It is about business value

Access & Identity Management Handbook 2012 News

Welcome to the Access & Identity Management Handbook for 2012. We have managed to collect a range of interesting articles dealing with the access and identity market today, backed up by a number of case studies reflecting what companies are doing in the real world.

Sadly, for those of us who love technology, there are few companies on the bleeding edge of access and identity management these days. It seems that while companies are investing in access technologies such as biometric readers, most of them are only doing it where the business case makes sense and the decision makers can see the value.

The reality is that while biometrics is still growing, there is no end in sight for


card-based technologies, especially when one considers what you can do with smartcards and the different applications you can install on a single card. Is it a factor of the cost of biometrics or an economy that nobody really trusts? On the other hand, is it simply people sticking with what they know because biometrics seems like too much trouble?

This is one of the main topics in our annual Access & Identity Management round-table held a few weeks ago (see ‘Integration rules’). While all the people taking part could talk about cool technologies and groundbreaking research, the fact is they have to deal with a reticent market that, on the whole, is not prepared to be the company that puts new technologies through its paces.

That is not to say there are not new technologies worth talking about. In the field of near-field communications (NFC), we were first introduced to a new technology at IFSEC that will combine your cellphone with your access credentials (there is a brief introduction in ‘Phone for access’). Instead of a card, you hold your phone near a reader and identify yourself in that way. It will be interesting to see if employees are as careless with their cellphones as they are with their access cards.

We also delve into the murky world of identity management (‘Identity and access management in the cloud’), which, sad to say is still seen as an ‘IT thing’. There is no doubt it is a complicated field, but centralising your identity and access seems to be a logical step. There is also an eye-opening article highlighting the weaknesses in our logical access control (page 39).

On the topic of logical, we also introduce a new concept of identity control (‘Losing control’), which tries to do just that. Using a single credential, your employees should gain access to the building as well as the logical assets they are entitled to. We will let you decide if it is the future or one of those ‘let us see how it pans out’ things.

We also decided to include a few technology snippets at the end of the handbook to give readers an idea of what is available. As usual, we had too much technology and not enough space to give everyone a voice. Keep an eye on our e-zines and website (www.securitysa.com) to keep in the loop.

Then we have our case studies. The reasoning behind including so many case studies is to leave the theory, opinions and trends behind and take a look at what is happening in the real world. It is easy enough for vendors to talk the talk, but it is the customers who decide what walks at the end of the day.

I hope you find value in this year’s handbook. As always comments, criticisms and suggestions for next year are welcome at andrew@technews.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Prevention-first approach to cybersecurity
News Cyber Security
Check Point CEO, Gil Shwed, highlights the increasing importance of artificial intelligence in defending evolving networks and protecting against cyber threats at annual CPX 360 customer and partner event.

Read more...
Three new portable power stations to ease load shedding
News Security Services & Risk Management Products
EcoFlow has launched three portable power stations that provide sufficient power for consumers wherever they are; the DELTA 2 and RIVER 2 Series are feature-filled power solutions to the volatile electricity supply.

Read more...
UJ and Schneider Electric launch 4IR Experience Room
News
Schneider Electric and the University of Johannesburg (UJ) Faculty of Engineering and Built Environment (FEBE) have officially unveiled the 4IR Experience Room, a first for UJ and situated at the university’s Auckland Park Campus.

Read more...
SafeCity Guarding rolls out across 14 suburbs in Johannesburg
News Security Services & Risk Management
In a major drive to provide communities across Johannesburg with additional safety, Vumacam, in partnership with Fidelity ADT and other security providers across the region, rolled out the innovative SafeCity Guarding initiative in 14 suburbs.

Read more...
Providing an interactive branding platform
Securex South Africa News Conferences & Events
Now in its 30th year of providing security technology and services providers with a platform for increasing their brand exposure, Securex South Africa will be held at the Gallagher Convention Centre in Midrand, from the 6th to 8th June 2023.

Read more...
ALX sponsored learning programmes for 2023
Training & Education News
With a mission to harness Africa's abundant human capital by developing two million ethical and entrepreneurial young leaders from the continent by 2030, ALX has launched four fully sponsored (at no cost) tech programmes for 2023.

Read more...
LockBit ransomware gang most apt to leak stolen victim data
News
Trellix has released The Threat Report: February 2023 from its Advanced Research Centre, combining telemetry collected from the world’s largest network of endpoint protection installs and its complete XDR product line with data gathered from open- and closed-source intelligence reports.

Read more...
Schneider Electric is looking for your bold idea
News
Schneider Electric has launched this year’s Schneider Go Green, an annual competition that invites university students from across the globe to share their ideas for innovations that can help make the world cleaner, more inclusive, and more sustainable.

Read more...
Keeping students, staff and communities safe
Vumacam News CCTV, Surveillance & Remote Monitoring Security Services & Risk Management
South African schools are facing increasing security challenges, making effective surveillance systems more important than ever. To address this issue, Vumacam is offering advanced security solutions with security partners, aimed at keeping students, staff, and the community safe.

Read more...
Arcules and IMMIX announce integration
News CCTV, Surveillance & Remote Monitoring Products
Arcules has announced that its integration with Immix Central Station and Guard Force is available. The integration provides Central Station and Guard Force users a way to manage, verify, and respond to security events, while using Arcules-managed video feeds.

Read more...