Product sourcing and global internet product marketing with a core focus on IT/IP based physical and logical security products. System design for CCTV, Card Access, Intercom, Paging and Infrastructure systems
Articles by Chris Jahnke
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
Princeton Identity Inc., a provider of the fastest, simplest and secure biometric security systems on the market, has announced that it has expanded its sales team with three regional sales managers. Lending their collective expertise in physical security each manager will oversee a specific U.S. sales region—Devon Felise, the East, Dennis Wilkerson, the West and Chris Jahnke, the Central region. Each manager will be responsible for developing manufacturer representative sales teams, establishing a solid dealer base in key markets and accelerating the adoption of Princeton Identity’s rich range of biometric solutions. “The additions of Felise, Wilkerson and Jahnke to the team will serve to propagate our biometric technology in a range of markets including physical security, airports, healthcare, government and financial services,” stated Bob McKee, vice president of sales and marketing at Princeton Identity. “These seasoned experts compliment the recent expansion of our advisory board and executive team, and will help us deliver on our mission to give people everywhere a more intuitive, efficient and natural security experience.” Wilkerson has authored several articles on access control concepts and perimeter security Security expertise Felise has been an active sales leader in the security industry for more than 13 years. Prior to joining Princeton Identity, he was the Northeastern regional sales manager at Paxton Access, where he was responsible for three consecutive years of growth before his promotion to national sales manager. Felise is a graduate of Seattle Pacific University. Wilkerson brings more than 30 years of experience in the security industry that spans management and executive leadership roles in distribution, product manufacturing and integration at companies such as Cardkey, Kantech, Clark Security Products and International Electronics/Linear Corporation. Before Princeton Identity, he was the national accounts manager at Nortek Security & Control. A respected thought leader in the industry, Wilkerson has authored several articles on access control concepts and perimeter security dating back to 1997. Wilkerson is a graduate of St. Ambrose University. Jahnke has more than 25 years in the security industry specialising in the access control market, and brings a strong background in technical sales and customer service ethics to the Princeton Identity team. Prior to Princeton Identity, he was a regional sales manager with Cardkey Systems, PCSC and GE Security.
Simplified security for utilities & critical infrastructureDownload
Best practices for migrating to an IP-based access control systemDownload
Access control: Bringing efficiency to your lifts' automatic destination systemDownload
Webcast: Save time and money with Wireless Access ControlDownload