Smart cities are built on smart thinking November 2017, Technews Publishing, Editor's Choice, Integrated Solutions The smart city concept integrates ICT and various physical devices connected to the network to optimise the efficiency of city operations and services and connect to citizens.
The complexity of borders November 2017, Government and Parastatal (Industry), Surveillance, Access Control & Identity Management, Integrated Solutions Controlling borders is a critical task for governments the world over, both at official and unofficial entry points where illegal crossings are made.
The missing mobile puzzle piece November 2017, Information Security Companies are neglecting to define what resources can be accessed via mobile and have not identified what devices are already accessing the network.
Software defined surveillance November 2017, Surveillance Fighting the economic recession by enhancing existing servers and storage used for surveillance operations.
People on the move Access & Identity Management Handbook 2018, Editor's Choice, Access Control & Identity Management, Integrated Solutions Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
Home run for integrated security Access & Identity Management Handbook 2018, Milestone Systems, Integrated Solutions, Surveillance, Access Control & Identity Management Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
Facing the future Access & Identity Management Handbook 2018, neaMetrics, Editor's Choice, Access Control & Identity Management Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
A mobile holiday Access & Identity Management Handbook 2018, Access Control & Identity Management The use of mobile devices, specifically smartphones for access control has taken off over the past year or two, with expectations that its adoption will grow even more.
Access a mobile-first world Access & Identity Management Handbook 2018, Axis Communications SA, Editor's Choice, Access Control & Identity Management Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.
Portable biometric solutions gain ground Access & Identity Management Handbook 2018, Access Control & Identity Management, Integrated Solutions Portable devices offer a cost-effective and reliable alternative for a number of traditional access control applications.
Access control as a service Access & Identity Management Handbook 2018, Impro Technologies, Access Control & Identity Management Serve the skills and cash shortage notice by opting for access control as a service, which promises to make the access control spending more manageable.
Cut the wire for easy access Access & Identity Management Handbook 2018, MiRO, Access Control & Identity Management The great debate about hardwired versus wireless systems will no doubt continue for some years to come, but it’s clear that wireless access control is coming into its own.
Migrating to IP access control Access & Identity Management Handbook 2018, Genetec, Access Control & Identity Management, Integrated Solutions Migrating from an existing legacy access control system to an IP-based system offers companies many benefits and even cost savings.
Security infrastructure in a box October 2017, Genetec, Surveillance Genetec introduces new high-performance rack-mounted appliances, workstations and storage solutions.
Cards in the cloud October 2017, Access Control & Identity Management HID Global has introduced HID FARGO Connect, the industry’s first cloud-based solution that simplifies and streamlines the issuance of ID cards and credentials.
Compliance can equal value October 2017, Editor's Choice In remaining compliant with new data protection legislation, companies can generate even greater value from their data, says Cleo Becker.
Compliance is knowing October 2017, Information Security There are two types of businesses, those who have been breached and those that don’t know that they have been breached.
Redstor backs up TCTA October 2017, Editor's Choice, Products & Solutions Redstor provides government body with cost-effective and reliable backup and business continuity solution.
Lack of skills hamper transport IoT October 2017, Editor's Choice, Integrated Solutions, Security Services & Risk Management IoT data stands to revolutionise the global transport sector, but restricted access to critical data may limit potential, finds Inmarsat.
Protecting privacy in the face of PoPI October 2017, Information Security, Security Services & Risk Management While no single product can offer complete PoPI compliance, having a quality set of information security products puts organisations in a significantly better position.