Biometric Security - Expert commentary
This year has unfolded generally as predicted. Complete solutions have enabled IP video to further penetrate the small to medium business markets. IP convergence opened up new fast-growing markets for IP intercoms and IP audio systems. The preponderance of IoT devices has driven cybersecurity efforts to new heights. In addition, lower prices, along with the increasing investment needed in R&D to keep pace with rapidly changing technology, have led to market consolidation. IoT creates oppor...
SourceSecurity.com’s Expert Panel covered a lot of ground in 2017 about a variety of topics resonating in the security market. The most-read Roundtable discussion in 2017 was about a familiar and ongoing debate: What is an open system? Other hot topics that made the Top-10 list of Roundtable discussions included smartphones, buzzwords, standards and product life cycles. Here is a listing of our Top 10 Expert Panel Roundtable discussions posted in 2017,...
SourceSecurity.com’s most trafficked articles in 2017 reflected changing trends in the market, from facial detection to drones, from deep learning to body worn cameras. Again in 2017, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they...
Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organisations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA case study But does that mean that organisations need to hold off on implemen...
2018 will start to see facial recognition and other biometrics used in a combination of ways, but I’d like to look even further into the future. I believe that facial recognition will be utilised on a large scale and that it will be very hard to enjoy the enhanced speed and simplicity of travel and financial transactions of the future without relying on biometrics. Biometric ticket and passport For example, when you travel to another country your face will be your ticket and passport.&n...
The term “smart city” gets thrown around a lot nowadays, but as different technologies that strive to be defined in this way are adopted by different countries globally, the meaning of this phrase gets lost in translation. The simplest way to define a “smart city” is that it is an urban area that uses different types of data collecting sensors to manage assets and resources efficiently. One of the most obvious types of “data collecting sensor” is the video ca...
Access control and security entrance integration is a specialised discipline. It is true that security entrances require only a dry contact and can integrate with virtually any access control system, but there are some things to be considered when researching the right access control system for your organisation’s security goals. After 21 years’ experience in the security industry—four of those serving as an advisor for security solutions to dozens of Fortune 1000 companies&md...
Today ‘terrorism’ has become a word we use and hear every day. The goal of terrorism is a media product - information delivered to nearly every house in the world. So, the weapon of terrorism is information. Therefore, the way we defend and prevent terrorism must also be based on intelligent processing of information - and an early awareness of potential threats and effective preventive action may eliminate most attacks. Video analytics, automated surveillance and AI decision-making...
Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users. Find out m...
For many years, video analytics have enabled end users to detect specific people or vehicles entering restricted areas, capture license plate information, scan crowds for specific individuals and much more. Today’s Video Management Systems (VMS) and IP cameras are built with powerful processing capabilities, helping to drive the development of more advanced analytics to more accurately detect abnormalities in behaviors that trigger alerts – an important component of predictive analys...
In today’s world, businesses face a growing threat landscape. Looking back on just the past few months, there have been increased incidents of workplace violence (the recent New York city hospital shooting), terrorist activities (London Bridge attack, Manchester attack), and cyberattacks (Petya and WannaCry). While critical events have become more frequent, more complex, and costly to businesses, organisations’ emergency communications systems, plans and processes have remained surpr...
For many frequent flyers, the relationship between flyers and the Transportation Security Administration (TSA) has been at times, turbulent. For the better part of the last two decades, going through airport security has been met with groans over long wait times as flyers are encouraged to get to the airport earlier and earlier. TSA Lean Six Sigma tactics reduce wait time However, the tide may be turning a bit, as recent reports have shown a decline in TSA’s wait times, which can be att...
Can you imagine what it would be like if you could only look at your CCTV cameras eight hours after an incident, when your security team finish their shift? That is what 99% of current body cameras offer. Most body cameras can only record video, which limits them to settling arguments after the fact – who said what first in an altercation with the police? What sparked an incident with the door security team at a nightclub? This leads to a curious asymmetry of video and immediacy between m...
In end-to-end security, it’s important to consider that the chain is only as strong as its weakest link. That is why it is essential that an access control system is always evaluated in its entirety, to discover where the weakest link can be found. It is not uncommon for access control systems to be installed and then used for the longest time possible without any attention to updating the system’s intrinsic security features. There are many systems in the field that are...
Manufacturers depend on consultants to get their technologies specified in customer projects. Consultants often depend on manufacturers to provide them current information about the technologies that are the building blocks of their projects. It’s a symbiotic relationship, but not always a perfect one. We recently gathered three consultants to discuss what they want from manufacturers, and a representative of HID Global to add a manufacturer’s perspective. Manufacturers also look to...
Security solutions should be about integration not isolation. Many organisations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. Gert Rohrmann, Technical Manager for the solutions division of Siemens Building Technologies UK, examines how by drawing data from a number of different sources...
The global market for card-based electronic access control (EAC) is projected to reach $10.1 billion by 2020 according to Global Industry Analysts. However, as credential technologies have evolved over the years, so have the ways users interact with them. Mobile credentials One of the bigger developments over the past few years has been the increased adoption of mobile credentials, which allows users to access facilities via their mobile device. To m...
Organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world Organisations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. At the same time, their users are demanding more choices of smart cards, smartphones, wearables, and other mobile...
The new scanner can quickly screen large groups of people without needing them to stop or slow down Most body scanners are designed to work one person at a time, checkpoint style. QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. The QinetiQ SPO-NX SPO-NX...
Increasing the quality of illumination with LED can help deter crime and improve the accuracy of video analytics One of the greatest challenges that indoor and outdoor security surveillance solutions face is lack of light. However, obtaining the proper amount of illumination for security goes beyond merely flooding a specific area with light. Without an adequate lighting source, video cameras are ineffective. When capturing only dark, blurry images and video, they can quickl...
Physical access control has been a key component of many organisations’ security strategies for several decades. Like any technology, access control has evolved over the years, and solutions now offer more security and convenience than ever before. From swipe technologies, such as the now antiquated magnetic stripe, to a variety of contactless technologies and mobile access credentials, businesses now have several choices when it comes to access control. Upgrading outd...
The winds of change have swept into the access control market in 2016. The hardware is transitioning away from being solely panel-based, software is rapidly moving to the cloud, and credentials are going mobile. It seems that the security access control world is finally waking up from its technological slumber, and 2017 will be an exciting time. These three major trends are feeding off one another and are driving the growth all around. IP and edge based systemsIn 2016, hardware companies like...
The access control industry is now picking up the challenge of embracing new technologies The access control business has, over the last 10 years, completely changed its image from being a rather unattractive slow growth and conservative business to taking up a position as a fast-growing confident business. The access control industry has listened and acted on the needs of the stakeholders in the supply chain and as a result the world market for access control products and so...
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but firs...
Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution Global terrorism is on the rise. For many years, the West felt immune to these incidents, often asserting that these were problems felt only in countries with heated conflicts, such as Syria, Iraq, Israel and Nigeria. However, recent terror attacks have taken place in both Europe and the United States: Belgium, France (Paris and Nice), Orlando, various...
The technologies behind physical access control are constantly evolving. It’s a fast-changing market that can leave end user organisations struggling to keep up. Smart cards still reign supreme, with good reason, but there are also new options today and on the horizon. Customers want to implement the most secure and up-to-date technologies, but constantly adapting their systems to keep up with the pace of change is impractical. Leveraging access control technologies in a way that both m...
The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions. The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Inter...
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of bli...
A force of 85,000 police and military will patrol the Olympic grounds and environs to provide security A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the various Olympic venues located around Rio De Janeiro. The security plan called for 3,400 screeners. The security firm had only found 500. What happened? Today, prospective security officers must undergo background checks that do...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download