Identity Management / Biometrics


Two Big Problems with Fingerprint Security

Two Big Problems with Fingerprint Security

One tech expert says biometrics are good, but there are still problems to consider.

Using Present Card Readers, Organizations Can Now Easily Add Biometrics

Using Present Card Readers, Organizations Can Now Easily Add Biometrics

More and more, security professionals using card-based front ends for their access control systems have been worried about the security of their proximity systems. They know that for $200 or less, their proximity system can be violated.

Wearable Camera Wobble Identifies Filmmaker

Wearable Camera Wobble Identifies Filmmaker

Just because your face isn’t seen on camera doesn’t mean you are anonymous.

Eid Passport Awarded One-year Contract Extension as FBI-approved Channeler

Among a few companies authorized to process FBI fingerprint-based criminal history checks for non-criminal justice purposes.

Advantech, Inc. Recognized as Top Performing Security Integrator

Named “Integrator of the Year” for fourth time at Honeywell Forum.

7-year-old Hacks Apple Touch

7-year-old Hacks Apple Touch

Stealthy youngster uses ninja-like skills to gain access to his father's iPhone6.

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

The ruling doesn’t allow police to unlock phones using passcodes, however.

Tyco Brings CEM to Americas

The security products company brings its brand of intelligent access control solutions over.



The New Landscape

Managing access privileges for visitors, contractors and vendors in hospitals is a significant challenge for healthcare institutions.

Your Biometric Accepted Here

Your Biometric Accepted Here

While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.

Fit for Security

Fit for Security

To say I’m sold on biometrics for athletic clubs after using the Hand- Key since 1995 is an understatement. Back then, we were remodeling our check-in area. While doing so, we decided to re-evaluate our check-in software.

Body Odor Biometrics for Identity Verification

Body Odor Biometrics for Identity Verification

Hey, what's that smell? Oh, that's just Bob strolling through the entry point.

Biometric Technology Added to E-cigarettes

Biometric Technology Added to E-cigarettes

"Biometric vaporizer" biometrically identifies the user or users, unlocking it to inhale, rendering it useless should it get stolen.

Through several stages of card technologies, organizations still didn’t know who was carrying the card

Finding Biometrics

For more than 20 years, biometric hand geometry systems have been providing the highest level of security, access control and convenience in a wide range of applications all over the world.

Lumidigm Fingerprint Sensors Help Track Vaccination Histories of Children in Developing Countries

Lumidigm Fingerprint Sensors Help Track Vaccination Histories of Children in Developing Countries

Biometric vaccine records are now in place for tens of thousands of adults and children in Kenya, Uganda, Benin and Zambia.

Identity, the New Security Perimeter

Identity, the New Security Perimeter

Whether traveling, working from home, in flex offices or a conference room at a home office, we expect information access to be immediate and communication via voice, chat, text or email to be always available.

Leveraging Lumidigm Sensors with Innometriks New Rhino Touch Makes Self Service Validation Easy

Leveraging Lumidigm Sensors with Innometriks New Rhino Touch Makes Self Service Validation Easy

Introducing the Rhino Touch at ISC West in Innometrik's booth #22126.

Think Ink

As the number of applications that require visual authentication and increased security grows, identification cards are commonly taken as a cost-of-entry to ensure physical security and access.

Boosting Identity

Today, decision makers can raise the bar on enterprise security without raising the complexity for their users.

New Facebook App to Detect "Unfriendly" Friends

Ben-Gurion University of the Negev (BGU) undergraduate students have developed a new privacy solution for Facebook.

Featured

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.