Identity Management / Biometrics


Solution Helps Reduce Fingerprint Software False Reject Rates

M2SYS, a biometric technology research and development firm, recently released Bio-AI. The artificial intelligence enhancement uses a unique "dynamic profiling" technique to learn about a person's fingerprints over time.

Analysis: Integrated Smart Card, Biometric Technology Market Expected To Soar

Although integrated smart cards and biometrics technology is only at an early growth phase, the stage is being set for its exceptional growth. New analysis from Frost & Sullivan APAC Integrated Smart Cards and Biometrics Markets, finds that the market earned $249.1 million in 2007 and is expected to reach $822.2 million by 2013.

Survey: Workers Overwhelmed With Passwords

Siber Systems Inc. recently announced the results of a poll on password use involving more than 600 U.S. IT professionals. The survey, administered through business data company eMedia, found that U.S. workers, managers and IT staffs alike are increasingly confronted with difficulties arising from computer passwords.

Survey: Majority Of Government IT Professionals Believe Identity Management Importance Will Increase

Quest Software Inc. recently announced the results of its Identity Management Government Survey of federal, state, local and municipal government IT professionals.

Indiana Blood Center Uses Biometrics To Enhance Convenience, Security Of Identifying Blood Donors

BIO-key International Inc. recently announced that the Indiana Blood Center is deploying BIO-key's WEB-key biometric identification technology to enhance the convenience and security of identifying blood donors.

HID Global, ASSA ABLOY Identification Technologies Merge

HID Global recently announced that it has joined forces with the ASSA ABLOY Identification Technologies (ITG).

The Business of Knowing

You’ve all seen that guy in the hallway: that unfamiliar face. “He must be the new guy.” “He must be here for a meeting.” “Isn’t he Jane’s husband?” “He probably works for facility management.” In too many cases, employee simply do not know who or why that person is wandering around the premises

A Growing Threat

In the United States, people encounter a perpetual tradeoff between freedom and security. The nation depends on a complex system of critical infrastructures to maintain a high quality of life and the freedoms enjoyed every day. New threats to security have these organizations taking a second look at their vulnerabilities, however, scrambling to minimize disruption and to maintain the integrity of their operations. In the past, national security was perceived as the role of government. Today, Department of Homeland Security efforts to protect critical infrastructures from physical attack are a shared responsibility of the public and private sectors, as well as individual citizens.



Just Say No

Administrators at Haltom High School in Haltom City, Texas, wanted their school’s ID cards to be useful, but never did they imagine the cards would help thwart a drug dealer. “We have used student and faculty ID cards for the last decade,” said Rick Mauderer, associate principal at Haltom High School and the person responsible for the school’s ID program. “As a high school of more than 2,600 students, there is no way we can know who every student is, especially with substitute teachers in the building.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.