Change Can Be Hard: Strategies for Successful Biometric Implementation
In our previous blog, ‘Biometric Adoption: Does it have to be all or nothing?’ we discussed the concept of easing in to biometric adoption rather than ‘forcing’ change. In this post, we’ll delve into practical strategies to implement partial adoption, in ways that are comfortable for users and simultaneously benefit the organizations. Newer technology at its best is almost always faster[...]
Biometric Adoption: Does it have to be all or nothing?
Starting in 1953, New York City subway riders paid with tokens – a solution that came to be when engineers couldn’t figure out how to create a machine that accepted the different types of coins for what was then a 15-cent fare. The subway token was – in its own way – a technology solution to a technical challenge. Of course, by 1993, innovation had progressed, and the Metropolitan Transportation Authority (MTA) began implementing the MetroCard, a lighter, more auto[...]
ISC West: Be a Pioneer, Then Set the Standard
Early adopters of technology are pioneers. They are willing to take a risk with new technologies and work out the kinks until that technology is ready for mass-market adoption. After all, the first generation of the iPhone is vastly different to the latest model used by millions of consumers around the world. At this year’s ISC West, FST Biometrics made the shift from being a technology for the early adopters, to being a technology for the mass market. Our early adopters[...]
No Company Is An Island: Collaborating for Frictionless Identification Solutions
The security industry was buzzing last week in San Antonio, Texas, with two important industry events, Milestone Integration Platform Symposium (MIPS) and AMAG Technology Security Engineering Symposium (SES), respectively. Tech partners, A&Es. industry leaders, vendors, integrators and end users came together to learn about the latest innovations and products on offer. The major topic of discussion at both shows was: where is the industry heading? The answer reverberated [...]
Streamlining Enterprise Identity Management – Less Equipment, More Efficiency
The need for corporate security is continuously increasing. Corporations are looking for the best security systems to ensure that their businesses are protected from intruders, corporate espionage and other unauthorized parties’ entry and at the same time are seeking to increase efficiency and reduce costs. Though security and convenience are often at odds, these two needs don’t have to conflict. When it comes to security, many might think more is better: more cameras,[...]
Observation biometrics and Privacy: What Have You Got to Hide?
Human beings are complex. Each person has a story, and innumerable aspects and layers that come together to form a personality. As people interact with the world around them, they filter the information that they communicate about themselves to the world, allowing some things to be known, while not revealing other parts of themselves that they consider to be private. I have a friend I’ve known since childhood. I know he likes to run, sail and fish. His favorite band is T[...]
What Shutterfly and Facebook Can Teach Us About the Golden Rules of Privacy
Recently, private citizens have brought forth two biometric identification lawsuits in the United States. In one of them, a Chicago man filed a $5 million class-action lawsuit against photo-book service Shutterfly for using a tagged image of him (uploaded by a friend) to create an unsolicited account for the man on the site. The main issue is, of course, the question of individual citizens’ privacy. In fact, whenever the topic of biometric identification arises, the pr[...]
The Identity Timeline: What’s Old is New
If we rewind history 2,000 years, people living in a town or a village generally knew one another, faces were familiar, and travel, was not quite as easy as today. In other words, the average person stayed close to home during the majority of his/her life. People identified each other simply. A man might be standing outside of his home and see someone approaching from a distance. The man would be able to begin identifying the visitor based on how he walks, his height and h[...]
Access Control: How to Get the Optimal User Experience
We’ve all seen the action espionage movies in which organizations’ security is breached –either for good or for evil. Perhaps the criminal was able to crack the passcode with the use of technology, or by shining a blue light to see which keys were pressed most frequently. Or perhaps the good guys were able to obtain the ID card of an unsuspecting employee to gain access to a corporate facility. In the most gruesome cases, [...]
Well, We’ve secured the Door – Now What
'Security': the first, second and third concern for many companies. Corporations seem to be focusing on letting the right people in, keeping the wrong ones out, and protecting their sensitive material. It all looks very impressive, as do the recent investigations into 'seamless' and 'hassle-free' secure access. Integrated security and access systems are all well and good. If a door opens upon my approach, greets me by name and wishes me 'good day' (all without me h[...]
Need a Secure Access Solution? Make Sure You Are Assessing What Really Counts.
You’ve just been handed a budget of $100,000 to revamp your company’s security systems. You’ve assembled an internal Secure Access Improvement Committee to decide on your company’s needs. But, as with most internal committees, you have competing voices shouting over one another, giving conflicting opinions. “We should definitely get an iris scanner. It’s cool and hi-tech! It will make us look cutting edge!” “But, how effective is that really? And wil[...]