everyone a voice. Keep an eye on our e-zines and website (www.securitysa.com) to keep in the loop.

Then we have our case studies. The reasoning behind including so many case studies is to leave the theory, opinions and trends behind and take a look at what is happening in the real world. It is easy enough for vendors to talk the talk, but it is the customers who decide what walks at the end of the day.

I hope you find value in this year’s handbook. As always comments, criticisms and suggestions for next year are welcome at [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Igniting standards, powering protection
Securex South Africa News & Events Fire & Safety
Fire safety is more than compliance, it is a critical commitment to protecting lives, assets, and infrastructure. At Firexpo 2025, taking place from 3 to 5 June at Gallagher Convention Centre, that commitment takes centre stage.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...