Identity Management / Biometrics


Legit and Legal

Background screening has grown in importance as employers seek to confirm the credentials of potential new hires. It is equally important for employers to verify whether job candidates are legally eligible to work in this country.

Investing the Secure Way

At the 2007 Financial Symposium held in Europe, Sir Chris Fox, former president of the Association of Chief Police Officers in the United Kingdom, focused his remarks on the strategic and corporate responsibility of partnerships for security in the finance and banking sector. His comments of yesteryear couldn’t have been more appropriate for today’s banking and financial institution leadership.

Austrian Fire Service College Installs Kaba Access Control System

The training college for firefighters in the Austrian town of Tulln now has a modern security system. Combined with wireless linking via card (CardLink) and LEGIC contactless technology, the Kaba exos access control system allows simple cost-effective management, quick expandability and administrative flexibility.

SCM Microsystems, Hirsch Electronics Announce Merger

SCM Microsystems and Hirsch Electronics Corp. recently announced the companies have entered into a definitive agreement to merge.

Morocco Issues More Than 1 Million Biometric, Contactless ID Cards

Just seven months after the production of the first document, the Kingdom of Morocco’s national security service has already issued its millionth biometric, contactless ID cards.

Credit Union Uses Biometric Access Control System

City Credit Union, headquartered in Dallas, recently purchased and implemented US Biometrics’ AccessQ system for controlling physical access to entrances with fingerprint biometrics.

Biometric Facial Recognition Technology Helps Track Down Crime Suspect

Thanks to a biometric facial recognition system, the Pierce County Sheriff’s Department in Washington State recently made an arrest that helped break up a local identity theft ring. With the MorphoFace Investigate system from Sagem Morpho, the sheriff’s office identified the suspect by comparing a photo taken by an ATM to the department’s database of more than 350,000 mugshots.

Survey: U.S. Consumers Trust Biometric Technology For Data Protection

A recent survey conducted by Unisys finds a majority of Americans are comfortable using common biometric technologies for authentication.



Researchers Find Steps To Improve Facial Recognition Systems At Border Entry Points

Facial recognition systems perform some very challenging tasks such as checking an individual’s photo against a database of known or suspected criminals. The task can become nearly impossible when the systems acquire poor facial images -- a situation that occurs all too often in real-world environments.

Banking on Megapixel

Emprise Bank is a name well known in Kansas for leadership, integrity and service to its customers and to the community. Headquartered in Wichita, the privately owned bank has more than 40 locations in 20 communities across the state. Its culture of commitment and customer service is strongly instilled in its nearly 500 staff members.

HID Global Honored For Support Of Connecticut Career Choice Program

HID Global recently announced that its Connecticut manufacturing facility is to be honored by Lt. Gov. Michael Fedele, in recognition of the company’s efforts and continued support of the Connecticut Career Choice program.

One Size Fits All

Most people already know what ‘authentication’ is and how closely it is tied to accessing resources on the network. After some form of authentication, users typically either access resources directly or via technologies like SSO (Single Sign-On), which are then relied upon by the IT and security management as a central management console for controlling and managing access to resources across the enterprise. Unfortunately, most of us, including certified security professionals, assume that these technologies are enough to thwart fraudulent attempts to steal sensitive information.

Biometrics Penetrating Consumer Markets, According To Research

Long the domain of government and law enforcement agencies, biometric systems are increasingly moving into the market for personal data management and security, according to information from ABI Research.

AMAG Technology Helps Guide Department Of Defense To FIPS 201 Compliance

The Department of Defense issues Common Access Cards to more than 4 million military, retried military and contractors throughout the world. DoD was tasked with complying with the Federal Information Processing Standards Publication 201. FIPS 201 is a federal government standard that specifies Personal Identity Verification requirements for Federal employees and contractors.

California Hospital Uses Biometrics To Protect Patient Privacy, Safeguard Medical Records

The ValleyCare Health System in Pleasanton, Calif. is one of the first hospitals in the United States to use a palm vein authentication technology as part of its patient registration and identification system.

Panel: Airport Security Program Places New Emphasis On Stronger Identity Verification

An airport security program under way at Baltimore's Thurgood Marshall International Airport “has put a new emphasis on the need for greater use in airports of stronger identity verification technology,” according to Paul Onorato, president of the Coalition of Airline Pilots Associations.

Smart Card Alliance Creates Professional Certification Program

The Smart Card Alliance recently announced it has created the Leadership, Education and Advancement Program (LEAP) for individuals interested in continuously improving their knowledge and professional proficiency in the smart card industry.

TSA Approves Biometric Readers For TWIC Pilot

The Transportation Security Administration has approved four biometric readers from Sagem Morpho for deployment in critical pilot tests of the Transportation Worker Identification Credential program at major U.S. ports including Los Angeles, New York and Long Beach, Calif.

HID Acquires Nectar Smart Card .NET Technology

HID Global recently announced that it has acquired Nectar smart card .NET technology, based on Microsoft .NET, from StepNexus and Hive Minded.

Research: E-Passports, ID Cards Drive Up Demand For RFID Hardware

A recent report from Research and Markets says that even in the government sector, initiatives such as e-passports and RFID enabled ID cards are expected to drive demand for RFID hardware.

Featured

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities