Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Facial Recognition Shows Promise as Next Step in Corporate Security

    By
    Wayne Rash
    -
    July 6, 2018
    Share
    Facebook
    Twitter
    Linkedin
      Facial Recognition Security

      Two minutes after the glass door of the Capital Gazette newspaper in Annapolis, Maryland, was blasted by a shotgun round, and five newspaper employees were killed, police had the alleged shooter in custody. 

      But they had a problem when they took him in for questioning. He had no identification, he would not talk to police and his fingerprints returned no results from any database. 

      Police were stumped, but then investigators thought to put the mystery gunman’s photo into the state’s new facial recognition system. In a matter of minutes, the alleged shooter was identified as Jarrod Ramos, a man who had previously sued the paper for its coverage of his arrest and conviction on stalking charges a few years earlier. 

      While Ramos’ trial is still months away, the successful use of computer technology to confirm a murder suspect’s identity made it clear that facial recognition systems have reached the point where they can perform reliably enough to identify a random person fairly reliability. 

      What’s equally important is that this is one form of biometric technology that doesn’t require a lot of expensive hardware to implement nor does it require direct interaction of an individual with a card reader, biometrically-control door lock or similar technology. 

      Those two characteristics make it ideal as a way to improve corporate security in some specific ways while making it possible to sidestep the privacy concerns that surround government use of such technology. In many companies the implementation of facial recognition can be accomplished with little more than some software and a cloud account that includes access to artificial intelligence with image processing capability. 

      Finding such support isn’t particularly difficult. IBM focuses on exactly that capability with the IBM Cloud and Watson. Amazon, Google and Microsoft also have been perfecting such capabilities. In fact, Microsoft and Amazon have been catching heat from their own employees who fear that the technology is so good it will lead to privacy issues if the technology is sold to government and law enforcement agencies. 

      This technology could be used to bolster corporate and data center security systems by using existing surveillance cameras as part of a biometric security system. Chances are that you’ve already instituted some form of access control for sensitive areas in your company. These controls may include digital combination locks, smart cards or perhaps fingerprint readers. You may already have more than one of those access control methods. 

      But each of those systems requires a physical interaction with the person trying to gain access. If that person somehow gets past your perimeter security, then what? This is where facial recognition can help out. 

      Businesses that have access controlled areas, such as their data center, usually have some form of video surveillance. These may be cameras monitored by the building security team or someone else with responsibility for physical security. Those cameras are usually configured to watch the entry and exit of staff and visitors. They watch sensitive areas such as the machine room in your data center, hallways, and the areas near and within your sensitive compartmented information facility (SCIF). 

      While these cameras can watch for obvious criminal activity, such as the theft of computers, anything beyond that depends on the ability of people who might be doing the monitoring in real time to recognize the people in the image. But it’s unlikely that a person can reliably do this anywhere but in the smallest company. 

      This is where facial recognition comes in. You probably have photos of your employees in your human resources database and you’ve probably put them on your employee security badges. If so, you have the data you need for a facial recognition system that can confirm that anyone it sees is actually an employee with a need to be in the secure spaces of your corporate facilities. 

      While facial recognition isn’t perfect, in this use it doesn’t need to be. Your goal is to confirm that the people in your offices or data center are company employees with proper access. This doesn’t require a huge database even for a big company, and if there’s an occasional false identification, you have a security staff to resolve it. 

      There are no privacy issues as long as the surveillance is kept to areas that need to be secure. The acceptance of the surveillance cameras and facial recognition capabilities can be a condition of employment, just as is the case for fingerprint readers, iris scanners or other biometric readers. 

      Of course there will be some development involved. Your IT shop may be able to do this, or you may need to bring in a consultant who has the background to tie your employee photos to a facial recognition AI system. But the major vendors of facial recognition systems already have the APIs available, so it’s not an insurmountable task. In fact, enough organizations have been implementing cloud-based facial recognition that there may be open-source applications for your chosen cloud service. 

      The events in Annapolis demonstrated that facial recognition is in fact available and that it works. You still can’t use it to scan crowds to identify everyone there, but you don’t need to do that. All you need to do is recognize a few score or a few thousand employees with a need for access. 

      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a freelance writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×