Iris Scanning Technology Impresses

ASIS officially ended last week, but the buzz has just begun regarding some of the latest products unveiled during the convention. As the security industry continues moving forward, preparations are already underway for the 2012 ASIS convention in Philadelphia.

It was more than overwhelming this year as a first-time attendee visiting diverse educational sessions, meeting with various exhibitors and sitting in on product demonstrations -- I’m still sifting through all of my notes one week later.

One new product that grabbed my attention was the reinvention of something commonly used in the access control and biometrics security landscape. Stanley Convergent Security Solutions and Hoyos teamed up to recreate iris identity management.

The new system featured three products, HBOX, EyeSwipe and EyeSwipe Mini. HBOX is capable of scanning retinas for up to 50 people at one time; EyeSwipe can scan 30 users per minute, while the EyeSwipe Mini can perform real-time iris recognition from a distance. Prior iris biometric technology required users to stand in one place while the technology scanned retinas for verification. HBOX readers capture iris data from a distance and while in motion. I had the opportunity to test this technology and thought it saved time and would be convenient for companies to use -- especially during rush hours.

Aside from product exhibits, the educational sessions provided imperative information regarding the world of security from the cloud to the classroom. A session on domestic violence in the workplace analyzed the crisis situation at a Panama City, Fla., school board meeting in Dec. 2010. A 56-year-old gunman opened fire on the school board claiming they were the reason for firing his wife. Session attendees provided constructive criticism on how the crisis situation could have been handled differently to prevent anyone from being shot.

The take-away from this experience has to be the fact that security is more than just one facet of software protection or surveillance video. The whole industry encompasses the security landscape ranging from biometrics to law enforcement. Running around the exhibit hall proved to be an interesting experience as Security Products magazine’s new product of the year winners proudly showcased their awards alongside product displays. I know I am looking forward to next year’s ASIS event and the vast list of entries during next year’s new product of the year competition.

About the Author

Christina Miralla is the associate content editor at 1105 Media, Inc.

Featured

  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3