Improved residential estate security October 2014, Access Control & Identity Management EVIM visitor transactions are also recorded, processed and archived in a POPI compliant manner. All data is stored offsite and visitors’ fingerprints are recorded, transmitted and stored in an encrypted format, which cannot be reverse engineered to a latent fingerprint image.
Read more...Taking control of visitor management October 2014, Access Control & Identity Management Residential estate and office park managers are becoming more discerning about the type of visitor management systems they require.
Read more...Understanding workforce management October 2014, neaMetrics, Bidvest Protea Coin, Access Control & Identity Management Hi-Tech Security Solutions asked the experts to tell us more about WFM, what it is, who’s doing it and its growth in the local market.
Read more...Synerion provides enterprise WFM October 2014, Access Control & Identity Management Powell Tronics expands its footprint and complements its access control and T&A offering with Synerion Workforce Management.
Read more...IP makes the access control grade October 2014, ZKTeco, Access Control & Identity Management Hi-Tech Security Solutions examines the continuing trend to build access control systems based on IP technology.
Read more...Hosted and managed access control October 2014, Johnson Controls - (Tyco Security Products), Impro Technologies, Access Control & Identity Management Do companies do it themselves or do they make use of hosted or managed access control services?
Read more...Outsmart fakes October 2014, Ideco Biometrics, Access Control & Identity Management Do you know exactly how well the ‘fake finger detection’ or ‘liveness detection’ on your biometric solution works? Mark Paynter, business solutions executive at Ideco expands.
Read more...Biometrics in the VMS October 2014, Suprema, Access Control & Identity Management Milestone and Suprema users can now seamlessly link cameras to access control devices, track access control events in Milestone VMS and display related recorded video.
Read more...Biometrics and the unbanked October 2014, Access Control & Identity Management Biometric technology has the potential to radically transform the banking industry by securing identities while improving user-friendliness.
Read more...Taking time out with T&A October 2014, Uniclox, Access Control & Identity Management While companies like to think of the most complex uses for technology, sometimes the simplest solutions deliver the best results. Time & Attendance (T&A) is one of those solutions.
Read more...Reading up on T&A October 2014, Johnson Controls - (Tyco Security Products), Access Control & Identity Management Security today has gone so much further than just protecting against robberies, it has become more about assessing and understanding risk, offering insights and information on market trends and behaviour, and coming up with the most appropriate solution.
Read more...Of fuzzy logic and fusion engines October 2014, Access Control & Identity Management The post-modern Sherlock Holmes would do well to have identity search and match capabilities in his Watson that can do fuzzy logic and fusion engines, all in one.