Increasing levels of cyber crime, numerous regulatory and compliance requirements, and an explosion in usage of consumer devices and applications in the workplace will drive organizational investments in security solutions in 2011, according to Unisys security experts.
Oberthur Technologies has been selected to provide its ID-One PIV smart card to members of CLEAR, Alclear LLC's Trusted Traveler program.
A recent online poll by Unisys Corp. reveals that consumers trust fingerprint biometrics over photo identification, PIN numbers or handwritten signatures to verify their identities when using a credit card or requesting personal information.
Cross Match Technologies Inc., a global provider of biometric identity solutions, is delivering its Mobile Rapid ID solution to local law enforcement in Martin County, Fla.
Intellicheck Mobilisa Inc., provider of access control and wireless security systems announced recently that the Port of Houston, Texas purchased the company’s TWIC readers and began an official pilot test using this new technology.
Biometric systems -- designed to automatically recognize individuals based on biological and behavioral traits such as fingerprints, palm prints, or voice or face recognition -- are "inherently fallible," says a new report by the National Research Council, and no single trait has been identified that is stable and distinctive across all groups. To strengthen the science and improve system effectiveness, additional research is needed at virtually all levels of design and operation.
Safran announced recently that it has entered into a definitive agreement with L-1 Identity Solutions, a identity management provider in the United States, for Safran to acquire the operating and holding company of L-1 and its biometric and enterprise access solutions, secure credentialing solutions and enrollment services businesses, for a total cash amount of $1.09 billion.
The Security Industry Association (SIA) is taking the lead on privacy protection issues with the release of a 12-item “Privacy Framework.” The Framework was drafted to address privacy concerns related to the recording of video, the collection of personally identifiable information and the use of biometrics, RFID and other security technologies.
RSA, The Security Division of EMC, recently announced that RSA Professional Services has worked with Canon U.S.A. Inc. to provide U.S. government standard encryption for its embedded platform used to validate smartcards in Canon printers, copiers and multifunction products (MFP). RSA's technology has enabled the company to sell equipment that achieves the security requirements for smart card authentication to the U.S. public sector, such as the U.S. Department of Defense.
3M and Cogent Inc. announced recently that they have entered into a definitive agreement for 3M’s acquisition of Cogent Inc. for $10.50 per share.
Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.
Multi-campus users want a new model for security and safety that offers customization today while providing easy migration or upgrades in the future. They want their next security system to be flexible, adaptable and scalable. The solution must provide the right products for their specific applications now and in the future. Users look forward to eventually incorporating emergency lockdown, Wi-Fi, network on a card, mesh networks, video analytics and other new technologies without complications.
- By Mark S. Wilson, Rick White
- Sep 01, 2010
The Port of Wilmington, which opened in 1923, is the busiest port on the Delaware River and the leading North American importation site for fresh fruit, bananas and juice concentrate. It also was the first seaport to use the TWIC card, beginning with the TWIC Technology Phase pilot program in October 2003. TWIC is designed to add a layer of security at ports by ensuring that workers in secure areas have received a background check and do not pose a national security threat.
- By Geri B. Castaldo
- Sep 01, 2010
Global Rainmakers Inc. recently announced that it will provide iris technology for the secure city initiative in Leon, Guanajuato, Mexico. Portoss, a Leon-based company, specializes in creating information systems for the law enforcement sector. This latest partnership between Portoss and the City of Leon is envisioned to create the most secure city in the world, using iris biometrics from GRI as the foundation.
Legislation that would sharply restrict the use of biometric technology in Alaska would have unintended negative consequences and “ultimately result in the use of less secure identity solutions,” the Security Industry Association (SIA) warned in a letter to the bill sponsor.
Aware Inc. recently announced that it has supplied client- and server-based software products for the PIV employee credentialing system of a large U.S. federal government agency.
HID Global recently announced that it surpassed its 100 millionth product shipment of e-government inlays and prelaminates to 28 countries worldwide this month.
In recent years, biometric security systems have moved beyond the more tradition applications -- such as access control at businesses, government facilities and ports -- and into some surprising realms.
- By Megan Weadock
- Aug 01, 2010
Since 1925, northern New Jersey has turned to Holy Name Medical Center in Teaneck for healthcare excellence. While its patient volume and service delivery have recently undergone extensive expansion, Holy Name Medical Center employed an outdated and difficult-to-maintain security system that had outlived its usefulness. Holy Name’s newly built Emergency Care Center and status as a Medical Coordination Center for disaster preparedness helped drive the funding needed to invest in a new security management system. Hospital officials chose AMAG Technology’s Symmetry Security Management System with Symmetry Video. This offered Holy Name access control, video and alarm monitoring on one platform.
- By Kim Rahfaldt
- Aug 01, 2010
The typical access control system in use today, in all too many cases, is installed in stages. As a result, it is comprised of different brands and disparate products, many of which do not integrate into the same system or talk with each other.
- By Jennifer Toscano, Jon Mooney
- Aug 01, 2010