Physical Security

  • The History of Biometrics and Biometric Devices

    Biometrics is the use of physical characteristics of a person in order to identify them. A positive identification proves that the person is who they say they are. A false identification can demonstrate that this person is not who they say they are. This...
    By George Garza May 25, 2011 

  • Biometric Access Control Devices

    Fingerprints and signatures have been used for years to prove an individual’s identity, but individuals can be identified in many other ways. Biometric identification systems examine a particular trait and use that information to authenticate a...
    By Karishma Sundaram May 20, 2011 

  • Identifying People by Fingerprints

    Fingerprint identification is an automated process in which a sensor scans the surface of a finger and passes it to software which checks whether the input matches a specific stored template. How does it all work and how accurate is it?
    By Mark Muller May 7, 2011 


  • Creating a Solid Plan for Workplace Laptop Security

    Laptop security is an essential part of protecting the assets of a mobile field force. Lost or stolen laptops carrying confidential or sensitive data expose companies to civil and criminal liability.
    By Chris Orr May 5, 2011 

  • Protect Your Business Data: Erase Hard Drives Completely

    Formatting a hard drive is not enough to secure business and customer information or prevent identify theft. It’s important to securely erase your hard drive to completely remove data and render it no longer recoverable.
    By Donna Buenaventura April 17, 2011 

  • ATM Skimming: Don't Be a Victim

    Card skimming is the stealing of ATM card information used in illegitimate and unauthorized transactions. The problem has affected banks and ATM card users because they failed to spot the ATM skimming device in an automated teller machine (ATM)...
    By Donna Buenaventura April 17, 2011 


  • Top 5 Biometric Door Locks: A Buyer's Guide

    Stay in control of your home or office using a biometric door lock. In this buyer's guide we look at five units that will not open without the presence of an authorized person to validate credentials.
    By Bruce Tyson March 6, 2011 

  • Disadvantages of Biometric Time Clocks

    A biometric time clock is a device that can use a person's physical features in order to identify the person and the time he signed in for work. The device can use fingerprints, retinal and iris scans, facial and voice recognition programs. The device...
    By George Garza March 5, 2011 

  • Segregation of Duties Policy: What Should It Include?

    Effective segregation of duties improves security and compliance for organizations subjected to government regulations or private industry requirements.
    By Chris Orr March 5, 2011 

  • How Accurate Are Fingerprint Biometric Devices?

    Biometrics is the science of using biological features to determine the identity of a person. Fingerprint biometrics is one of the oldest forms of biological identification. However, legal scholars and scientific authorities have questioned its reliability...
    By George Garza January 27, 2011 
showing 11-20 of 28    < Previous  |  page: 1 2 3  |  Next >