Articles Search Results

258 Articles and 308 related Products found for fingerprint
  • Morpho signs e-Border contract with the UAE Ministry of Interior
    Morpho (Safran), through eIMASS, has been awarded the prestigious e-Border management project by the Ministry of Interior of the United Arab Emirates. The e-Border project is setting the standards for the future of border control in the world, combining the very latest in biometric technologies, aut
    Editor / Provider: Morpho (Safran) | Updated: 2015 / 1 / 30
  • CEM integrated access control and biometric for new Polish museum
    CEM Systems, part of the Security Products business unit of Tyco, announced that they have secured the new Silesian Museum in Katowice, Southern Poland. The AC2000 access control and security management system was delivered by CEM Approved Reseller Samaxon, and installed by IB Systems & Budimex.
    Editor / Provider: CEM | Updated: 2015 / 2 / 2
  • Biometric authentication goes mobile
    Today, there are nearly 7 billion mobile subscribers worldwide, as estimated by the International Telecommunication Union. That is 95.5 percent of the world's population! And in this highly connected world, each and every individual mobile subscriber must be sure that personal data and identities ar
    Editor / Provider: Morpho (Safran) | Updated: 2014 / 12 / 8
  • Suprema wins All-Over-IP Award as best product
    Suprema, one of the leading global providers of technology in biometrics and security, has won an award for its fingerprint access control terminal, BioEntry W, at this year's All-Over-IP Expo in Moscow.
    Editor / Provider: Suprema | Updated: 2014 / 11 / 27
  • Morpho places first in NIST 2014 MINEX fingerprint benchmark
    Morpho (Safran) announced that its fingerprint matching technology placed first in the ongoing Minutiae Interoperability Exchange Test (MINEX) sponsored by the National Institute of Standards and Technology (NIST).
    Editor / Provider: Morpho (Safran) | Updated: 2014 / 11 / 20
  • Comprehensive access control solutions feature at Secutech 2015
    Access control has long been a vital portion of physical security and can be divided into three categories, namely password-based access control, card-based access control, and biometrics-based access control, according to the system's input, transmission, and control methods. The functions and char
    Editor / Provider: Secutech | Updated: 2014 / 11 / 18
  • HID Global securing enterprise cloud applications
    Applications that reside in the cloud afford enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprises cloud deployments now successfully up and running, plus the integration of the Bring-
    Editor / Provider: Jordan Cullis, HID Global | Updated: 2014 / 11 / 5
  • Identity management solutions keep intruders at Bay
    Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which have thousands of workers on their payroll. Making matters worse, these workers include not only full-time employees but temp workers and contractors as well. Dete
    Editor / Provider: William Pao, a&s International | Updated: 2014 / 11 / 4

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code