Integration is the name of the game

Access & Identity Management Handbook 2009 News & Events

Welcome to the 2009 edition of the Access Control Handbook. Although it has been released somewhat later than is usual, this year’s handbook will offer an interesting selection of thoughts, technology and case studies.

The topic of this year’s handbook is integrated identity and access management. When we decided to focus on this area, we were not sure how far South African companies were going in integrating their security and business processes. Naturally there would be some leaders in the field, but were the majority still stuck with their proprietary, standalone solutions?

It is refreshing to see how many companies have started on the integration road. There is still a long way to go before we reach any ideal level of integration between the logical and physical worlds, but the trend is there. As you will see from the large selection of case studies we have, some companies are happy with integrating time and attendance with access control and leaving it at that, others have seen benefit in going further and hooking up their ERP software to allow centralised control over their employees identities and permissions.

It is a matter of value. As companies realise the value delivered from integration, we can expect them to take further steps, as long as budgets and vendors permit. Sadly, the proprietary nature of much of the security world makes it harder to integrate disparate products into a centralised solution.

Manufacturers of proprietary systems think they are forcing customers to stick to their brand, guaranteeing revenues for the long term. This was a solid business model in the past and still is if you are a large multinational corporation offering complete solutions, but for smaller players all you are doing is chasing your customers into the already well-greased hand of the multinationals. Future solutions are going to demand open standards that allow for integration with whatever best-of-breed systems the client requires. If you cannot provide everything, you may not be providing anything.

It is also rather refreshing to see that global corporations and cheaper Chinese products are not squeezing local manufactures out. The margin pressures are definitely there, but local quality seems to be holding its own and even beating the supposedly better international products.

As our first foray into integrated access control, we have put together a balanced publication that looks at where technology can take us in the future, but also focusing on what is happening in the real world right now. We hope you enjoy the opinions and trends as much as the case studies we have collected from a variety of companies and industries.

Comments and criticisms are welcome, as always, at [email protected].

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

Read more...
Forbatt SA to distribute and support Tiandy in South Africa
Forbatt SA News & Events
The big news in this year’s SMART Surveillance Handbook is that Forbatt SA has signed a new distribution agreement with Tiandy Technologies. This brand has had limited exposure and support in South Africa in the past, but has posted significant growth internationally.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...
AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
Introducing the SecuShot Bullseye Robotic Guard MK2
Secutel Technologies News & Events Surveillance
The SecuShot Bullseye Robotic Guard MK2 is a marvel of modern engineering. It integrates CCTV monitoring, remote-controlled PTZ capabilities, and a gas-powered marker into a single, compact unit.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...