Virtual network

July 2016 Products & Solutions, Access Control & Identity Management, Information Security

SALTO’s Virtual Network (SVN) is the first in the world to have data programmed into the card technology. By including each individual’s access credentials on their specific card instead of in the hardware device ensures access being granted even if the network fails. Having your personal credential on the card also complies with the PoPI Act and smartcard technology can be used to run multiple applications from the same carrier.

Using a wireless hub to transfer information eliminates issues typically encountered where power is not available. In addition, costs are reduced since one does not require either cabling or excessive labour.

SALTO HAMS (Hotel Access Management Software) was developed to allow hotel clients to easily control all their access and guest management needs with one system. It is compatible with most property management software.

SALTO ProAccess was developed to serve as a powerful access control management tool, with a variety of features that allow users to effectively manage building access control of standalone devices, and IP online devices in one converged platform. SALTO’s JustIN Mobile app allows users with iOS or Android smartphones to use them as a door key, and the JustIN mSVN solution converts an NFC-enabled smartphone into a mobile update point.

For more information contact SALTO Systems, +27 (0)11 534 8489, [email protected], www.saltosystems.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Counting people and vehicles in large crowds
Products & Solutions
The new Dallmeier AI High Resolution Counting App enables precise counting even with a large number of people and vehicles in the analysis area, including the definition of multiple counting zones.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Paradox IPC10 Base Station
Spectrum Security Products Products & Solutions
The Paradox IPC10 Base Station is designed to streamline communication between Paradox alarm systems and central monitoring stations (CMS), bridging Paradox’s encrypted IP protocols with industry-standard CMS protocols.

Read more...
JVA Perimeter Patrol 6
Products & Solutions
Stafix Electric Fence and Security Centres has announced that it now provides customers with the latest JVA Perimeter Patrol 6 software package for standalone and piggyback electric security fence solutions.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...