Identity management - Expert commentary
Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organizations participated in our...
Credential form factors include mobile devices that provide a better way to open doors HID Global 2014/2015 Review and Forecast: High-profile credit card breaches during 2014 raised the profile of low-security solutions while highlighting the need for more secure smart cards. There were no real surprises, as the industry steadily continued its large-scale transition to access control platforms based on open standards. This transition sets the stage for unprecedented inno...
AMAG saw growth across all vertical market segments, making 2014 an incredibly exciting year 2014/2015 AMAG Technology Review and Forecast: AMAG Technology saw growth across all vertical market segments, making 2014 an incredibly exciting year. End users are demanding unified, end-to-end total solutions, and I see that trend continuing into 2015 and beyond. Some users want access control and video management from the same manufacturer to eliminate integration challenges, or...
Centralized PIAM provides necessary security and operational reinforcement Similar to schools, airports and other semi-public facilities, hospitals and other healthcare facilities are grappling with the new reality that dictates stronger and more enforceable access restrictions. In these new circumstances, the need for security must be balanced with the individual’s need to easily move about the hospital by allowing medical staff, visitors or contract workers to go a...
The best standards are often baseline, common-denominator standards that leave room for innovation The collaboration between ONVIF and SIA to develop new access control standards is just the latest standards-related news from the Security Industry Association (SIA), the American trade association headquartered in Silver Spring, Md., near Washington, D.C. In fact, SIA has a long history and tradition of standards development, dating back to the 1980s. SIA has produced 1...
Ideal COTS solutions take cost, customization and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronized and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...
“Soft” biometric measurements, such as gait, gender, and ethnicity offer new possibility for biometric solutions What is the next wave of biometrics? The Center for Identification Technology and Research (CITeR) is looking at the possibilities. New developments include consideration of new “soft” biometric measurements, such as gait, gender, and ethnicity. Although not accurate enough to identify a specific person, the capture and analysis of such...
There are new biometrics on the horizon, but much of current biometrics research centers on improving the biometrics we have, especially the face, iris and fingerprint recognition systems commonly deployed in the field. These systems are effective and provide good accuracy, but their usefulness is often limited by the conditions under which data is captured. Research is looking for ways to make face, iris and fingerprint biometrics more accurate in more real-world situations....
For many companies, the current state of their access control infrastructure is best described as being fractured For many companies, the current state of their access control infrastructure is best described as being fractured. Multiple disparate physical and logical access control systems and cumbersome manual processes are all too common. Standardizing one system throughout a company might address part of the problem, but replacing multiple systems may require large amounts...
Software can combine information from various systems to create a single identity across the organization In today's enterprise business environment, the best approach to managing risk for a known scenario is to both prepare for it and guard against it. Effective security management necessitates credible real-time information about risk and the ability to respond to that information in a timely manner. However, that information is often not available in real-time or ma...
The use of retinal scans for security applications is increasing The eyes have it. The use of iris recognition technology is expanding around the globe and it is being utilised in a vast array of commercial and government applications ranging from access control to time management. ASSA ABLOY Future Lab examines how this biometric technology is breaking new ground in identity management and other security applications. Retinal vs. iris scans Often confused w...
RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...