Go to any hospital or healthcare provider, and you’ll always see things moving -- staff, equipment, medicine and, most important of all, patients.
- By Brent Dirks
- Oct 03, 2007
Since September 2001, the nation has undergone some significant changes in the way it addresses transportation security and, particularly, identity verification. For example, the TWIC program, governed under the auspices of the Transportation Security Administration, now requires that every transportation employee in America, at every port, terminal and station, be positively identified by a government-authorized credential in the form of a smart card.
- By John Petze
- Oct 02, 2007
Bioscrypt Inc., a provider of enterprise access control technology, recently announced that its V-Station MIFARE V9.50 has been approved by the Transportation Security Administration and placed on the TSA's "Biometrics for Access Control" Qualified Products List (QPL).
ImageWare Systems Inc., a developer of identity management solutions, recently announced a strategic, multi-year licensing agreement with Lockheed Martin for its Automated Fingerprint Identification System (AFIS).
Fortress Technologies, a provider of security and secure wireless solutions, recently announced that it successfully demonstrated a secure, wireless backbone as part of a deployable RFID “kit” during a III Marine Expeditionary Force exercise in Gladstone Port, Australia.
Starting Oct. 15, TransUnion will offer consumers in all 50 states the ability to freeze access to their credit files.
THE success of an identity management program begins at the heart of an organization’s business strategy. Ryerson, a leading distributor and processor of metal, based in Chicago, is guided by three fundamental principles, one of which is an intense focus on operating efficiency.
- By Sharon Steinhoff-Smith
- Sep 21, 2007
While biometrics continue the march toward mainstream acceptance, the United Kingdom is using fingerprint information from visa applicants to protect the country’s borders.
- By Brent Dirks
- Sep 18, 2007
BIO-key International Inc. and Tiger IT recently announced a project to deliver a biometric-based credentialing solution for the Bangladeshi Voter Registration Project.
LaserCard Corp. and Tesla Motors recently announced the successful implementation of an optical memory card-based LaserPass Secure Access System for Tesla's corporate headquarters in San Carlos, Calif.
NEC Corp. has developed a multi-RFID reader/writer (a device that can both read and write tag data) supporting three major RFID (IC) tag frequencies (13.56MHz, UHF band and 2.45GHz), as well as the world's most used protocols
According to the poll, 89 percent of Americans agree that state and federal lawmakers should pass laws restricting the use of Social Security numbers.
The company believes that this patent is valuable in the portable lock market. For many years, consumers have been using portable locks, such as padlocks and combination locks, to secure personal belongings in lockers and storage cabinets.
EARLIER this year, information technology and computer security publications buzzed with reports that RFID-based proximity cards could be cloned.
- By Joerg Borchert
- Sep 05, 2007
Under the terms of the merger agreement, Saflink will acquire all of the outstanding shares of IdentiPHI in a stock-for-stock transaction.
When managers at Ingersoll Rand sought to enhance the efficiency of their dealer sales channel, they turned to a Web access and identity management solution for help. This global manufacturer of industrial products and services distributes some of the world’s most popular industrial brands.
- By Jim McDonald
- Sep 01, 2007
With almost every major PC manufacturer integrating silicon chip fingerprint sensors in their products, the market appears set to thrive.
Security is always a selling point for the self-storage industry and customers who take advantage of having an extra place to store everything under the sun.
- By Brent Dirks
- Aug 30, 2007
DISPELLING myths and misunderstandings about biometrics and its increasingly common use in everyday professional and personal lives is a tough task, even in these modern, technologically-advanced times.
- By Mizan Rahman
- Aug 17, 2007
- By Brent Dirks
- Aug 06, 2007
HIRSCH Electronics is no stranger to introducing new products or winning accolades among its peers. From the competition at ISC West, Hirsch won a special achievement award in the Security Industry Association's New Product Showcase in Las Vegas. We thought readers should know more about the RUU-201 Verification Station, so we talked to Scott Howell of Hirsch Electronics.
- By Security Products Staff
- Aug 02, 2007
IN some cases, companies implementing biometrics will initially encounter employee resistance, with the issues of privacy and hygiene taking center stage. This will invariably be the case if a union is involved and is looking for negotiating points.
- By Jon Mooney
- Aug 01, 2007
IDENTITY theft has changed the public's perspective on financial security. Phising scams take consumers to Web sites almost identical to their trusted bank, a stolen driver license can lead to forged checks, a stolen Social Security number can open numerous credit card accounts and card cloning has left the public vulnerable.
- By Katie McCarthy
- Jul 01, 2007
CONTRARY to using badges, sign-ins or other ways of tracking employees, a biometric reader ensures no employee can punch in for another, eliminating time fraud and reducing payroll costs. Because every person's biometric features—hand, fingerprint, eye or face—are unique, a biometric time clock provides a quick, accurate and reliable way to record in and out punches for each employee. That’s why so many companies, including fast food restaurants, now employ biometrics.
- By Bashar Masad
- May 30, 2007
Raising the bar is a phrase commonly associated with pole vaulting or high jumping. At the Utah Summer Games, officials also are raising the bar on efficiency and security with a speedier, more stringent ID card program for athletes.
- By Charlie Ross
- Apr 27, 2007
NETWORK access control is one of the hottest topics in IT today. Despite this, available approaches are either fragmented or not ready for widespread implementation. In order to understand this phenomenon, users must evaluate current approaches and understand the process of implementing a NAC solution.
When implementing network access control, the first set of decisions that need to be made regarding network policy. The first necessary question for a NAC project is: Why does it need to be implemented and what is expected from implementation?
- By Richard Hyatt
- Apr 09, 2007
IN recent years, investigative reporters have uncovered security vulnerabilities in what are believed to be closely monitored applications: school buildings. In too many instances, investigators are able to slip into school buildings without being stopped, and administrators find out about the security breach on the evening news.
- By Steve Blake
- Feb 05, 2007
IT'S a simple enough request at most companies -- the last person to leave the office should lock the doors. But many times, one of the most basic tenants of access control can be compromised by something as simple as a forgetful employee.
- By Brent Dirks
- Feb 05, 2007