Blog

Biometrics and Privacy: In the Court of Public Opinion

This past month has been a hard one for biometrics and facial recognition in particular. First, the British press exploded in mid-May with reports that police where using facial recognition technology to identity people in public spaces.  Later in May, privacy advocate organizations in the United States asked Amazon to refrain from selling facial recogn[...]

Read more

Streamlining Enterprise Identity Management – Less Equipment, More Efficiency

The need for corporate security is continuously increasing. Corporations are looking for the best security systems to ensure that their businesses are protected from intruders, corporate espionage and other unauthorized parties’ entry and at the same time are seeking to increase efficiency and reduce costs. Though security and convenience are often at odds, these two needs don’t have to conflict. When it comes to security, many might think more is better: more cameras,[...]

Read more

The Identity Timeline: What’s Old is New

If we rewind history 2,000 years, people living in a town or a village generally knew one another, faces were familiar, and travel, was not quite as easy as today. In other words, the average person stayed close to home during the majority of his/her life. People identified each other simply. A man might be standing outside of his home and see someone approaching from a distance. The man would be able to begin identifying the visitor based on how he walks, his height and h[...]

Read more

Access Control: How to Get the Optimal User Experience

We’ve all seen the action espionage movies in which organizations’ security is breached –either for good or for evil. Perhaps the criminal was able to crack the passcode with the use of technology, or by shining a blue light to see which keys were pressed most frequently. Or perhaps the good guys were able to obtain the ID card of an unsuspecting employee to gain access to a corporate facility. In the most gruesome cases, [...]

Read more

Well, We’ve secured the Door – Now What

'Security': the first, second and third concern for many companies. Corporations seem to be focusing on letting the right people in, keeping the wrong ones out, and protecting their sensitive material. It all looks very impressive, as do the recent investigations into 'seamless' and 'hassle-free' secure access. Integrated security and access systems are all well and good.  If a door opens upon my approach, greets me by name and wishes me 'good day' (all without me h[...]

Read more

Need a Secure Access Solution? Make Sure You Are Assessing What Really Counts.

You’ve just been handed a budget of $100,000 to revamp your company’s security systems. You’ve assembled an internal Secure Access Improvement Committee to decide on your company’s needs. But, as with most internal committees, you have competing voices shouting over one another, giving conflicting opinions. “We should definitely get an iris scanner. It’s cool and hi-tech! It will make us look cutting edge!” “But, how effective is that really? And will th[...]

Read more

Page 1 of 11

We would love to hear from you! Please fill out the contact form below: