Identity management

PSA appoints Ric McCullough as Chief Operating Officer

PSA has named Ric McCullough chief operating officer for the company as of February 1, 2018. McCullough has served as the vice president of sales and customer service for PSA since 2012 and was responsible for the daily sales and customer success operations for the company. With his appointment to COO, McCullough will expand his role to also oversee marketing, vendor relations and educational programs and services for the company. McCullough brings over 30 years of operations, sales and custome...

HID Global highlights IoT, cloud, and mobile-based identity technology trends for 2018

HID Global, a developer of trusted identity solutions, has identified the top trends in the identity technology industry for 2018. The company points towards increased cloud and mobile access adoption, more focus on securing the Internet of Things (IoT), and data analytics as some of the top trends that will take centre stage in developing more intelligent, connected experiences this year. “Trusted identities will emerge this year as the fundamental building blocks for organisations to cr...

SALTO Systems and Phunware collaborate to deliver residential access control solutions

SALTO Systems, a manufacturer of electronic access control solutions, has partnered with Phunware, an enterprise mobile software company, to deliver integrated mobile access control platforms that offer easy-to-use applications for both multi-family residential property managers and residents. SALTO Systems is a global manufacturer in battery-operated RFID locking systems supplying its solutions to a variety of industry verticals including multi-family residential, healthcare, education, transp...

Exabeam Data Lake facilitates access to critical logs for accurate threat detection and response

Exabeam, a developer of security intelligence solutions, has announced Exabeam Data Lake, a security data lake that enables organisations to easily store and access critical log data in the enterprise. With the growing abundance of data in the enterprise that comes from network devices, endpoint computers, servers and security products, security analysts need an easy way to store and extract insights from that data. Security data lakes enable analysts to access logs from relevant systems to det...

Eagle Eye Video API Platform augmented to support advanced system integration

Eagle Eye Networks, Inc. has announced the enhancement of the Eagle Eye Video API Platform to support large scale deployments with advanced integration requirements. The Eagle Eye API Platform delivers a robust set of enterprise wide APIs for customers’ use in easily integrating storage, analytics, indexing, and 3rd party interfaces with both live and recorded surveillance video. The Eagle Eye Video API Platform can be used for integration, analysis, big data research, or the development...

Corvus Integration introduces Corvus Tetrad biometric solution

Corvus Integration is pleased to announce the release of the Corvus Tetrad - a modified version of the Corvus Sleeve biometric solution that utilises the new Integrated Biometrics Appendix F-certified ‘Five-O’ four-slap fingerprint scanner. The Tetrad combines the Integrated Biometrics fingerprint scanner with Corvus’ own dual iris – 5mp face sensors, an Identiv contact and contactless card reader, and a Gemalto MRZ reader. The Tetrad features a rugged case and utilises...

Round Table Discussions

What will be the biggest surprise for security in 2018?

The new year presents new opportunities for the physical security marketplace. In many ways, 2018 will undoubtedly see further development of trends we saw in 2017. In fact, some of the trends determining the future of the physical security industry have been in place for many years. However, not every event in 2018 can be foreseen or easily predicted. To be sure, it is sometimes the surprises that keep life interesting! We asked this week Expert Panel Roundtable: What will be the security marke...

What are the security challenges of critical infrastructure facilities?

They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than fo...

What are the security challenges for schools and colleges?

As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security...