CFOtech New Zealand - Technology news for CFOs & financial decision-makers

HID stories - Page 73

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Samsungtv1 001

PHOTO GALLERY: Launch night of the Samsung 2016 SUHD TV range

Fri, 3rd Jun 2016
#
digital entertainment
#
samsung
#
tv
Samsung recently announced the availability of their elegant new line-up of TVs at a celebratory event in Auckland - check out the pics here.
Cyber

A modern solution for a modern problem: IBM tackles cyber security

Tue, 31st May 2016
#
edutech
#
data analytics
#
martech
IBM unveils Watson for Cyber Security, leveraging cognitive tech and collaboration with top US universities to tackle modern cyber threats.
Hftr main

You say you want a revolution?

Mon, 30th May 2016
#
gaming
#
digital entertainment
#
homefront: the revolution
Deep Silver's Homefront: The Revolution invites us to take another look at a USA on its knees post-invasion and occupied by North Korea.
Customer service 2

A happy customer: Conbrio solving problems with top-notch customer service

Mon, 23rd May 2016
#
crm
#
uc
#
martech
Kiwi tech company Conbrio, known for stellar customer service, has streamlined operations for Telnet, a leading NZ contact centre since 1996.
Change

Digital services and technology vendors forced to change approach

Fri, 20th May 2016
#
martech
#
marketing
#
tbr
Digital marketing services and technology vendors are having to adapt their campaigns as customer demand changes, says a report by Technology Business Research.
Data out the backdoor

CAUTION: The SSL blind spot is growing

Mon, 16th May 2016
#
malware
#
encryption
#
martech
The use of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encryption is growing fast - which is both good and bad.
Specialisation

Exclusive: Specialisation is critical for resellers. Here's why - and how

Fri, 13th May 2016
#
analyst report
#
research director
#
partners
Resellers who are specialising are reaping benefits as digital business and LOB buyers become the norm. Gartner offers tips on how to make the change.
Man directing emails

How safe are your emails? An expert breakdown

Thu, 12th May 2016
#
ddos
#
cybersecurity
#
email
Since the concept of email was first floated in the 60s, it has exploded onto the scene, becoming an absolutely crucial part of everyday business.
Cloud infrastructure1

Cloud infrastructure services market booming; AWS leads way

Mon, 9th May 2016
#
paas
#
hyperscale
#
public cloud
Data centers providing cloud infrastructure services will take up over 50% of servers shipped in 2016 but there's an impact for vendors and channel.
Hiring

Service vendors look to multi-skilled professionals to add depth

Wed, 27th Apr 2016
#
devops
#
it automation
#
apm
Multidisciplinary skills in professionals are in demand as service vendors strive to stay competitive, according to a report by Technology Business Research.
Leak

Cyber threats coming from the inside

Thu, 21st Apr 2016
#
cybersecurity
#
solarwinds
#
solar power
IT security awareness among business leaders, especially in government, is increasing due to company data leaks, says SolarWinds.
Opportunity1

New Igel all-in-one thin client offers new markets for resellers

Wed, 20th Apr 2016
#
daas
#
cloud workspace
#
igel
Igel has released a new version of its UD9 all-in-one thin client, offering resellers 'a new point of entry to several markets'.
Hitman review 1 prologue 1458057714

Hitman returns: a look at episode one

Tue, 19th Apr 2016
#
gaming
#
digital entertainment
#
hitman
Agent 47 sneaks back in Square Enix's episodic Hitman, blending stealth and sandbox warfare in an impeccably detailed Parisian gala.
Mobility

HID Global rolls out new offerings for the mobile enterprise

Mon, 18th Apr 2016
#
physical security
#
risk & compliance
#
data privacy
HID Global unveils new mobile solutions, enhancing digital identity and access control in the enterprise sphere.
Man choosing padlock

Fortinet's Advanced Threat Protection: Securing your datacentre

Fri, 15th Apr 2016
#
firewalls
#
network infrastructure
#
hyperscale
Fortinet's ATP framework provides multi-layered defence-in-depth for your datacentre and fights back against malware and other threats.
Successful arrows

Meet a CIO with fabulous talent management skills and you'll meet a successful business

Fri, 15th Apr 2016
#
productivity
#
opinion
#
analyst report
Without inspiring lead supported from above, even the best business, the best enterprise, will disappear entirely and without much of a trace.
Dominoes falling businessman

Four ways network downtime can hurt your business – and how to prevent it

Fri, 15th Apr 2016
#
dr
#
cloud services
#
4g technology
In most cases, a business can't meet the needs of their customers, partners or even their own objectives when their network goes down.
Cyber crim

Watch out, there's a new breed of cyber criminal in town

Tue, 12th Apr 2016
#
uc
#
breach prevention
#
symantec
A new class of professional cyber criminals has emerged, adopting corporate practices to increase the efficiency of their attacks.
Ransomware laptop

Ransomware: Locky, TeslaCrypt and other malware families use new tool to evade detection

Tue, 12th Apr 2016
#
malware
#
firewalls
#
network infrastructure
Recently, Palo Alto Networks identified slight changes in Locky detonations through the AutoFocus threat intelligence service.
Gettyimages 948524470

ThisData: Harden your security with two lines of code

Mon, 11th Apr 2016
#
cloud services
#
security
#
sotw
That's right, add two lines of JavaScript onto your login form and you'll be making your web site, and the world, a much safer place.