TITLE

TOUCH AND GO

AUTHOR(S)
Couch, Christina
PUB. DATE
February 2016
SOURCE
PM Network;Feb2016, Vol. 30 Issue 2, p9
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that the biometric security market is expected to be worth 25 billion dollars by 2020. The biometric technologies have existed for a few decades, but they are surging in popularity to combat high-profile security breaches. As the biometric systems enter new markets, the project managers may encounter challenges integrating novel technologies.
ACCESSION #
112687074

 

Related Articles

  • Combining Biometrics with ESSO.  // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article presents the advantages of combining a biometrics with ESSO solution. A biometric-enabled ESSO solution matches each user by correlating against known set of references taking into account. The solution captures images at higher speeds resulting in less image blur distortion. The...

  • Applying Biometrics. Spence, Bill; Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p28 

    Part II. Looks at the practical side of where biometrics fit into access control systems. Applications of the biometric technology; Monitoring of all doors by an access control system; Gathering of credential against which future access attempts are compared; Storing of templates in the...

  • Locks to Fingerprints - Access Basics. Dingle, Jeffrey // Security: Solutions for Enterprise Security Leaders;Nov2008, Vol. 45 Issue 11, p88 

    The author reflects on the basics of access control. He argues that in terms of safety, biometrics is more useful than key locks. He mentions that the implementation of a policy that dictates how and when to collect keys is just a waste of time. He believes that the concept of verifying the...

  • Evaluation of Electrocardiogram for Biometric Authentication. Singh, Yogendra Narain; Singh, S. K. // Journal of Information Security;Jan2012, Vol. 3 Issue 1, p39 

    This paper presents an evaluation of a new biometric electrocardiogram (ECG) for individual authentication. We report the potential of ECG as a biometric and address the research concerns to use ECG-enabled biometric authentication system across a range of conditions. We present a method to...

  • From Casinos to 'Multi-cards' DeBerry, Ron // Security: Solutions for Enterprise Security Leaders;Jul2005, Vol. 42 Issue 7, p18 

    Discusses the different security system methods that center on multi-technology cards including biometrics and smart chips. Personal computer-based approach; Standalone approach; Portable database approach; Integrated template management approach. INSET: Wedded to Embedded.

  • Is This Document the Real Deal? Bassett, Jackie // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p48 

    The article reports on disruptive approaches aimed to solve document security challenges in the U.S. These include biometrics, an identity management and authentication method, which record security that is being adopted and the emerging technologies that empower it. It is suggested that...

  • All Points Secure. Airfield, Hunter Army; Stewart, Fort // Government Security;Mar/Apr2008, Vol. 7 Issue 2, p10 

    The article focuses on the networked biometric access control installed at the Hunter Army Airfield (HAAF) and Fort Stewart located in Savannah, Georgia. It notes that both facilities contain aircraft, complex communications equipment and sensitive data whereby security personnel experience...

  • A New Multimodal Biometric Identification Approach. Samir, Akrouf; Yahia, Belayadi; Eddine, Mouhoub Nasser // International Journal of Computer Science Issues (IJCSI);Mar2012, Vol. 9 Issue 2, p238 

    Several authors [1] [2] [3] [4] [5] have shown that multimodality was a highly efficient solution for biometric identification and allows to increase performance and reliability. Indeed, the acquisition of multiple biometric features makes it much more difficult for an impostor to spoof the...

  • Tech Talk.  // Security: Solutions for Enterprise Security Leaders;Sep2013, Vol. 50 Issue 9, p96 

    The article offers information on several options to consider when deciding what access control will be best suit the facility including the use of biometrics, key fobs, and smart cards.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics