Identity management - Expert commentary
Millions of dollars are spent annually at border crossings on technology such as buried volumetric sensors Border control forces, train operators, ferry companies and humanitarian organisations have spent much of 2015 concerned with people trafficking between the northern coast of France and the United Kingdom. Now the focus has switched to migrants fleeing civil war in Syria. It is one of the biggest migrant crisis that Europe has witnessed so far, with hundreds of refugees s...
The sheer number of travelers and lack of passport control in the Schengen Area in Europe tests railroad security’s capabilities Railway security faces the unenviable task of monitoring hundreds of thousands of passengers travelling between countries every day, and an attack on a train in Europe last month has cast a spotlight on the conflict between offering fast and efficient transport services whilst conducting thorough surveillance of passengers and luggage in transi...
More and more commercial buildings today are replacing mechanical keyed locks with card access systems. The basic reason is familiar to security professionals: card systems, once installed, cost less to manage and maintain. “When people are let go, if you don’t get their keys back, you have to rekey the locks and give everyone new keys,” says Brett St. Pierre, director, education solutions with Austin, Texas-based HID Global. “With a card system, all y...
This year's IFSEC International show in London will provide a reflection of the physical security industry's rapid growth, especially in the video sector, says one industry observer who is also a speaker at the show, coming up 16-18 June. “If we look at the overall trend, it is no surprise to anyone that IP is driving the growth and the future of the security business,” says Jim McHale, managing director of research company Memoori, and a speaker at IFSEC. Secur...
Installers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input. SourceSecurity.com: What is your opinion of the security of cloud-based services? Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-security can always be improved in the cloud. The continued trend to SaaS (Software as a Serv...
Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organisations participated in our...
Credential form factors include mobile devices that provide a better way to open doors HID Global 2014/2015 Review and Forecast: High-profile credit card breaches during 2014 raised the profile of low-security solutions while highlighting the need for more secure smart cards. There were no real surprises, as the industry steadily continued its large-scale transition to access control platforms based on open standards. This transition sets the stage for unprecedented innovatio...
AMAG saw growth across all vertical market segments, making 2014 an incredibly exciting year 2014/2015 AMAG Technology Review and Forecast: AMAG Technology saw growth across all vertical market segments, making 2014 an incredibly exciting year. End users are demanding unified, end-to-end total solutions, and I see that trend continuing into 2015 and beyond. Some users want access control and video management from the same manufacturer to eliminate integration challenges, or...
2014 has been a year of significant growth for TDSi TDSi 2014/2015 Review and Forecast:In 2014 we saw continued growth at TDSI, largely through unprecedented interest in integrated IP security systems. Asian markets have continued to be very buoyant, although there have continued to be some flat spots geographically, such as Europe. Compared to other technology markets, security has grown very quickly since the recession, and TDSi has enjoyed double-digit growth. Manufa...
Similar to schools, airports and other semi-public facilities, hospitals and other healthcare facilities are grappling with the new reality that dictates stronger and more enforceable access restrictions. In these new circumstances, the need for security must be balanced with the individual’s need to easily move about the hospital by allowing medical staff, visitors or contract workers to go about their business with relative ease. In this article, Ajay Jain, President and CE...
Applications that reside in the cloud offer enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprise cloud deployments now successfully up and running, plus the integration of the Bring-Your-Own-Device (BYOD) culture into the workplace, the complex issue of data security and access control have leapt to the fore. Ian Lowe, Senior Product Marketing Manager...
The best standards are often baseline, common-denominator standards that leave room for innovation The collaboration between ONVIF and SIA to develop new access control standards is just the latest standards-related news from the Security Industry Association (SIA), the American trade association headquartered in Silver Spring, Md., near Washington, D.C. In fact, SIA has a long history and tradition of standards development, dating back to the 1980s. SIA has produced 1...
Ideal COTS solutions take cost, customisation and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronised and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...
“Soft” biometric measurements, such as gait, gender, and ethnicity offer new possibility for biometric solutions What is the next wave of biometrics? The Center for Identification Technology and Research (CITeR) is looking at the possibilities. New developments include consideration of new “soft” biometric measurements, such as gait, gender, and ethnicity. Although not accurate enough to identify a specific person, the capture and analysis of such...
There are new biometrics on the horizon, but much of current biometrics research centres on improving the biometrics we have, especially the face, iris and fingerprint recognition systems commonly deployed in the field. These systems are effective and provide good accuracy, but their usefulness is often limited by the conditions under which data is captured. Research is looking for ways to make face, iris and fingerprint biometrics more accurate in more real-world situations....
For many companies, the current state of their access control infrastructure is best described as being fractured Identity management has now become a very important requirement for companies. The challenge, of course, lies in proper integration of different physical access control systems with an identity management system. Sophisticated security software can help overcome this challenge, says Ajay Jain, President and CEO of Quantum Secure, who adds that increasing regulatory...
Software can combine information from various systems to create a single identity across the organisation In today's enterprise business environment, the best approach to managing risk for a known scenario is to both prepare for it and guard against it. Effective security management necessitates credible real-time information about risk and the ability to respond to that information in a timely manner. However, that information is often not available in real-time or ma...
Use of virtual credentials to manage identity is opening the access control industry to new solutionsToday's mobile phones are so much more than communication devices - they have become an indispensable consumer appliance for numerous personal, professional and entertainment applications. With the advent of Near Field Communications (NFC) technology, these mobile phones can now also be used to hold your identity keys and used to carry out numerous secure transactions, Dr. Tam Hulusi,...
The Public Key Infrastructure is beginning to be adopted as a driver in physical access Traditionally associated with logical access and the digital signing of documents, Public Key Infrastructure (PKI) is now also being used to control physical access. Their use in physical access control is likely to be more prevalent with the implementation of the FIPS 201-2 recommendations this year. Derek Scheips of ASSA Abloy Future Lab explores the benefits of this key infr...
The use of retinal scans for security applications is increasing The eyes have it. The use of iris recognition technology is expanding around the globe and it is being utilised in a vast array of commercial and government applications ranging from access control to time management. ASSA ABLOY Future Lab examines how this biometric technology is breaking new ground in identity management and other security applications. Retinal vs. iris scans Often confused w...
RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download