Fujitsu Access Control Readers(1)
Amid the heightened security climate in recent years and fears of terrorism, there has been a surge in demand for accurate biometric authentication methods. Meanwhile, recent bank card forgery cases in Japan have numbered in the hundreds, involving dozens of financial institutions and hundreds of millions of yen. Victims are usually unaware their money is being stolen until it's too late. To help deal with this growing problem, Fujitsu has developed a unique biometric security technology that puts access in the palm of a user's hand and no one else's. Fujitsu's palm vein device captures an individual's palm image with near-infrared rays. The deoxidised haemoglobin in the palm vein absorbs these rays, thereby reducing the reflection rate and causing the veins to appear as a black pattern. This vein pattern is then verified against the pre-registered pattern to authenticate the individual. As the veins are internal in the body and have a wealth of differentiating features, assuming false identity through forgery is extremely difficult, thereby enabling an extremely high level of security. Besides the high accuracy of a false rejection rate of 0.01% and a false acceptance rate of less than 0.00008 %, Fujitsu's contactless palm vein authentication offers a range of advantages over other biometric technologies. Fujitsu's palm vein sensory technology is extremely user-friendly, creating a touch-free, hygienic solution necessary for public use. The user simply places the palm of the hand above the reader, and the machine does all the work. "This technology will experience dramatic growth in the coming years as organisations implement improvements in IT and infrastructure security. The value proposition that palm vein technology offers is resonating well with users, and we are very excited to put a new biometric identification system on the market that can meet growing customer needs," said Thomas Bengs, Palm Vein Product Manager of the Fujitsu Europe Limited.Add to Compare
Browse Access Control Readers
Access control reader products updated recently
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Fujitsu Laboratories Ltd. has developed a digital identity exchange technology that makes it possible for individual users and service businesses involved in online transactions to confirm the identity of other parties in transactions. The rapid advance of digitalisation in recent years has been accompanied by a dramatic rise in the number of online transactions in which users cannot see one another face to face, making it difficult to judge the credibility of the other party and leading to heightened concerns around trust. With reports of fraud and instances of people falsifying personal credentials like work history and professional qualifications growing increasingly prevalent, ensuring the circulation of high-quality, reliable identification data poses an urgent challenge to users and businesses alike. DID utilising blockchain Fujitsu's new digital identity exchange technology promises a future in which people can enjoy online services more safelyTo address this, Fujitsu Laboratories has developed technology based on a Decentralised Identification (DID) utilising blockchain that analyses the risk of falsification and the trustworthiness of the other party's personal credentials when a user conducts a transaction online. The new technology achieves this through a mutual evaluation of the users when a transaction occurs, and by inferring the relationships between users based on past transaction data. Fujitsu's new digital identity exchange technology promises a future in which people can enjoy online services more safely, offering user-friendly features including graphics to visualise the relationships between users, as well as a unique ‘trust score’ that makes it easier to determine each user's trustworthiness before starting a transaction. Accurately discloses party’s identity In recent years, there has been an increase in new forms of business based on trust between people or companies, including sharing and matching services. In these sorts of digital businesses, it remains crucial to accurately convey the identity of other party in the transaction. There are now ongoing discussions around the use of blockchain technology in these kinds of transactions as a form of decentralised identification that accurately discloses each party's identity to the other parties, as guaranteed by an impartial third party. DID is a system in which a third party guarantees the accuracy of an individual's identity and personal credentials DID is a system in which a third party guarantees the accuracy of a given individual's identity and personal credentials. However, if a service business or user conspires with a third party acting in bad faith, it is possible to falsify a person's history or credentials, creating the risk that this falsified information will spread very widely without being discovered. Digital identity exchange technology Moreover, as the number of users who utilise these services increases, it becomes more difficult for users or a third party to grasp what sort of people the other parties are, increasing the possibility of maleficence. This necessitates a system whereby users can evaluate for themselves the truthfulness of the identity of the other parties in the transaction. Expanding on its past use of blockchain technology, Fujitsu Laboratories has developed a new digital identity exchange technology for safely circulating personal credentials in a form that enables users to confirm the trustworthiness of the other party, drawing on factors including the status of previous transactions and evaluations by users who had engaged in transactions with the party in question, as part of a decentralised identification system. Generating trustworthy transaction data With Fujitsu's new identity exchange technology, evaluations (e.g. reputation and rating) for each user in a transaction are recorded as a series of transaction data. By storing these evaluations on the unfalsifiable distributed ledger of a blockchain, this system can improve the reliability of insights into the trustworthiness about each user. Analysing relationships of trust This system converts the trustworthy transaction data about individuals shared on the blockchain into a graph structure so that the relationships between users can be understood. A trustworthiness score is attached to each user by weighting factors including how many trusted users evaluate them highly. Even if a user colludes with a third party to improperly raise their evaluation, the graph-structured relationships will reveal information such as the weakness of their relationships with other users, giving the system the potential to identify misrepresentations. Disclosing necessary information only Users can have their credentials verified with only a partial disclosure of relevant data, allowing for safe and highly reliable transactions without forcing users to offer unnecessary personal details. Determining trustworthiness of other party Fujitsu Laboratories will continue to develop IDYX as a trust-based service platform supporting digital businessThe newly developed technology analyses the trust relationships of each user, allowing the system to pre-emptively determine the trustworthiness of the other party in a transaction. The newly developed technology allows users to easily confirm information about which companies and individuals can be trusted in transactions in a variety of digital business situations, helping to build a digital ecosystem that transcends the boundaries of companies and industries and makes safe and secure online transactions a reality for all. Fujitsu Laboratories will continue to develop IDYX as a trust-based service platform supporting digital business, conducting trials in a variety of fields, beginning with the finance industry. In addition, Fujitsu aims to implement this technology during fiscal 2019 as a new functionality in its Fujitsu Intelligent Data Service Virtuora DX Data Distribution and Utilisation Service, a cloud-based solution for data utilisation powered by blockchain technology.
Milestone Systems, the open platform company in video management software (VMS), is hosting the EMEA Milestone Community Days (MIPS) on May 8-10 in Dubai, UAE. Danish Ambassador to the UAE and Qatar Merete Juhl opens the event at the opening reception on May 8. Milestone partners will highlight and showcase integrated solutions. Several conference tracks will give the participants inside information on VMS technology and Milestone community development. Future trend highlights Also, Milestone top management representatives will highlight industry future trends in their keynotes. The second product update of XProtect 2017, will be presented during the event. The partner community is essential to the Milestone open platform business strategy and Milestone partners will demonstrate innovative solutions, ranging from advanced storage to video analytics on the edge. More than 30 partners will showcase integrations to XProtect and a wide range of add-on products. Sponsoring partners Diamond: Allied Telesis, Fujitsu Platinum: iCetana, Pivot3, Seagate Technologies, Venzo Secure Gold: Axis Communications, Fibernetix, Hikvision, IBM, Intrasa, NetApp, Scality Silver: Advancis, Axone Systems, BARCO, Bosch, Dahua, Dell EMC, Ela-soft, G2K Group, Ipsotek, Nedap, Optex, Pablo Niklas, Parking Spotter (Milestone Kickstarter winner), Promise Technology, Quantum, Rasilient, Snap Surveillance, Soliton, Spectra Logic, Vidsys, XPR Group XProtect 2017 VMS showcase Milestone continues to maximize the business value of VMS for partners and customers and is set to release an update of the award-winning XProtect VMS software. This is in addition to adding two new business-ready products to the XProtect product portfolio. Open platform technology enables Milestone and partners to rapidly optimize the software to fit ever-changing market needs. “Including this EMEA event, we will have had have more than a thousand participants globally at our community days. This is clear proof of the attraction of the Milestone Community and a testimonial to our number one market position,” says Kenneth Hune Petersen, Milestone Systems Chief Sales and Marketing Officer.
Agreement enables enhanced technical support and faster time to installation for PalmEntry and PalmEntryXS solutions Fujitsu Frontech North America Inc., a leader in innovative technology and front-end solutions is pleased to announce that Torrance, California-based PCSC will be the master distributor for PalmEntryTM and PalmEntryTMXS physical access control solutions effective immediately. Both PalmEntry and PalmEntryXS are based on Fujitsu’s award winning PalmSecure® palm vein biometrics technology. Quality access control solutions PCSC is a designer and manufacturer of quality access control solutions ranging from integrated hardware to sophisticated access control management software, including door entry access, video badging, CCTV control, elevator control, alarm graphics, PoE network peripherals, and video integration. “We are delighted that Fujitsu has chosen PCSC as the master distributor for PalmEntry and PalmEntryXS solutions,” according to Mas Kosaka, President and CEO, PCSC. “This agreement will allow us to build and complement our existing product portfolio while enabling us to penetrate new markets with our security solutions.” Limits of the Fujitsu-PCSC agreement This master distributor agreement applies only to PalmEntry and PalmEntryXS solutions. Fujitsu Frontech North America Inc. will continue to be the primary supplier of PalmSecure technology that includes PalmSecure Mouse, PalmSecure for Single Sign-on and PalmLockTM for SAP. Existing PalmEntry and PalmEntryXS solution customers can expect to receive the same high level of customer service and customer care from the Fujitsu Frontech North America support team. Fujitsu’s palm vein device canonly recognise the pattern if theblood is actively flowing withinthe individual’s veins, soforgery is virtually impossible Palm vein biometric technology solutions PalmEntry and PalmEntryXS solutions are based on Fujitsu’s patented PalmSecure palm vein biometric technology. “By streamlining the sales channel, we are creating greater efficiencies that will enable PCSC to maintain and even augment the high level of customer service and care their customers receive today, while being very price competitive,” according to Randy Fox, Vice President of Sales and Marketing, Fujitsu Frontech North America Inc. “PalmEntry and PalmEntryXS solutions will be a nice addition to the robust suite of products and services offered by PCSC”. Fujitsu PalmSecure biometric palm vein sensors use a near-infrared light to capture a user’s palm vein pattern, generating a unique biometric template that is matched against the palm vein patterns of pre-registered users. Unlike other readers, the PalmSecure device does not come into contact with the skin, making it extremely hygienic, non-intrusive and unrestricted by external factors such as skin types and conditions. Registration for PalmSecure device users takes less than one minute and authentication takes less than one second. Reliable authentication Fujitsu’s family of biometric solutions, PalmSecure® sensors, PalmSecure for SSO (single sign-on) and the PalmEntryTM Physical Access Control system all utilise the award-winning technology. The palm vein device can only recognise the pattern if the blood is actively flowing within the individual’s veins, so forgery is virtually impossible. This advanced, vascular pattern recognition technology not only provides highly reliable authentication with low false accept and reject rates, but also allows for fast and easy enrolment.
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
- HID DigitalPersona fingerprint biometric solution added to BigWise Stellar POS for greater security
- Armor At Hand partners with AASA and use Smart Shield to boost school safety nationwide
- WorldReach employs Cognitec’s technology to enable ID document applications with smartphones
- Matrix provides time-attendance and access control solution at Al-Khodari Sons Company