SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Powerful

iOmniscient introduces iQ-Bank that includes portfolio of products specially tailored for the banking industry

Published on 11 Feb, 2013

Many ATMs including Hong Kong locations have been found contaminated with pinhole cameras and illegal card readers over the past month. Credit Card fraud from various kinds of devices used for skimming information from the credit cards of unsuspecting customers not only results in millions of dollars of losses but it significantly affects customer satisfaction and their confidence in their banker.

Many methods have been tried to thwart attempts at skimming credit cards and of course the miscreants have developed techniques for overcoming them.

iOmniscient has developed a video based capability which can detect skimming devices (even those that are almost invisible to the human eye). Further the system can detect the person who placed the device and, if he is in a database of known criminals, the system can recognise him. The capability is incorporated in iQ-Bank, a comprehensive portfolio of products specially tailored for the banking industry.

iQ-Bank supports the needs of different stake holders in the bank with a single integrated system. It can count the traffic and manage queues. It can help the Occupational Health and Safety team respond if a customer has slipped and fallen, it can recognise known culprits, detect theft of assets and generally improve the security, safety and efficiency of the bank.

Download PDF Version

Follow us for latest editorial and commercial opportunities


Please rate this article


Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition