A better approach to fingerprint biometrics Access & Identity Management Handbook 2019, Editor's Choice Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
Your face tells a story Access & Identity Management Handbook 2019, Technews Publishing, Surveillance, Government and Parastatal (Industry) Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.
Key components of access control Access & Identity Management Handbook 2019, Paxton, Integrated Solutions Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
The right access decisions Access & Identity Management Handbook 2019, Technews Publishing, Editor's Choice Making the right access control decision depends on what you want secured and how secure it should be.
IP is no stranger to access control Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions, Infrastructure Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
Applying the SaaS model to access control Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.
Cloud-based access control Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.
Controlling access in the cloud Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions In the access control arena, hosted or managed services have been around for a few years, and the adoption of cloud-based access control only continues to grow as companies become more and more open to the idea of relying on it to perform such a vital function within their business.
They sure don’t make them like they used to Access & Identity Management Handbook 2019, Technews Publishing, Surveillance, Integrated Solutions The latest offerings in the market with respect to doorbells and intercoms, and what functionality they offer.
Integrating access with OHS and operations Access & Identity Management Handbook 2019, Veracitech, Integrated Solutions Veracitech has developed access control plug-ins on the Babylon platform to add certifications and key management decision-making to traditional access control.
Questions on workforce management Access & Identity Management Handbook 2019, Technews Publishing To find out a little more about workforce management today, Hi-Tech Security Solutions asked Paul Chari from dormakaba for his insights.
43 years of workforce optimisation Access & Identity Management Handbook 2019 Workforce management solutions empower organisations to track the relation between productivity outputs and the cost of employment, as well as the health and safety of its workforce.
Video-based parking management Access & Identity Management Handbook 2019, Surveillance, Integrated Solutions Using surveillance video for vehicle counting improves parking management at an attractive cost and limited installation hassles.
Deploying an integrated access control solution Access & Identity Management Handbook 2019, Technews Publishing, Integrated Solutions The challenge of controlling access into premises and then controlling where staff and visitors go within the premises is one that requires careful consideration and planning.
Identifying good visitor management practices Access & Identity Management Handbook 2019, Excellent ID, Asset Management There are a number of factors that security managers need to consider when implementing visitor management and access control protocols.
Reliability a fundamental in visitor management Access & Identity Management Handbook 2019, Integrated Solutions, Security Services & Risk Management With the rapid evolution of biometric technology, there are many options available in the marketplace that promise varying levels of performance.
Digital channels and the evolution of ID Access & Identity Management Handbook 2019, Editor's Choice, Infrastructure While the concept of identity (ID) remains unchanged, the rapid evolution of digital technology has dramatically extended both its application and form factor.
Using tomorrow’s tools to solve today’s security problems Access & Identity Management Handbook 2019, Information Security, Integrated Solutions It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.
Fingerprints protect privacy for AIDS testing Access & Identity Management Handbook 2019, Editor's Choice A creative, progressive NGO uses biometric fingerprint scanning to redefine confidentiality and AIDS treatment in South Africa.
High-speed door solutions are cool Access & Identity Management Handbook 2019, Retail (Industry) High-speed roll-up doors from Maxiflex are helping to maintain constant temperatures inside the cold storage and refrigeration areas of Makro Riversands and Makro Springfield.