Convenience to Drive Next Wave of Security
News Release
Customer Convenience to
Drive Next Wave of Security Innovation in 2009, predicts
Unisys
Easier processes and more intelligent collation of information
In 2009 demand for more convenient consumer experiences in services provided by both government and business will drive innovations in security designed to provide faster and easier processes predicts information services company, Unisys.
Unisys believes that at the same time ensuring privacy of customer information will remain a critical factor for public acceptance of any process that involves personal information. Organisations will need to continue to balance the mix of security, privacy and convenience in the services they offer.
According to Mike Webber, Manager Enterprise Security for Unisys Asia Pacific, “In today’s climate, consumer confidence is the new currency, and convenience is now a major factor in that confidence. People accept the need for, and in fact want, protection offered through effective security processes. But now they also demand a better experience – faster, easier and less cumbersome. And more convenient processes must still ensure privacy – loss of personal information can irreparably damage a customer’s trust.
“Whether it be faster
processing of travellers at airports, more confidently
verifying an internet or phone banking customer’s
identity, or providing access to your services in more
customer friendly ways, we believe the focus in 2009 will be
on putting the consumer first.
“Government and businesses alike are looking for solutions that provide consumers with the greatest levels of protection, while facilitating more convenient experiences and maintaining customer trust,” said Mr Webber.
Unisys predicts
the following security evolutions in 2009:
1. ‘On
the Move’ technology will evolve – to quickly verify the
identity of individuals at checkpoints or from a
distance
2. Intelligent security systems that collate and
interpret information from multiple sources
3. Australia
will continue to be a world leader in biometric security
innovation
4. Organisations will continue to shift from
securing systems to securing information.
1. ‘On the Move’ technology – to verify identity quickly at checkpoints and from a distance
In 2009, Unisys predicts the roll-out of identity verification solutions that capture iris and/or facial images from a distance to speed up security checkpoints, and to enhance the customer experience where large numbers of people move through a bottleneck such as immigration control.
Traditionally, iris or facial biometric solutions require the person being scanned to stand still in a specific spot at a specific height, which is a slow process when a large number of people are involved – and one which often involves several cameras being placed on top of each other to cater for different people’s heights. Unisys is working with governments and organisations to pilot a biometric approach, called “Iris On the Move” to take iris images at a greater distance and wider field of view, by finding the face of a person as they move at a normal walking pace. The image is matched against a database of registered images, such as people with access to enter a secure area to let them in.
“‘Iris On the Move’ improves the time it takes to verify an individual against a list of pre-enrolled people. At an airport it can speed up the security process by as much as four times, meaning that up to 30 people per minute can potentially pass through a security checkpoint depending on the level of interactive checks done,” said Mr Webber.
According to the latest Unisys Security Index(1) 59 percent of New Zealanders would be happy to give banks, government or other trusted organisations their iris pattern in order to enhance security and protect against identity theft.
“Our research indicates that New Zealanders strongly support new technologies that provide greater security, and by late 2009 we can expect to see ‘Iris on the Move’ technology trialled in our neighbour Australia,” said Mr Webber.
2. Intelligent security systems that collate and interpret information from multiple sources
Unisys predicts the development of more intelligent security solutions that combine information from multiple sources in order to proactively make informed decisions about security and the potential need for action, or to streamline management of an individual’s access rights.
“To date companies have been slow to combine the security data they have at hand and analyse it in order to make timely and informed security decisions. However, technological advancements will make it possible to combine disparate pools of information. For example, higher resolution CCTV cameras, coupled with intelligent video software linked to facial recognition systems, will allow facial images captured in the footage to be compared against image databases, such as a list of ‘people of interest’. Security personnel would be able to combine the activity they see in the CCTV footage with knowledge of who is involved to determine if action needs to be taken,” said Mr Webber.
“Another example is in the workplace where we are seeing more sophisticated identity and access management systems which allow organisations to manage user access to company resources and customer information that go beyond basic user ID and password access. They help ensure that only the people who are supposed to be accessing certain types of information, areas or equipment can do so.
“Imagine if an employee’s list of up-to-date accreditation, such as a licence to operate certain machinery, was linked to their ability to access and turn on that machinery – if their licence had expired, they would not be able to turn it on ensuring that neither they nor their employer were put at risk.”
According to industry analyst IDC, organisations in Australia and New Zealand spent US$89.4 million on IAM systems in 2007. IDC expects the market to reach US$189.3 million by 2012.(2)
3.
Australia will continue to be a world leader in biometric
security innovation
As an island nation, assuring
border security is a fundamental aim for any Australian, or
New Zealand, international airport. This must be balanced
with the need to process travellers through airport
controls. Larger aircraft, like the new double-decker A-380
Airbus, bring huge groups of passengers into an airport at a
time and have heightened the issue of passenger
facilitation.
“We believe Australian airports will seek innovative solutions to speed up passenger movement through airport controls while also boosting aviation security. Airports have traditionally focused on securing infrastructure and baggage. Now they focus on people,” Mr Webber said.
“For example, the new Brisbane International Airport terminal has not only expanded capacity to cater for the Airbus A-380. It also features Smart Gate biometric-based kiosks where pre-enrolled passengers travelling from Auckland can use an Australian ePassport to process themselves – speeding up check-in. Australia’s use of biometric data across borders in this way is a world first. We can expect other countries to follow this progressive approach for improving traveller facilitation.”
4. Organisations will shift from
securing systems to securing information
Until
recently organisations and their auditors considered strong
network and system security was adequate protection for
company and consumer information. However, this approach
does not take into account the human factor.
High capacity miniature storage devices such as USB sticks are now commonly available and are capable of storing entire databases, customer’s personal details, or sensitive commercial data. As a result, many organisations have had the security of their data compromised – both intentionally and accidently – in spite of strong system security.
“Organisations now need to secure information regardless of where it resides or what file format it is in. Unisys expects to see further development and adaptation of existing technologies that will ensure sensitive data is identified and is strongly protected from the first time it is written to a file. Only individuals who can properly authenticate themselves as being entitled to access that information will be able to open the file or see its contents, regardless of where that file resides,” Mr Webber explained.
“However, a holistic approach to data security needs to take into account the human factor. Many data security compromises are accidental. Organisations need to define, implement and enforce stronger business procedures around taking data outside the organisation. If you simply don’t enable data to be saved on CDs and sent in the mail, you eliminate the risk of losing it in the mail.”
Unisys predicts that in 2009 consumers will continue to demand that organisations provide secure systems necessitating a holistic approach to secure all touch points – addressing technology, people and business processes. But consumer acceptance and take-up of these processes will be driven by improving the end-user experience – making it faster and more convenient.
“We believe the move towards faster facilitation for identification processes will improve consumer acceptance and satisfaction with the security processes that they deal with day to day,” said Mr Webber.
(1) The Unisys Security Index™: Australia – conducted September 2008 (www.unisyssecurityindex.com.au). The Unisys Security Index was developed as regular measure of community attitudes towards a range of financial, personal, internet and national aspects of security. It is Australia’s only regular snapshot of public perceptions towards security.
(2) ’ANZ Identity Management Market Set for Strong Growth and Fierce Competition, According to IDC’, ComputerWorld, 10 July 2008
ENDS
Unisys on Security
Organisations and
governments today confront potential security threats that
didn’t exist a decade ago. A nation's sense of security
is an important indicator of political, economic and
consumer forces and their interdependence. Security threats
are global and their effects impact individuals on a daily
basis. Unisys approach to security goes beyond ‘bits and
bytes’ recognising that the most effective solutions are
going to be those formed through collaboration across
interests.
For more information on Unisys security
offerings visit: www.unisys.com.au/services/security/index.htm