The expanding world of access control

Access & Identity Management Handbook 2017 News & Events

Welcome to the Access & Identity Management Handbook 2017. We have packed an enormous amount of information into these pages, all focusing on the access and identity market. Unfortunately, even with 120 pages, we have to limit what can be printed due to space restrictions. Such is the size and expanding nature of this market.

As has become the norm over the years, biometrics plays a significant role in the handbook as more companies look at additional ways of identifying and authenticating people in the most reliable and quickest manner possible. That’s not to say cards and fobs are a thing of the past, this market is still growing and will continue to grow for a long time, as will the uptake and popularity of electronic locks which use biometrics and traditional access mechanisms.

In fact, we’re looking at a market in which everything is integrated into a working solution, using whatever products and devices are best suited to the job at hand. This is why mobility is also a factor in access and authentication. Since the small smartphones we have come to accept as being part of our normal day have such powerful processing capabilities, people want to make use of them in various situations, including access control. Moreover, smartphones will soon become another management console linked to a central server in order to control access permissions and so on.

An interesting trend in the world of authentication at the moment is for people to report that biometrics are no longer a good option for security because your fingerprints, voice or face can be stolen and you can’t change them like you can a password or PIN. We asked some biometrics players to deal with this issue in one of the articles, but it’s fair to say that the leading brands are ahead of the game in terms of liveness detection and other means of proving a biometric belongs to a real live person – the one they are supposed to belong to. This is also where multi-factor authentication comes into play.

It’s also fair to say that criminal syndicates have almost unlimited research funding and will always be finding ways to outsmart whatever security system one has in place. And in an environment where people often compromise on security in favour of cost, you have to expect that the cheap products will be easier targets for criminals.

However, criminals aside, we hope you enjoy the content we have put together for the handbook. By the time you receive the magazine it will also all be online. We will also be sending out a few email newsletters with a few articles in the new year. And although the handbook is a once-per-year affair, we welcome your feedback which always assists in improving the next year’s Access & Identity Management Handbook. Please feel free to send your comments to [email protected].

Andrew Seldon, Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.