Blog

No Company Is An Island: Collaborating for Frictionless Identification Solutions

The security industry was buzzing last week in San Antonio, Texas, with two important industry events, Milestone Integration Platform Symposium (MIPS) and AMAG Technology Security Engineering Symposium (SES), respectively. Tech partners, A&Es. industry leaders, vendors, integrators and end users came together to learn about the latest innovations and products on offer. The major topic of discussion at both shows was: where is the industry heading? The answer reverberated [...]

Read more

Reflection and Vision After Frost & Sullivan Award Win

Last week, I, along with my colleagues, Major General (res.) Aharon Zeevi Farkash, (President) Gary Drutin (CEO), Avi Naor (Board Chairman), and Ofir Friedman (VP of R&D), had the honor of attending Frost & Sullivan’s Awards Dinner in Paris to accept Frost & Sullivan’s Visionary Award for “leading the Market in biometrics-based In Motion Identification.” The award is presented annually to a “company that demonstrates the understanding to leverage global Mega Trends[...]

Read more

Thoughts from CANASA 2016

Not only are various sectors of the security industry affected by the winds of change globally, but the industry is also impacted by regional approaches to security. What holds true in certain regions could be vastly different from the needs of other locales. Earlier this month, we participated in the CANASA Security Canada Expo in Toronto, Canada, and experienced this firsthand. After meeting with some of the show’s attendees over the course of the conference, we learne[...]

Read more

For Proactive Security, Build an Aquarium

This year there has been a significant increase in global terror. From Nice to Baghdad, Istanbul to Belgium and Tel Aviv, security agencies around the world are fully engaged in trying to prevent the next attack. In my extensive career in the Israel Defense Forces, and in particular within the intelligence community, I was constantly trying to create a "formula", to look for that magic source of information that could help us prevent future attacks. And in that process, I [...]

Read more

Streamlining Enterprise Identity Management – Less Equipment, More Efficiency

The need for corporate security is continuously increasing. Corporations are looking for the best security systems to ensure that their businesses are protected from intruders, corporate espionage and other unauthorized parties’ entry and at the same time are seeking to increase efficiency and reduce costs. Though security and convenience are often at odds, these two needs don’t have to conflict. When it comes to security, many might think more is better: more cameras,[...]

Read more

Observation biometrics and Privacy: What Have You Got to Hide?

Human beings are complex. Each person has a story, and innumerable aspects and layers that come together to form a personality. As people interact with the world around them, they filter the information that they communicate about themselves to the world, allowing some things to be known, while not revealing other parts of themselves that they consider to be private. I have a friend I’ve known since childhood. I know he likes to run, sail and fish. His favorite band is T[...]

Read more

What Shutterfly and Facebook Can Teach Us About the Golden Rules of Privacy

Recently, private citizens have brought forth two biometric identification lawsuits in the United States. In one of them, a Chicago man filed a $5 million class-action lawsuit against photo-book service Shutterfly for using a tagged image of him (uploaded by a friend) to create an unsolicited account for the man on the site. The main issue is, of course, the question of individual citizens’ privacy. In fact, whenever the topic of biometric identification arises, the pr[...]

Read more

The Identity Timeline: What’s Old is New

If we rewind history 2,000 years, people living in a town or a village generally knew one another, faces were familiar, and travel, was not quite as easy as today. In other words, the average person stayed close to home during the majority of his/her life. People identified each other simply. A man might be standing outside of his home and see someone approaching from a distance. The man would be able to begin identifying the visitor based on how he walks, his height and h[...]

Read more

Access Control: How to Get the Optimal User Experience

We’ve all seen the action espionage movies in which organizations’ security is breached –either for good or for evil. Perhaps the criminal was able to crack the passcode with the use of technology, or by shining a blue light to see which keys were pressed most frequently. Or perhaps the good guys were able to obtain the ID card of an unsuspecting employee to gain access to a corporate facility. In the most gruesome cases, [...]

Read more

Focusing on the Positive

Israel is a lab for the fight against terror around the world. That is a fact. And in my 40 years of serving this country in the IDF, I was at the forefront of many innovations, technologies, inventions and strategies designed to successfully battle terrorists. I spent years in the IDF focused on finding the terrorists. And nowhere was the challenge more clear than when I would visit – as an IDF general – the Erez Crossing, the major pedestrian and cargo terminal at th[...]

Read more

Well, We’ve secured the Door – Now What

'Security': the first, second and third concern for many companies. Corporations seem to be focusing on letting the right people in, keeping the wrong ones out, and protecting their sensitive material. It all looks very impressive, as do the recent investigations into 'seamless' and 'hassle-free' secure access. Integrated security and access systems are all well and good.  If a door opens upon my approach, greets me by name and wishes me 'good day' (all without me h[...]

Read more

Need a Secure Access Solution? Make Sure You Are Assessing What Really Counts.

You’ve just been handed a budget of $100,000 to revamp your company’s security systems. You’ve assembled an internal Secure Access Improvement Committee to decide on your company’s needs. But, as with most internal committees, you have competing voices shouting over one another, giving conflicting opinions. “We should definitely get an iris scanner. It’s cool and hi-tech! It will make us look cutting edge!” “But, how effective is that really? And wil[...]

Read more

Page 1 of 11

We would love to hear from you! Please fill out the contact form below: