Identity Management / Biometrics


Legit and Legal

Background screening has grown in importance as employers seek to confirm the credentials of potential new hires. It is equally important for employers to verify whether job candidates are legally eligible to work in this country.

Investing the Secure Way

At the 2007 Financial Symposium held in Europe, Sir Chris Fox, former president of the Association of Chief Police Officers in the United Kingdom, focused his remarks on the strategic and corporate responsibility of partnerships for security in the finance and banking sector. His comments of yesteryear couldn’t have been more appropriate for today’s banking and financial institution leadership.

Austrian Fire Service College Installs Kaba Access Control System

The training college for firefighters in the Austrian town of Tulln now has a modern security system. Combined with wireless linking via card (CardLink) and LEGIC contactless technology, the Kaba exos access control system allows simple cost-effective management, quick expandability and administrative flexibility.

SCM Microsystems, Hirsch Electronics Announce Merger

SCM Microsystems and Hirsch Electronics Corp. recently announced the companies have entered into a definitive agreement to merge.

Morocco Issues More Than 1 Million Biometric, Contactless ID Cards

Just seven months after the production of the first document, the Kingdom of Morocco’s national security service has already issued its millionth biometric, contactless ID cards.

Credit Union Uses Biometric Access Control System

City Credit Union, headquartered in Dallas, recently purchased and implemented US Biometrics’ AccessQ system for controlling physical access to entrances with fingerprint biometrics.

Biometric Facial Recognition Technology Helps Track Down Crime Suspect

Thanks to a biometric facial recognition system, the Pierce County Sheriff’s Department in Washington State recently made an arrest that helped break up a local identity theft ring. With the MorphoFace Investigate system from Sagem Morpho, the sheriff’s office identified the suspect by comparing a photo taken by an ATM to the department’s database of more than 350,000 mugshots.

Survey: U.S. Consumers Trust Biometric Technology For Data Protection

A recent survey conducted by Unisys finds a majority of Americans are comfortable using common biometric technologies for authentication.



Researchers Find Steps To Improve Facial Recognition Systems At Border Entry Points

Facial recognition systems perform some very challenging tasks such as checking an individual’s photo against a database of known or suspected criminals. The task can become nearly impossible when the systems acquire poor facial images -- a situation that occurs all too often in real-world environments.

Banking on Megapixel

Emprise Bank is a name well known in Kansas for leadership, integrity and service to its customers and to the community. Headquartered in Wichita, the privately owned bank has more than 40 locations in 20 communities across the state. Its culture of commitment and customer service is strongly instilled in its nearly 500 staff members.

HID Global Honored For Support Of Connecticut Career Choice Program

HID Global recently announced that its Connecticut manufacturing facility is to be honored by Lt. Gov. Michael Fedele, in recognition of the company’s efforts and continued support of the Connecticut Career Choice program.

One Size Fits All

Most people already know what ‘authentication’ is and how closely it is tied to accessing resources on the network. After some form of authentication, users typically either access resources directly or via technologies like SSO (Single Sign-On), which are then relied upon by the IT and security management as a central management console for controlling and managing access to resources across the enterprise. Unfortunately, most of us, including certified security professionals, assume that these technologies are enough to thwart fraudulent attempts to steal sensitive information.

Biometrics Penetrating Consumer Markets, According To Research

Long the domain of government and law enforcement agencies, biometric systems are increasingly moving into the market for personal data management and security, according to information from ABI Research.

AMAG Technology Helps Guide Department Of Defense To FIPS 201 Compliance

The Department of Defense issues Common Access Cards to more than 4 million military, retried military and contractors throughout the world. DoD was tasked with complying with the Federal Information Processing Standards Publication 201. FIPS 201 is a federal government standard that specifies Personal Identity Verification requirements for Federal employees and contractors.

California Hospital Uses Biometrics To Protect Patient Privacy, Safeguard Medical Records

The ValleyCare Health System in Pleasanton, Calif. is one of the first hospitals in the United States to use a palm vein authentication technology as part of its patient registration and identification system.

Panel: Airport Security Program Places New Emphasis On Stronger Identity Verification

An airport security program under way at Baltimore's Thurgood Marshall International Airport “has put a new emphasis on the need for greater use in airports of stronger identity verification technology,” according to Paul Onorato, president of the Coalition of Airline Pilots Associations.

Smart Card Alliance Creates Professional Certification Program

The Smart Card Alliance recently announced it has created the Leadership, Education and Advancement Program (LEAP) for individuals interested in continuously improving their knowledge and professional proficiency in the smart card industry.

TSA Approves Biometric Readers For TWIC Pilot

The Transportation Security Administration has approved four biometric readers from Sagem Morpho for deployment in critical pilot tests of the Transportation Worker Identification Credential program at major U.S. ports including Los Angeles, New York and Long Beach, Calif.

HID Acquires Nectar Smart Card .NET Technology

HID Global recently announced that it has acquired Nectar smart card .NET technology, based on Microsoft .NET, from StepNexus and Hive Minded.

Research: E-Passports, ID Cards Drive Up Demand For RFID Hardware

A recent report from Research and Markets says that even in the government sector, initiatives such as e-passports and RFID enabled ID cards are expected to drive demand for RFID hardware.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.