Identity management - Expert commentary

How effective is physical security technology amid Europe’s current migrant crisis?

Millions of dollars are spent annually at border crossings on technology such as buried volumetric sensors Border control forces, train operators, ferry companies and humanitarian organisations have spent much of 2015 concerned with people trafficking between the northern coast of France and the United Kingdom. Now the focus has switched to migrants fleeing civil war in Syria. It is one of the biggest migrant crisis that Europe has witnessed so far, with hundreds of refugees s...

French train attack highlights challenges of railway security on inter-continental networks

The sheer number of travelers and lack of passport control in the Schengen Area in Europe tests railroad security’s capabilities Railway security faces the unenviable task of monitoring hundreds of thousands of passengers travelling between countries every day, and an attack on a train in Europe last month has cast a spotlight on the conflict between offering fast and efficient transport services whilst conducting thorough surveillance of passengers and luggage in transi...

Mobile access control and smart phones proving convenient in hoteling world

More and more commercial buildings today are replacing mechanical keyed locks with card access systems. The basic reason is familiar to security professionals: card systems, once installed, cost less to manage and maintain. “When people are let go, if you don’t get their keys back, you have to rekey the locks and give everyone new keys,” says Brett St. Pierre, director, education solutions with Austin, Texas-based HID Global. “With a card system, all y...

IFSEC will reflect industry's rapid growth, says analyst/speaker

This year's IFSEC International show in London will provide a reflection of the physical security industry's rapid growth, especially in the video sector, says one industry observer who is also a speaker at the show, coming up 16-18 June. “If we look at the overall trend, it is no surprise to anyone that IP is driving the growth and the future of the security business,” says Jim McHale, managing director of research company Memoori, and a speaker at IFSEC. Secur...

Q&A: Integrator weighs in on the security of web-based services

Installers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input. SourceSecurity.com: What is your opinion of the security of cloud-based services? Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-security can always be improved in the cloud. The continued trend to SaaS (Software as a Serv...

Security is better than ever! The industry is optimistic looking to 2015

Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organisations participated in our...

Credentials on mobile devices to accelerate in 2015

Credential form factors include mobile devices that provide a better way to open doors HID Global 2014/2015 Review and Forecast: High-profile credit card breaches during 2014 raised the profile of low-security solutions while highlighting the need for more secure smart cards. There were no real surprises, as the industry steadily continued its large-scale transition to access control platforms based on open standards. This transition sets the stage for unprecedented innovatio...

High demand for unified solutions and retrofits to continue into 2015

AMAG saw growth across all vertical market segments, making 2014 an incredibly exciting year 2014/2015 AMAG Technology Review and Forecast: AMAG Technology saw growth across all vertical market segments, making 2014 an incredibly exciting year. End users are demanding unified, end-to-end total solutions, and I see that trend continuing into 2015 and beyond. Some users want access control and video management from the same manufacturer to eliminate integration challenges, or...

Biometrics market poised for rapid growth

2014 has been a year of significant growth for TDSi TDSi 2014/2015 Review and Forecast:In 2014 we saw continued growth at TDSI, largely through unprecedented interest in integrated IP security systems. Asian markets have continued to be very buoyant, although there have continued to be some flat spots geographically, such as Europe. Compared to other technology markets, security has grown very quickly since the recession, and TDSi has enjoyed double-digit growth. Manufa...

Optimising hospital security with physical access and identity management software

Similar to schools, airports and other semi-public facilities, hospitals and other healthcare facilities are grappling with the new reality that dictates stronger and more enforceable access restrictions. In these new circumstances, the need for security must be balanced with the individual’s need to easily move about the hospital by allowing medical staff, visitors or contract workers to go about their business with relative ease. In this article, Ajay Jain, President and CE...

Corporate data security and access control needs evolving with growth of BYOD and cloud applications

Applications that reside in the cloud offer enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprise cloud deployments now successfully up and running, plus the integration of the Bring-Your-Own-Device (BYOD) culture into the workplace, the complex issue of data security and access control have leapt to the fore. Ian Lowe, Senior Product Marketing Manager...

Security Industry Association builds on historic role developing security industry standards

The best standards are often baseline, common-denominator standards that leave room for innovation The collaboration between ONVIF and SIA to develop new access control standards is just the latest standards-related news from the Security Industry Association (SIA), the American trade association headquartered in Silver Spring, Md., near Washington, D.C.  In fact, SIA has a long history and tradition of standards development, dating back to the 1980s. SIA has produced 1...

Optimising Effectiveness and ROI for Physical Identity and Access Management Software

Ideal COTS solutions take cost, customisation and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronised and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...

“Soft” biometrics among the next wave of innovation under study

 “Soft” biometric measurements, such as gait, gender, and ethnicity offer new possibility for biometric solutions What is the next wave of biometrics? The Center for Identification Technology and Research (CITeR) is looking at the possibilities. New developments include consideration of new “soft” biometric measurements, such as gait, gender, and ethnicity. Although not accurate enough to identify a specific person, the capture and analysis of such...

CITeR working to make face, iris and fingerprint recognition systems better

There are new biometrics on the horizon, but much of current biometrics research centres on improving the biometrics we have, especially the face, iris and fingerprint recognition systems commonly deployed in the field. These systems are effective and provide good accuracy, but their usefulness is often limited by the conditions under which data is captured. Research is looking for ways to make face, iris and fingerprint biometrics more accurate in more real-world situations....

Unifying identity management and access control

For many companies, the current state of their access control infrastructure is best described as being fractured Identity management has now become a very important requirement for companies. The challenge, of course, lies in proper integration of different physical access control systems with an identity management system. Sophisticated security software can help overcome this challenge, says Ajay Jain, President and CEO of Quantum Secure, who adds that increasing regulatory...

Security software for identity management – A flexible, scalable and secure approach to manage enterprise risk

Software can combine information from various systems to create a single identity across the organisation In today's enterprise business environment, the best approach to managing risk for a known scenario is to both prepare for it and guard against it.  Effective security management necessitates credible real-time information about risk and the ability to respond to that information in a timely manner. However, that information is often not available in real-time or ma...

Identity management with virtual credentials - adding a new dimension to the access control industry

 Use of virtual credentials to manage identity is opening the access control industry to new solutionsToday's mobile phones are so much more than communication devices - they have become an indispensable consumer appliance for numerous personal, professional and entertainment applications. With the advent of Near Field Communications (NFC) technology, these mobile phones can now also be used to hold your identity keys and used to carry out numerous secure transactions, Dr. Tam Hulusi,...

Application of Public Key Infrastructure (PKI) in physical access control

  The Public Key Infrastructure is beginning to be adopted as a driver in physical access Traditionally associated with logical access and the digital signing of documents, Public Key Infrastructure (PKI) is now also being used to control physical access. Their use in physical access control is likely to be more prevalent with the implementation of the FIPS 201-2 recommendations this year. Derek Scheips of ASSA Abloy Future Lab explores the benefits of this key infr...

Iris recognition systems for access control and identity management gain popularity

The use of retinal scans for security applications is increasing The eyes have it. The use of iris recognition technology is expanding around the globe and it is being utilised in a vast array of commercial and government applications ranging from access control to time management. ASSA ABLOY Future Lab examines  how this biometric technology is breaking new ground in identity management and other security applications. Retinal vs. iris scans Often confused w...

Body field communication – new technologies for access control systems

RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...