Posts Tagged ‘authentication’
Thursday, March 8th, 2012
HID Global, trusted leader in solutions for the delivery of secure identity, continues its commitment to innovation leadership by offering a broad portfolio of RFID and digital technology solutions that support users’ needs to create, use and manage secure identities. As a part of its showcase this week at CARTES North America Expo and Conference… Read more >>
Tags: access, advanced, asset, authentication, card, company, control, credential, credentials, desktop, digital, duty, government, high, manage, management, mobile, monitoring, payment, platform, portability, printer, reader, secure, security, service, services, smart, solutions, strong, technology, track, tracking, vehicle, vertical
Posted in RFID •
No Comments »
Wednesday, February 8th, 2012
Beginning in fiscal year 2012, U.S. government agencies must upgrade their physical and logical access control systems to provide federal employees and contractors with more secure and reliable forms of identification using Personal Identity Verification (PIV) credentials. These credentials must leverage smart card and biometric technology in accordance with National Institute of Standards and Technology… Read more >>
Tags: access, areas, authenticate, authentication, badge, biometric, card, cards, clear, communications, control, credential, credentials, data, define, different, door, easy, employees, enhanced, existing, federal, from, full, function, future, government, high, identification, identity, issuing, keys, level, levels, link, management, members, module, modules, more, multiple, output, panel, panels, passes, point, process, protection, range, reader, readers, relay, reliability, reliable, secure, security, server, single, smart, solution, solutions, standard, standards, strong, system, systems, technology, time, upgrades, vendors, video, visitor
Posted in Access Control •
No Comments »
Friday, October 14th, 2011
We’ve seen headline after headline of victims who’ve suffered a security breach. While the severity may vary, each is an example of the concerned organisation’s security measures being found wanting. And the battle has only just begun as, in recent months, security professionals have amplified the cry following attacks from DigiNotar, Anonymous and WikiLeaks –… Read more >>
Tags: access, alarm, alert, applications, attacks, authentication, biometric, biometrics, cash, code, communication, cost, credit, data, device, different, effective, entry, existing, face, high, identity, intruder, lock, long, mobile, more, multiple, network, password, people, perfect, point, reader, receipt, risk, secure, security, sending, single, software, solution, system, systems, technology, user, virtual
Posted in Access Control •
No Comments »
Friday, October 14th, 2011
HID Global’s new iCLASS SIO technology-enabled (SE) platform initiates a significant transformation in how secure identity is delivered and managed by introducing technology-independent digital credentials that can be deployed for use on smart phones, microprocessor-based cards, contactless smart cards, USB tokens and related devices. HID Global has announced the availability of its next generation access… Read more >>
Tags: access, additional, applications, artwork, authentication, biometric, building, card, cards, compatibility, construction, contactless, control, credential, credentials, custom, data, design, digital, durability, flexible, formats, functions, future, identity, Information, keys, level, levels, magnetic, management, market, mobile, multiple, officer, photo, platform, portability, portable, power, product, products, programming, reader, readers, secure, security, serial, shell, side, smart, software, standard, standards, system, technology, wide
Posted in Access Control •
No Comments »