Page 90 - Security Today, September 2017
P. 90

complex high- assurance credentialing ecosystem. Integrators can help enterprises to meet government mandates without reinventing the wheel or going too far afield, and to secure their facilities and operations.
Expertise in physical and logical access requirements are crucial responsibilities of the systems integrator. A successful integrator will understand and be able to educate customers about the requirements. They must also secure access management of corporate IT resources. To succeed, the integrator’s knowledge of new and proven technolo- gies, control systems and use-case value propositions is essential.
There are different options for biometrics deployment models. Optimal systems integration will incorporate products that support nationwide implementation, meet appropriate mandates, and per- form across the infrastructure. Standardization is required, so sys- tems integrators should be involved in this process in order to make sure the standards are deployed, as well as to understand them and be able to incorporate them into the technology solutions.
Interoperability and consistency are essential, and the most ef- fective integrators will be actively engaged in the establishment of a shared security infrastructure. They also need the ability to securely add workflow automation. To become a part of a holistic security solution throughout the critical infrastructure, integrators need to balance their business goals with commonalities shared across the industry and its stakeholders.
Access control and identification credentials can and should be developed to fit an organization’s individual security requirements – without compromising the interoperability that will allow true au-
thentication and validation of an identity based on an organization’s identity management policy.
Installing a self-service biometric capture and enrollment kiosk on-site in a facility’s lobby or Human Resources office will save time and resources. Access credentials issued by this means will allow ac- cess management for entry at facility gates, doors and secure areas. Different levels of security clearances can be embedded in the creden- tial to validate authorized entry to designated security zones. Kiosks can even be remotely deployed, for use at job fairs, other off-site ven- ues for life cycle management of the identity credential. Self-service kiosks that can be connected to national databases are available for live biometric capture and identification proofing.
In addition, the value-added capability of biometrics solutions is enabled with the technology to protect and secure network data and to control who can access emails and IT infrastructure, which is es- sential to preventing damaging data breaches.
Gerald Hubbard is the director of business development at the GET Group NA.
1. http://cts.businesswire.com/ct/CT?id=smartlink&url=http%3A%2F%2Fw ww.ponemon.org%2Flocal%2Fupload%2Ffile%2FData%2520Risk%2520in %2520the%2520Third%2520Party%2520Ecosystem_BuckleySandler%252 0LLP%2520and%2520Treliant%2520Risk%2520Advisors%2520LLC%252 0Ponemon%2520Research%25202016%2520-%2520FINAL2.pdf&esheet= 51418696&newsitemid=20160913005555&lan=en-US&anchor=Ponemon+ Institute&index=2&md5=1eed5f3a66620099d4d587103e25024e
Our buyers guide...
brings suppliers into focus.
Looking for a new vendor to work with?
You’ll find all the info you need to track down great suppliers and products
on buyersguide.securitytoday.com.
Research vendors, check out product info and reviews, and manage
your buying all in one place.
Visit buyersguide.securitytoday.com
72
Untitled-8 1
8/14/17 2:27 PM
Go to sp.hotims.com and enter 58 for product information.
0917 | SECURITY TODAY
BIOMETRICS/IDENTIFICATION


































































































   88   89   90   91   92