Biometric Security - Expert commentary

ASIS International 2015 Brings Together Security Services, Disruptive Technologies And Technological Innovations

The pre-seminar will also offer educational sessions on cutting-edge subjects It is that time of the year again, when security industry stalwarts gather together at ASIS to showcase the latest in physical security systems and other technological innovations. The event will focus on domestic threats as well as intelligence gathering tools to protect organizations against social media threats. The organizers of the ASIS International 61st Annual Seminar and Exhibits — ASI...

ASIS 2015 Attracts End Users And Integrators With Spotlight On Latest Security And Surveillance Trends

ASIS is a great opportunity to not only learn about new technologies first hand, but also to benchmark offerings against competitors  Now in its 61st year, the American Society of Industrial Security (ASIS) Seminar & Exhibits is more than an end-user show. Many systems integrators also attend, walk the show and even exhibit to meet with potential customers and perhaps see technology they may need to apply to their clients’ security challenges and issues. This ye...

Pure IP Access Control Technology: 10 Things You Need To Know

 IP is here and is continuing to proliferate in the security industry and its next major advancement is in pure IP access control IP technologies in the security industry are nearly ubiquitous today. End users and integrators have adopted and embraced IP cameras, building automation systems, wireless mesh networks, alarms, monitoring, and regularly view all of these technologies from the palm of their hand, on their smart phone. The technologies are easier to in...

French Train Attack Highlights Challenges Of Railway Security On Inter-continental Networks

The sheer number of travelers and lack of passport control in the Schengen Area in Europe tests railroad security’s capabilities Railroad security faces the unenviable task of monitoring hundreds of thousands of passengers traveling between countries every day, and an attack on a train in Europe last month has cast a spotlight on the conflict between offering fast and efficient transport services while conducting thorough surveillance of passengers and luggage in transit...

Key Management And Access Control Systems Deter Security Breaches At Data Centers

A variety of control and usage options are available for automated key management systems in data centers The protection of networks and data centers is a growing concern given the recent spate of high profile security breaches, and it is forcing organizations into taking serious steps to improve protection. For many businesses, this means implementing a combination of passive and active security measures designed to deter, detect and react against threats. Included in these m...

Security as an integrated enterprise-wide operation in the wake of 9-11 World Trade Center terrorist attacks

9-11 caused a sharp refocus of attention on security assessment and risk management Fifteen to 20 years ago, security was a relatively sleepy, small-time business. Companies typically hired a guard or two to walk around the property, usually at night, sometimes during the day. If a guard spotted someone who wasn’t supposed to be there, he (it was usually a he) ran the person off. Larger companies had more sophisticated video and access control systems, but those systems...

Celebrating 40 Years, The Protection Bureau Continues To Lead New Technologies And Services, With A Customer Focus

The Protection Bureau is one of the top-10 security integrators in the US You really can’t talk about The Protection Bureau, Exton, Pa., without discussing its founder, the late Keith Ladd. If you’ve been in the industry any length of time, you probably had a chance to meet him. I certainly did. In fact, when I was a cub reporter with one of the first security publications I ever worked for, my inaugural visit to a customer and central station was to The Protection...

Dakota Security Systems On What Security Integrators Want From Manufacturers

Manufacturers need to come to integrators with a multi-faceted approach on how a wholesale change could be made Dakota Security Systems Inc., Sioux Falls, S.D., a security systems integration company is nearly 40 years old and started as a lock shop. Eric Yunag, president and chief executive officer, has been at the helm of the award-winning company for nearly 10 years. In an exclusive Q&A, SourceSecurity.com asked Yunag what he looks for from his manufacturer-partners. S...

Airport Security To School Safety – Effective Access Control Measures

Airport and school safety systems have undergone major changes with variety of electronic and mechanical access control products Airport security has tightened ever since the September 9/11 catastrophic event. Post-incident investigation of such events often brings to light a particular weakness in security. As a result, security and safety protocols are developed in reaction to such traumatic events. Similar to the security measures adopted by airlines, school safety systems...

Big Players, Startups, Technologies Driving Future Of Home Automation

Small-timers with big ideas can always make their way into the industry In recent years, home automation technology has given birth to the “Smart Home” in which internet-enabled and controlled devices are bringing a new level of comfort to the standard house. From locking doors to setting the temperature to opening the blinds for a view of the sunset, technology is transforming the home into something reminiscent of the now-quaint 1960s sci-fi cartoon, The Jetsons....

Voice Biometrics Improve Security Levels, Expands To Commercial Applications

Voice biometrics is fast becoming a security imperative due to increasing instances of fraud and identity theft. From identifying customers at banks and call centers to securing mobile devices in a “bring your own device” world, the use of a person’s unique “voiceprint” is fast gaining ground as an identifier. The global voice biometrics market is expected to reach $4.7 billion (U.S.) by 2020. Much of it is being driven by the increasing need to...

Tyco Lawsuit Pending; Warehouse Security Systems' Loopholes Allegedly Exploited

National Union Fire Insurance Company claims that Tyco failed to protect confidential details of the warehouse security systems A civil trial against Tyco Integrated Security was adjourned by a federal judge on July 14 and is now rescheduled for October 19. The lawsuit arose out of the burglary of a pharmaceutical warehouse in Enfield, Conn., owned by Eli Lilly. Eli Lilly’s insurance company, National Union Fire Insurance Company claims that Tyco failed to protect confid...

School Security & Safety Best Practices: Designing Physical Security Framework

School security has increasingly become an area of focus among school boards and municipalities. Officials are constantly seeking to implement or improve security and safety policies, procedures and technologies to offer the highest level of protection for students, staff and visitors. Every second counts in an emergency or crisis, making it imperative that schools have policies and procedures in place that make it possible to lock down buildings instantly while simultaneousl...

Home Automation Standards And Protocols

As the home automation industry has expanded with an ever growing number of devices and services, companies are placing bets on which wireless protocols will dominate. The past few years the leaders have been Z-Wave and ZigBee. Companies are also using a variety of other standards including Crestron’s Infinet, Insteon, and proprietary technologies such as Lutron’s ClearConnect. Next-Generation Protocols: Bluetooth And Wi-Fi “Right now companies are releasing really i...

Body Search And Airport Security – Maximizing Safety And Dignity For Travelers

A US Department of Homeland Security investigation showed that undercover agents defeated airport screening in 95 percent of cases by smuggling mock explosives and weapons past checkpoints. With admirable transparency, U.S. Office of Inspector General (OIG) has described how so-called “Red Teams” posed as regular passengers and exposed inadequate measures at some of the busiest airports across the United States. The revelations came a few days before Body Search 2...

Biometric Security: Growth And Challenges In Fingerprint Technology And New Devices

Biometrics is most useful as an additional level of authentication — determining that you are who you say you are Over the years, the growth of biometric security technology has faced challenges of cost and pushback from users. Prices have been higher than more traditional technologies. In addition, users did not advocate storage of their personal biometric data by employers or the government. “I believe this is changing,” says Rueben Orr, CPP, vice preside...

System Integration Major Theme At IFSEC 2015

When asking exhibitors at IFSEC International 2015 about what drives their markets, many cite system integration as a key factor. And they want more of it. Integration As Business “Driving Force” For example, John Davies of TDSI says customers are now seeking out system integration. “They want a solution rather than components, such as linking access control with building management systems or with an organization’s IT network to control access to its computers,”...

Day One At IFSEC 2015: Security And Beyond

Security beyond its traditional boundaries is a big theme at IFSEC 2015 The security landscape is changing. Touring exhibitors on the first day of IFSEC International in London, it seems an increasing number of vendors are offering products that go beyond what may be termed "security," offering solutions for applications such as health and safety and data collection. They are also offering more smart technology with mobile phones and tablets, and are selling smarter by tailori...

IFSEC Will Reflect Industry's Rapid Growth, Says Analyst/speaker

This year's IFSEC International show in London will provide a reflection of the physical security industry's rapid growth, especially in the video sector, says one industry observer who is also a speaker at the show, coming up 16-18 June. “If we look at the overall trend, it is no surprise to anyone that IP is driving the growth and the future of the security business,” says Jim McHale, managing director of research company Memoori, and a speaker at IFSEC. Secur...

High Growth Numbers Reflect Democratization Of Home Automation

Not too long ago the idea of home automation was strictly the province of the rich and famous. With costs that soared as high as $100,000 or more, controlling HVAC, lighting, doors and security from a single source just wasn’t in the budget for Main Street America. That was then, but now is an entirely different story. The “connected home” in which smart phones and tablets serve as controllers for Internet-enabled devices has gone mainstream. Installers are still fashioning hi...

Technology Contributes To Holistic Security Approach At K-12 Schools

Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting K-12 schools. Technology can contribute to a broader, holistic approach to security that is customized to meet the needs of each educational institution. Honeywell has helped many schools customize security systems to meet each school’s unique needs, says Bruce Montgomery, Business Deve...

Integrators Should Foster Relationships To Increase K-12 Education Sales

Integrators must understand that the K-12 market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (K-12) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience and the insight gained by putting se...

Convergence Of IT Networks And Physical Security

Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures installers that their diversity has been exaggerated. Brownell describes experiences of working with IT managers who no longer see networked CCTV and access control as ‘black arts’ and are buying into the idea of IP security as an integr...

Addressing The Unique Security Challenges Of K-12 Schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

Future Optimistic For Enhanced Usage Of Security Systems In Transportation

Better, faster networking plays into the optimistic outlook for the transportation vertical Our market has plenty of reasons to be optimistic about the future of security systems in the transportation vertical. “Given the advances in processing power and technology, we can only imagine what the capability of an IP camera will be in five years,” comments Anthony Incorvati, business development manager, critical infrastructure and transportation, Axis Communicat...

Need Help Choosing An Access Control System?

Decision-making and investigations are faster if operators don’t have to navigate among different applications Overwhelmed by too many choices for an access control system? Where do you start? Always seeking to help, SourceSecurity.com asked access control suppliers to describe what differentiating characteristics set their systems apart from others in the market. AMAG: Easy Migration, Simple Pricing Model AMAG’s Symmetry platform includes access control, photo...

Q&A: Integrator Weighs In On The Security Of Web-based Services

Cloud-based computing is here and is heavily marketed as a revolution in the security industry Dealers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input. SourceSecurity.com: What is your opinion of the security of cloud-based services? Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-se...

IP Solutions Provide Multiple Layers Of Access Control At Transit Hubs

Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to ma...

Innovation At The Reader Disrupting The Access Control Market

More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; o...

Meet Dave Tyson - ASIS 2015 President

Dave Tyson has 30 years of experience in all facets of enterprise security The incoming president of ASIS has volunteered with industry groups for years. His goal: to help people get better at their jobs. With 30 years' experience in all facets of enterprise security, Dave Tyson, CPP, CISSP, looks forward to his 2015 term as President of ASIS International (ASIS). “I’ve spent a lot of years working to make a difference in the security industry,” Tyson says...