ISC West: Be a Pioneer, Then Set the Standard

Early adopters of technology are pioneers. They are willing to take a risk with new technologies and work out the kinks until that technology is ready for mass-market adoption. After all, the first generation of the iPhone is vastly different to the latest model used by millions of consumers around the world. At this year’s ISC West, FST Biometrics made the shift from being a technology for the early adopters, to being a technology for the mass market. Our early adopters[...]

Read more

No Company Is An Island: Collaborating for Frictionless Identification Solutions

The security industry was buzzing last week in San Antonio, Texas, with two important industry events, Milestone Integration Platform Symposium (MIPS) and AMAG Technology Security Engineering Symposium (SES), respectively. Tech partners, A&Es. industry leaders, vendors, integrators and end users came together to learn about the latest innovations and products on offer. The major topic of discussion at both shows was: where is the industry heading? The answer reverberated [...]

Read more

Streamlining Enterprise Identity Management – Less Equipment, More Efficiency

The need for corporate security is continuously increasing. Corporations are looking for the best security systems to ensure that their businesses are protected from intruders, corporate espionage and other unauthorized parties’ entry and at the same time are seeking to increase efficiency and reduce costs. Though security and convenience are often at odds, these two needs don’t have to conflict. When it comes to security, many might think more is better: more cameras,[...]

Read more

Observation biometrics and Privacy: What Have You Got to Hide?

Human beings are complex. Each person has a story, and innumerable aspects and layers that come together to form a personality. As people interact with the world around them, they filter the information that they communicate about themselves to the world, allowing some things to be known, while not revealing other parts of themselves that they consider to be private. I have a friend I’ve known since childhood. I know he likes to run, sail and fish. His favorite band is T[...]

Read more

What Shutterfly and Facebook Can Teach Us About the Golden Rules of Privacy

Recently, private citizens have brought forth two biometric identification lawsuits in the United States. In one of them, a Chicago man filed a $5 million class-action lawsuit against photo-book service Shutterfly for using a tagged image of him (uploaded by a friend) to create an unsolicited account for the man on the site. The main issue is, of course, the question of individual citizens’ privacy. In fact, whenever the topic of biometric identification arises, the pr[...]

Read more

The Identity Timeline: What’s Old is New

If we rewind history 2,000 years, people living in a town or a village generally knew one another, faces were familiar, and travel, was not quite as easy as today. In other words, the average person stayed close to home during the majority of his/her life. People identified each other simply. A man might be standing outside of his home and see someone approaching from a distance. The man would be able to begin identifying the visitor based on how he walks, his height and h[...]

Read more

Access Control: How to Get the Optimal User Experience

We’ve all seen the action espionage movies in which organizations’ security is breached –either for good or for evil. Perhaps the criminal was able to crack the passcode with the use of technology, or by shining a blue light to see which keys were pressed most frequently. Or perhaps the good guys were able to obtain the ID card of an unsuspecting employee to gain access to a corporate facility. In the most gruesome cases, [...]

Read more

Well, We’ve secured the Door – Now What

'Security': the first, second and third concern for many companies. Corporations seem to be focusing on letting the right people in, keeping the wrong ones out, and protecting their sensitive material. It all looks very impressive, as do the recent investigations into 'seamless' and 'hassle-free' secure access. Integrated security and access systems are all well and good.  If a door opens upon my approach, greets me by name and wishes me 'good day' (all without me h[...]

Read more

Need a Secure Access Solution? Make Sure You Are Assessing What Really Counts.

You’ve just been handed a budget of $100,000 to revamp your company’s security systems. You’ve assembled an internal Secure Access Improvement Committee to decide on your company’s needs. But, as with most internal committees, you have competing voices shouting over one another, giving conflicting opinions. “We should definitely get an iris scanner. It’s cool and hi-tech! It will make us look cutting edge!” “But, how effective is that really? And wil[...]

Read more

Page 1 of 11

We would love to hear from you! Please fill out the contact form below: