The editorial team at Security Systems News has scoured the seminar and workshop schedule for the National Summit on Security, and the seminars listed below are our picks from the list.
In addition to the sessions highlighted below,which by no means comprise an exhaustive list, there ar e a number of opportunities for NSS attendees to learn about government-related work, including homeland security initiatives.
give alarm owners a chance to track and verify non-critical alarms
With false alarm prevention as the basis, along with the opportunity to take advantage of all that telecommunications technology has to offer, new verification options are entering the monitoring arena.
While none are designed to eliminate the need for existing central station services, many of the products coming on the market today give alarm owners a chance to track and even verify many non-critical alarms.
While biometric access control may be more commonly implemented in government facilities and high-end applications, the reality is that in addition to these traditional users, many more adopters are finding a place for biometrics.
WASHINGTON - The Office of Management and Budget has asked government chief information officers not to buy authentication or identity management technologies without getting the green light from either the E-Authentication team or the Federal Identity and Credentialing Committee.
The decision to rein in spending on authentication technologies came after a survey of government departments found that more than $160 million was earmarked for potentially inconsistent authentication and identity-management technologies.
A need to take security to the next level has given rise to the increased integration of biometric options with new and existing access control systems.
Where in the early days of biometrics the systems were often viewed as competitors or substitutes for traditional access control, today the focus is on making the best use of multiple components to serve diverse security needs.