Protecting against criminal use of stolen biometric data
Biometric technology is not invulnerable, but with the correct planning it is an effective authentication mechanism that binds a myriad of digital and physical credentials to a person.
View ArticleZKTeco launches ZKBioSecurity 3.0
ZKBioSecurity 3.0 is an all-in-one web-based security platform developed by ZKTeco, with four integrated modules: access control, video linkage, elevator control and visitor management.
View ArticleIntegrated biometric access
Net2 biometric integration with PIN and card access control simplifies and secures access at John Roan School.
View ArticleSecurity versus convenient access
As digital interactions increase in volume and complexity, identity and access security have become more critical for both the organisation and end-user.
View ArticleThe expanding world of access control
Welcome to the Access & Identity Management Handbook 2017. We have packed an enormous amount of information into these pages, all focusing on the access and identity market. Unfortunately, even...
View ArticleManaging visitors and contractors
Accessing gated communities and campuses, be it business, government or residential, has become a key point for newer access control technologies.
View ArticleEight best practices for identity and access management
Identity and access management (IAM) isn’t something you do once and then forget about. It’s an ongoing process, a critical part of your infrastructure that demands continuous management.
View ArticleElectronic locks are the new black
The use and versatility of electronic locks is growing and gaining traction in more organisations. Hi-Tech Security Solutions speaks to two leaders in the field.
View ArticlePassage to luxury
The seamless operation of Besam bi-parting sliding door system from ASSA ABLOY Entrance Systems allows for the easy passage of vehicles in and out of a luxury vehicle showroom in Fourways, Johannesburg.
View ArticleFull security solution for Garanti
Garanti Bank is one of Turkey’s largest private banks, with an established history dating back to 1946.
View ArticleThe reliability of mobile credentials
The use of a PIN or personal access code (PAC) to provide visitors with access to residential estates and business complexes has increased in the past few years.
View ArticleMaking the case for Identity-as-a-Service
The different evaluation criteria in approaching cloud-based Identity and Access Management (IAM). It maps key considerations in the evaluation process, as well as perceived barriers to achieving...
View ArticleIP’s access control capture
IP delivers many benefits to the access market, but it’s a case of slow and steady wins the race as companies gradually upgrade to hybrid solutions.
View ArticleIAM: Looking ahead
Identity and access management and access governance: the immediate past and the future.
View ArticleAccess control in 2017
According to IHS, the total installed base of access control readers, panels,credentials and electronic locks is expected to reach 2.3 billion by 2016, up from 1.8 billion in 2012.
View ArticleAccess control solutions need to embrace open platforms
Optimising video and access control within the broader surveillance or security solution is no longer about synergy, interfacing or integration.
View ArticleXTime goes beyond T
XTime has evolved into an access control, time and attendance and visitor management solution capable of interfacing with all the major enterprise reporting and payroll platforms.
View ArticleImproving security at Helderberg
Access control remains the crux of residential estate living and homeowners’ associations are realising the benefits of deploying an electronically driven system.
View Article