Author: dtaitano

Congressman: Seaport Biometric Card Deployment ‘A Joke’

The biometric cards, called Transportation Worker Identification Credentials (TWICs), are intended for government workers at the ports. The issue is that when the Department of Homeland Security decided to issue them after the terrorist attacks of 9/11, it failed to specify approved card readers or any meaningful guidelines on how they should be used, other than requiring that workers, truckers, and others involved in transportation related to the port had to have them.

Geutebruck G-Scope 3000 Desktop

The range of applications in video security continues to grow. Camera images fulfill ever more functions in addition to tradition tasks of securing buildings and premises. It is therefore not surprising that the number of cameras needed in an object can quickly exceed the previously customary order of magnitude for compact systems. However, large server systems are complex to install and expensive to maintain.

Suprema and Axxon Intellect PSIM Software Integration

Suprema, a leader in biometrics and security technology, has announced integration of Axxon Intellect PSIM software with Suprema biometric technology. The seamless integration leverages power of true identity and combines it with an intelligent video analytics platform to provide flexible, convenient and yet highly secure security system.

Who Owns Your Face?

A face, though—that’s different. We’re stuck with our faces. It’s prohibitively expensive to change them beyond recognition, if it’s even possible. Facial recognition and other biometrics bind data about us to us like nothing else. And, once corporate metadata can recognize and glom onto our bodies—in all their “everlasting sameness”—we can never escape that link.

10 Reasons Why Biometrics Won’t Replace Passwords Anytime Soon

News has emerged that hackers have successfully duplicated copies of fingerprints used to unlock the Samsung Glazy S5 phone. According to security firm, FireEye, who will give a presentation at today’s RSA conference on the matter, a flaw in Android makes it possible to steal the personal information so it can be used elsewhere.

Technology Is Growing Accustomed to Our Face

As these technologies surge forward and spread outward, there are mounting legal questions about how they’re used, and more importantly, how we consent to that use. One lawsuit underway in Illinois against Facebook (and a similar case in that state against Shutterfly) accuses the service of running afoul of state “biometric privacy” statutes (laws that remain unique to Illinois and Texas).

Retail Gets Its Shrink On

While the news from the 2015 National Retail Security Survey wasn’t all great – with retailers having suffered losses in the previous year to the tune of $44 billion – there was, it turns out, a silver lining. The overall shrink percentage reported – 1.38 percent – was actually the lowest in the 24-year history of the survey.

CNET’s DIY Security Camera Buying Guide

CNET has just published a very good round up of DIY security home cameras. The article is a fairly comprehensive review of 23 cameras for the home market. Accordingly, these cameras are described as offering simplicity, mobility, advanced feature sets, smart home integration, etc. CNET has put the guide together to simplify the purchasing decision. As always, the devils in the details. If you’re in the market, or just want to learn more about the latest DIY camera offerings take a read at the link below.

[Case Study] Heathrow Airport Parking Infrastructure Control Room

Heathrow Airport has one of the busiest car parking infrastructures of any airport globally. With 14 public carparks handling up to 50,000 vehicle movements and 1000 intercom assistance calls per day the parking contractor, Apcoa, decided to explore better ways to manage such high and growing volumes of traffic, customers, equipment and services.

Asahi Net Leverages PROMISE Technology’s Solution Platform to Offer New Surveillance Cloud Service

PROMISE Technology announced the company will provide its surveillance cloud platform to Asahi Net who will launch a video surveillance cloud service in Japan later this year. The solution for Asahi Net is based on Milestone Systems XProtect® Corporate video management software (VMS) and PROMISE’s cloud surveillance platform – a complete and integrated solution that not only includes VSky A1970 scale-out storage, but also a customized software solution from PROMISE that manages the system and the installation and configuration of the IP cameras.

ZKAccess Releases Biometric Access Control System for Elevators

ZKAccess, a leading provider of biometric and RFID security solutions, is pleased to announce the release of its EC10 Elevator Control Panel, a secure, scalable, and affordable access control solution primarily designed to control floor access. Floor access can be restricted based on various user credentials, including fingerprint and/or proximity card.

Wavestore Updates Version 5.50 VMS

WavestoreUSA, a world class innovator in open platform digital Video Storage and Management Systems, announces the new release of version V5.50 of the Wavestore Video Management Software. This maintenance release delivers additional video performance enhancements, along with code optimizations for improved handling of views for cameras and layouts, and better management for network interfaces.

ASUSTOR to Exhibit Surveillance Solution at Axis Solution Conference 2015

ASUSTOR Inc., a leading innovator and provider of network storage solutions, is now entering the professional surveillance arena. At the Axis Solution Conference 2015, ASUSTOR will be exhibiting a cost-effective yet high quality surveillance solution. All interested parties are welcome to attend. Surveillance Center is an add-on application developed by ASUSTOR that can be run on all ASUSTOR NAS devices.