News Search Results

859 News and 23 related Products found for Authentication
  • Genetec announces Intersec Dubai 2018 product lineup
    Genetec, a technology provider of unified security, public safety, operations, and business intelligence solutions, will showcase its latest unified security technology solutions and initiatives at Intersec Dubai 2018 (January 21-23rd).
    Editor / Provider: Genetec | Updated: 2018 / 1 / 15
  • Multimodal biometrics add extra layer of security
    More and more, end user organizations are deploying multimodal biometrics, which have certain advantages over unimodal solutions. Fingerprint readers alone, for example, can't read people with broken or wrinkled skin. Multimodal readers combining two biometrics, be they fingerprint and face or finge
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 1 / 12
  • Why time-sensitive networking is critical in IIoT
    The Industrial Internet of Things is all about connected devices transmitting data that helps plant and factory operators to become more efficient and productive. Against this backdrop, ensuring that data is transmitted in a timely and reliable manner becomes critical. This is where time-sensitive n
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 1 / 10
  • Zwipe and Gemalto partner on fingerprint activated payment card pilot
    Biometric technology company Zwipe is pleased to announce that they have partnered with Gemalto, the world's largest card manufacturer, to pilot the first battery-less dual-interface fingerprint activated payment card with Bank of Cyprus.
    Editor / Provider: Zwipe | Updated: 2018 / 1 / 9
  • Matrix launches COSEC facial recognition
    Matrix, a manufacturer of telecom and security solutions, recently unveiled its indigenously designed COSEC facial recognition.
    Editor / Provider: Matrix Comsec | Updated: 2018 / 1 / 5
  • How blockchain helps with identity management
    Identity management has become an important element in the operations of various end user organizations for example enterprises, banks and government agencies. However conventional technologies can be quite limiting, especially due to the presence of a central server that can be hacked or tampered w
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 1 / 3


Please key in code