The acquisition of Mercury Security will advance HIDs global leadership in the physical access
control industry, adding Mercury Securitys high-quality controllers to HIDs product portfolio while extending HIDs installed base of millions of users beyond the readers and smart cards that we are already well known for, said Stefan Widing, President and CEO of HID Global.
20 September 2017 - Texas, US-based identity solutions provider HID Global has agreed to acquire California, US-based OEM supplier of access controllers Mercury Security to advance HID's position in the physical access
control market, the company said.
8220;Emergence of video surveillance cameras and electro-mechanical locks for physical access
and logical access control is siting for a huge market growth by 2018.
When used with Identive's new line of TouchSecure readers, the NFC smartphone replaces traditional secure physical access
The facilities manager will need to be able to secure physical access
to computers and other network devices as required by investigators.
The majority of physical access
control systems are currently managed independently of an enterprise's IT functions.
The Swedish biometric security solutions developer and provider Precise Biometrics AB said on Wednesday (23 June) that it had received an order for a physical access
solution from the Swedish gym chain Fitness24Seven.
With smart card-based physical access
already in place at many enterprises, the next logical step is to provide the same level of protection for digital assets.
DoD uniformed duty employees, qualified reserve personnel, DoD civilians, and authorized contractors use these standard identification cards to gain physical access
to secure areas and logical access to the Department's computer networks.
What issues need to he considered when implementing a smart-card-based physical access
The court held that prison employees' alleged conduct of informing an inmate that he had to submit a visiting request to receive direct physical access
to the prison law library, failed to support the inmate's claim of denial of meaningful access to courts.
Vocent's new Voice Secure software family is comprised of four different applications: Voice Secure -- Password Reset, which automates the password reset headache that is common within large corporations; Voice Secure -- Confirmed Caller, which acts as a secure front end for customer contact centers by using voiceprints to verify a caller's identity before being connected with a customer service representative or interactive voice response (IVR) system; Voice Secure -- Check-in, which uses voiceprints to verify the identity of a caller at specific locations and times; and Voice Secure -- Controlled Access , which limits physical access
to secure areas by using voiceprints to supplement card readers or other access control systems.