Unisys: Biometrics Set To Boom In 2010

Slashed budgets and reduced staffing numbers delayed many security initiatives in 2009, but the vulnerabilities didn’t retreat and will only intensify in 2010, Unisys security experts predict.

Looking ahead to 2010, Unisys predicts that government and commercial organizations will take a more proactive approach to security, implementing new measures to verify identity and protect confidential information. Financial institutions and defense agencies will lead the charge, with ports and other organizations quickly following.

“Given the potential harm that can result from new and more dangerous forms of attacks, both physical and virtual, organizations can no longer afford to wait until they are attacked to defend themselves,” said Sid Pearl, global director of Risk Intelligence Solutions Management with Unisys. “They will begin to more closely monitor behaviors and identities in an effort to predict and prevent attacks before they happen.”

Unisys believes the following seven security trends will emerge in 2010 as business and government agencies look to protect data and strengthen identification methods:

1. The consumerization challenge -- Consumerization of IT will continue to blur the perimeters of the enterprise network. As a result, Unisys experts predict organizations’ focus will shift to data protection as opposed to traditional network security or infrastructure security. As more employees and consumers use smartphones and PDAs to conduct business transactions online, organizations will look for new ways to protect data beyond simple PINs and passwords. As consumer devices are increasingly targeted by malware and spyware, users will demand that security platforms and anti-fraud applications need to be strengthened and continually updated to ensure the protection of mobile online transactions.

2. A good offense -- Trojan attacks will continue to plague financial institutions and government agencies. Therefore, these organizations will need to take an offensive stance to better guard their data against increasingly sophisticated and harmful threats. Unisys experts predict that banks and government agencies will adopt a more comprehensive, integrated view of their IT environments and will seek to better understand the human element behind illegal activities to help them pinpoint in advance when and where and how attacks are likely to happen.

3. Proactive ports -- Port security officials will take a more predictive, proactive approach to preventing threats at key ports of entry. Rather than focusing on mere compliance with security standards, Unisys security experts predict that ports will actively begin assessing risks, simulating response efforts and creating more robust disaster recovery plans in the coming year. In addition, Unisys predicts an increase in U.S. land-based port cargo activity as Asian shipping lanes divert shipments from the congested sea ports of Los Angeles and Long Beach, Calif., to Canadian and Mexican ports. Pressure will increase to rapidly scan cargo shipments as they cross land borders into the U.S.

4. Cloudy forecast -- Organizations will also begin to reverse the tendency of “protecting everything” and instead prioritize security controls based on whether the data in question presents low, moderate or high levels of risk. Consequently, more organizations will begin moving less sensitive public data into cloud computing environments to attain cost savings in 2010, and will then migrate more sensitive data to the cloud as new security models are developed to address multi-tier data protection.

5. Biometrics on the border -- The coming year will see a tipping point in use of biometric identification tools such as iris, facial or fingerprint scans, to verify identity at the border and customs areas in airports. Unisys experts point out that many governments have invested in an electronic passport infrastructure, but not yet used it. Unisys expects increased rollout of electronic passports which contain a chip to store biometric data that can be matched to its owner to verify that the person carrying the passport is the owner of the passport. Unisys predicts that the rollout electronic passports will be led by countries in the Asia-Pacific region and Europe. The Unisys Security Index recently found a majority of people globally would accept biometric authentication to verify their identities.

6. Taking IT to the streets -- Mobile biometric devices will allow governments to take more biometric-based critical services directly to their citizens, rather than requiring their citizens to come to the technology. Police forces in the U.S. and U.K. have already started using mobile fingerprint scanners to facilitate faster processing. In Australia, police officers can use the device to access the national fingerprint database from the field to scan the criminal database for a match. Such devices will also aid in the identification of individuals in a disaster situation.

7. Smart surveillance -- Surveillance systems will be become more sophisticated and intelligent. Unisys experts say that real time event detection technology will soon be able to identify a security breach as it occurs and initiate an action instead of simply recording footage to be reviewed after the incident. Improved digital camera technology coupled with intelligent software enables surveillance footage to be combined with other available information, such as facial recognition data, to create alerts so that immediate appropriate action can be taken. Surveillance software will also soon be able to recognize recurring patterns, or individuals to detect when an unusual event is occurring in real-time.


 

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3