One New and One Popular Security Trend Discovered at ASIS 2014

There's a particular hum at all tradeshows: the sound of voices talking and electronic devices interjecting their digital sounds, a cross between human and machine. Yet, each tradeshow has a feel all its own. This year, ASIS 2014 seems to come in "waves."

Circulating throughout the showroom floor, I am privy to a lot of comments that are meant for the listener only. As not to disclose any information that is to be held in top confidentiality, I can say this, I heard more than one exhibitor say that they would receive an influx of people and then things seem to calm down, partly because there are educational sessions taking place in conjunction with the exhibits. Not that this is necessarily considered "good" or "bad," just an observation.

It was through these "waves" that I was able to learn of a new trend as well as learn of one of the most popular trends in the security industry.

Starting with one of the most popular trends, HID Global's Jeremy Hyatt, director, global public relations and corporate communications, said that it's all about mobile and mobility, being able to take your credentials with you.

As the traditional PROXY card shifts to the mobile category, HID enables the use of NFC technology or Bluetooth LE to create the convenience of virtual credentials. And, it not just about the tap of a card anymore. Users can stand a few feet away from the card reader, face their smartphone toward it and HID's SEOS technology identifies the individual. Then, with the twist of the smartphone, Bluetooth LE is engaged, allowing communication to the card reader. Access granted or access denied.

The new emerging trend was when I found Waldo at ASIS 2014. (Yes, I'm talking about the guy with the round, black rimmed glasses and the red and white striped hat! He was there!) Anyway, the new trend, identified to me by Solink, is found in the retail security market: loyalty fraud.

Most shoppers are aware of reward cards offered by most retail stores these days. You know the drill: the clerk asks for your card or phone number in order for you to accumulate points toward a reward for shopping at a particular store. However, if you're like me, I tend to forget these cards. So, the employee politely says, "That's okay," and I notice him/her swipe a card anyway. This could be fraud!

Retail employees are seeing the value of unused points from shoppers, so they are capitalizing on them by swiping their reward card for the customer's purchases, gaining value points from the items you and I typically purchase. Well, it's the start of day two of ASIS 2014. Wonder what I'll discover today?

About the Author

Ginger Hill is Group Social Media Manager.


  • A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

Featured Cybersecurity

New Products

  • ABLOY IP54-rated Integrated Dust Cover

    ABLOY IP54-rated Integrated Dust Cover

    One of the things that keep security managers on high alert is the real possibility the security locks used to safeguard their properties may unexpectedly fail due to environmental conditions. 3

  • ComNet NW1 Gen 4

    ComNet NW1 Gen 4

    ComNet, Communication Networks, is announcing the introduction of its Generation 4 line of NetWave® wireless products that offer greater performance and increased stability in applications where throughput and increased bandwidth is increasingly important. 3

  • BIO-key MobileAuth

    BIO-key MobileAuth

    BIO-key International has introduced its new mobile app, BIO-key MobileAuth™ with PalmPositive™ the latest among over sixteen strong authentication factors available for BIO-key's PortalGuard® Identity-as-a-Service (IDaaS) platform. 3