ievo Ltd, global provider of biometric fingerprint recognition products, announced that it received Lenel factory certification and joined the Lenel OpenAccess Alliance program. ievo biometric fingerprint recognition products can now interface with the OnGuard access control system, providing a streamlined approach to fingerprint enrollment. “ievo has completed required factory testing at Lenel to validate the functionality of its interface to the OnGuard system. Having this interfa...
Suprema ID, a global provider of biometrics and ID solutions, announced it would showcase the world's slimmest fingerprint authentication scanner with FBI FAP30 certification at Trustech 2018, in Cannes on 27-29 November 2018. The new FAP30 comes in a robust IP65-rated dust and waterproof structure, with an ultra-slim optical sensor, featuring proprietary advanced LFD (Live Fingerprint Detection) technology to prevent spoofing frauds. The FAP30 fingerprint scanner maintains the highest FBI PIV/...
FIME has been accredited by Mastercard to deliver biometric authentication testing services for fingerprint in line with its new guidelines for mobile device sensors. The testing evaluation program enables mobile, wearable and sensor manufacturers to test the performance and accuracy of mobile fingerprint sensors. This enables financial service providers to easily evaluate the hardware and software integrated into devices and have confidence in the quality of the products that are integrating wi...
“With C•CURE 9000 at the heart of so many high security solutions, it is not surprising that end-users want to be kept informed on any emerging cyber threats and how we are dealing with them,” said Gordon Morrison, GB Sales Director for the Tyco access control and video brands. “In this respect the well-established Tyco Cyber Protection Program, which we see as part of our long-term' holistic approach to supplying customers with quality solutions, is helping us maintain a...
HID Global, a worldwide provider of trusted identity solutions, announced that it has acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services, making HID Global one of the world’s major providers of fingerprint biometric technologies....
Suprema, a provider of biometrics and security, announces that the company will showcase GDPR-ready enterprise access control solutions at Security Essen 2018 including its latest range of biometric readers, multi-band RF card readers, mobile credentials and access control software platform. At the show, Suprema will introduces BioLite N2, the world's best performing outdoor fingerprint terminal. BioLite N2 is designed for both the enterprise access control systems and time attendance applicati...
Matrix, manufacturer and believer of ‘Made in India’ Telecom and Security solutions, has been a host of a number of its maiden event Insight. This event has been conducted and used as a platform to spread the company’s reach in different markets, getting in touch with partners and prospective system integrators. Matrix Insight Indonesia 2018 Matrix is all set for yet another Insight event in Indonesia. The event will be hosted at the Shangri-La Hotel, Kota BNI, Jln. Jend. Sudirman Kav. 1, Jakarta on the 13th of September 2018. Matrix will be highlighting its Unified Communication solution, IP phones and Universal Media Gateways at the event, giving a brief on each for the attendees. They will also be introducing the recently launched Pure IP Solution for Enterprises – PRASAR UCS at the event. Time-Attendance and access control solutions In the Time-Attendance and Access Control domains, Matrix will be exhibiting the Multispectral Fingerprint Reader. This reader reads two layers of a finger, surface and the subsurface, making it an efficient fingerprint reader. Moreover, it reads a user’s finger even if they are dirty, oily, wrinkled, etc. Along with this the award-winning Visitor and Cafeteria Management solutions will also be explained by the solution experts. Additionally, there will be a briefing on their Time-Attendance and Access Control solutions at the event. From the Video Surveillance domain, Matrix will be highlighting its Professional Series of IP Cameras and recently launched Extreme Series of Network Video Recorders (NVRx). A brief will be given on how centralised monitoring works with the Video Management Software. The company will also be explaining how multiple NVRs can be connected for monitoring cameras without a server.
Last year, natural disasters in the U.S. cost homeowners and businesses a record $306 billion, according to the National Oceanic Atmospheric Administration (NOAA) 1. While natural disasters can occur at any time throughout the year, the U.S. government recognises September as ‘National Preparedness Month’, an effort to encourage Americans to prepare for emergencies. To help safeguard your valuables, The Master Lock Company provides peace of mind with trusted security products that help to protect valuable assets no matter the circumstance. The Master Lock Company develops products that offer enhanced durability, reliability and security" "We understand the value of reliable security, which is why we test our products against the toughest situations, including extreme weather conditions, harsh temperatures and physical attacks," said Justin Matuszek, director of product marketing at The Master Lock Company. "Our rigorous testing facilities coupled with our industry-leading consumer insights allow The Master Lock Company to develop products that offer enhanced durability, reliability and security." To help families prepare for natural disasters this September and throughout the year, The Master Lock Company offers a full suite of innovative security solutions, including: Protecting storage areas and documents Master Lock's Family of Stainless-Steel Padlocks: Master Lock offers a wide selection of stainless-steel padlocks that provide enhanced security, durability and reliability based on consumer needs and application. The Master Lock 5SSKAD Stainless Steel Padlock features a stainless-steel body and shackle, and brass 4-pin tumbler cylinder providing maximum weather resistance and enhanced security to protect storage areas, such as garages and sheds, as well as recreation vehicles like boats and four wheelers. SentrySafe Digital Fire Safe: With its UL Classified fire protection2 and ETL Verified water protection3, the SentrySafe Digital Fire Safe is the ideal storage solution to protect documents and valuable assets from wildfire and flood damages. Its solid steel construction provides durable and reliable protection in extreme weather while a pry-resistant hinge bar protects against theft. In the case of a power outage, it features an interior light, so you can easily access your items without additional lighting. Keeping valuables secure Master Lock SafeSpace Portable Personal Safe: For homeowners that need temporary security while on-the-go, the Master Lock SafeSpace Portable Safe allows for convenient and secure transportation of small personal items. Its durable construction is made to withstand abuse while its shock-absorbing foam on the interior protects valuables on the inside. Keep valuables secure by tightly wrapping the cable around a fixed object or double the cable to use as a carrying handle for easy transporting. New Master Lock Universal Lock Box: In the event of a natural disaster, lock boxes provide a secure way for friends, family and first responders to check on their loved ones. The new Master Lock Universal Lock Box is the only one on the market that features an adjustable shackle, so it can be affixed to almost any style of door hardware. Its wide metal body allows for enhanced durability, weather protection and security for spare keys to homes and other properties. Door Security Bar and Biometric Pistol Safe In addition to extreme weather conditions, the fall season brings a timely opportunity to ensure the security of your home and assets. Make sure your home is secure this season with the following security solutions: Master Lock 265D Adjustable Door Security Bar: Constructed with 20-gauge steel, The Master Lock No. 265D Security Door Bar securely keeps doors closed in case of attempted forced entries. The bar adjusts from 27-1/2 in. to fit most home and patio doors and can be adjusted to fit sliding doors. SentrySafe QAP2BEL XL Biometric Pistol Safe: With the SentrySafe XL Biometric Pistol Safe, gun owners can rest assured that their firearms are secure. Equipped with a biometric fingerprint scanner for fast, one-handed access, the biometric pistol safe features two-pistol capacity for additional firearm and ammunition storage, while interior lighting provides increased visibility in low-light situations, so you can easily access the safe. For homeowners looking to find the best safe for their needs, SentrySafe has recently launched its online SentrySafe Safe Selector tool that allows consumers to navigate the brand's selection of safes – whether it's an all-purpose safe, pistol safe, cash box, or portable safe for consumers on-the-go.
Entry/exit within premises is generally a major challenge of an organisation’s overall security strategy. To manage access of specific zones in a single location requires a standalone access control solution. For small and medium business organisations, Matrix has developed COSEC PANEL LITE (site controller), which works independently without requiring a server for access control application. All Matrix COSEC biometric and RFID card-based door controllers are connected to the site controller for implementing advance access control features and restricting any unauthorized entry. Key Features: License Free Solution Eliminates Server Cost Controls 255 Doors and 25,000 Users 5,00,000 Events Storage Capacity Connects Third Party Readers Real-time Monitoring and Control Integration with Fire Alarm and Video Surveillance
Customers want services. Services that add convenience, simple control and easy management of all their security devices. With Connect ONE by Connected Technologies LLC, it’s easy to add the new services that one may not have thought about or assumed were too difficult to add. Connect ONE is a cloud-hosted integrated security management platform that bundles intrusion, access control, video surveillance, energy management and critical environmental monitoring in one single user interface that controls them all simply and conveniently. CheckPoint Tours tracks tasks and facility activity CheckPoint Tours, the latest service from Connect ONE, provides real-time recordkeeping that security guards have completed their rounds or employees have performed required or mandated tasks at the premises. As the user scans/swipes each checkpoint their access is logged and can be reviewed. Paired with ScanPass Mobile Credential, it makes tracking activities uncomplicated. ScanPass does not require any wiring and users affix a barcode sticker at the places they want to make sure are visited, using a smartphone to scan the barcode to determine if the tour is being performed properly. Notifications can be sent if tours are not completed on designated time schedules. It can also be integrated with surveillance to take a snapshot of the person to identify authorised personnel conducting the tours. Multiple checkpoints can be added economically by using only ScanPass barcode stickers in place of card readers and additional hardware. Connect ONE services add tangible value for the end-user customer and the business in the way of new RMR streams.
Suprema ID., a global provider of biometrics and ID solutions, announced that the company will showcase its ground-breaking fingerprint authentication scanner featuring ultra-slim sensor and wireless technology at SDW 2018 in London. The new FAP20-compliant BioMini Slim 2S fingerprint scanner provides a number of industry-leading features under its sleek design. Featuring range-leading powerful 1.0GHz CPU, BioMini Slim 2S provides high-speed extraction and matching of fingerprints on the scanner. Fast finger-scanning with HID protocol To improve user convenience, BioMini Slim 2S supports true plug-n-play by featuring HID (human interface device) protocol. HID protocol enables users to scan fingers immediately after physical connection of USB plug without any set-up or installation steps. BioMini Slim 2S also provides enhanced versatility with pre-loaded web-server hence enables users to operate web-based applications from their mobile devices or PCs regardless of their OS type. BioMini Slim 2S enables users to capture fingerprints under harsh environmental conditions as well as direct sunlight BioMini Slim 2S also provides rugged IP65-rated dust and waterproof structure and equipped with latest 500dpi slim optical sensor featuring Suprema's advanced LFD (Live Fingerprint Detection) technology to prevent spoofing frauds. Moreover, BioMini Slim 2S maintains the highest standards by complying FBI PIV/FIPS201 and mobile ID FAP20 certifications and even enables users to capture fingerprints under harsh environmental conditions as well as direct sunlight up to 100,000 LUX. Reliable performance in outdoor conditions "The new BioMini Slim 2S is designed to provide the best reliable fingerprint authentication performance over dynamic environments such as outdoor and mobile situations. At Suprema ID, our commitment is focused to ensure consistent performance and usability over dynamic environments," said Bogun Park, CEO at Suprema ID. At the show, Suprema will present full demonstrations of its BioMini series authentication scanners as well as RealScan series FBI-certified fingerprint enrolment scanners.
Morse Watchmans, the industry provider of key control and asset management systems, is showcasing their KeyWatcher Touch key management system at IFSEC International 2018 in London. The company will also be displaying their asset management solution, AssetWatcher, which uses RFID along with their proven KeyWatcher technology in a locker system to secure and store valuable assets. “We’re excited to bring AssetWatcher and KeyWatcher Touch to Europe’s premier physical security event,” said Fernando Pires, CEO at Morse Watchmans. “Morse Watchmans has identified features our customers rely on with KeyWatcher and applied them to asset management. We’ve also developed our technology and higher functionality for our proven KeyWatcher system. We’re looking forward to sharing these new solutions with the attendees at IFSEC 2018.” Desktop fingerprint reader Morse Watchmans’ KeyWatcher Touch key management system utilizes a 7” touchscreen for an easy to use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilize multiple KeyWatcher Touch server instances with a single SQL database. AssetWatcher, Morse Watchmans’ flexible, scalable, and capable RFID-enabled locker system will also be on display at IFSEC 2018. AssetWatcher can easily support more than 10,000 users on a single system and is configurable in three usage modes for the utmost convenience. It is simple to track who is removing or replacing an asset along with when or where in the system the transaction has taken place. The proven features of KeyWatcher, such as email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher.
Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users. Find out more about: Access control new opportunities Main objections to access control systems Is your system as secure as you think? Ineffective access control policies Why upgrading can benefit enterprises Conclusion
Time and attendance has proven to be a successful use of biometric technology traditionally used for controlling access to highly sensitive areas Security technology is increasingly being used to help organisations tackle challenges going far beyond controlling access to office buildings and monitoring parking lot activity. Video, in particular, has become the darling of many markets. Retailers use live and recorded video to assess promotional sales efforts. Manufacturers confirm employees are following mandated safety regulations. Transit officials debunk false liability claims with a review of recorded mobile video. But here’s a relatively new one – biometrics. Long thought perfect for controlling access to highly sensitive public and private research and military facilities, they are showing up in offices, hotels — even in remote fruit fields and sugar processing plants — for employee time and attendance. It’s proven to be a successful use of the broad technology. Risks of mechanical and electronic clocks The process of keeping track of employees’ hours has long been open to fraud and other issues. Mechanical time clocks — in use since the 1800s — and even more modern electronic clocks using magnetic stripe or proximity cards are open to a process known as ‘buddy punching.’ That’s a scheme in which an employee clocks in and/or out for a friend who may be late or not even at work. Mechanical systems are also slow, potentially leading to long queues during shift changes resulting in wasted time and lost productivity. Mechanical cards also need to be keystroked into the payroll system, requiring significant back office time for data entry. Electronic cards can be shared. They may also be lost or stolen, costing additional time and money in back office expense. Even small errors in collecting and processing employee time and attendance can add substantially to the cost of payroll, already a major expense for any organisation. Studies by a leading international human resources consulting firm have shown even small payroll errors and fraud can boost operating costs by up to 10 percent. Biometric time and attendance solution But fraud, delays and lost credentials can be largely eliminated by a biometric solution. Common biometric systems involve hand or fingerprint readers, facial identification or iris recognition. Each technology records and then compares physical characteristics unique to every individual. However, changes in weight, hairstyle, finger or hand size, cuts or even the effects of manual labour can trigger the need for re-enrolment – in all except iris-based solutions. Fraud, delays and lost credentials can be largely eliminated by a biometric solution Iris recognition advantages The structural formation of the human iris (the visible coloured ring around the pupil), is fixed from the first year of life and remains constant. And few people can’t use the technology, as most individuals have at least one eye. Even blind people have successfully used iris recognition. At employee enrolment, iris systems utilise an industry-standard camera to capture an image of the iris. Software converts that to a small template stored in a terminal database. Authentication requires employees to stand roughly 18 inches from an iris reader and the process takes about two seconds. With multiple readers installed, long lines are eliminated. Also eliminated is fraud. Since every user’s iris is unique and required to be present at the reader, time fraud schemes are virtually impossible. The system can also prevent another type of back-office time fraud known as “ghost employees” – non-existent people added to the payroll. Security is also enhanced. The digital templates can’t be used to produce any sort of visual image, affording a high-level of defence against employee identity theft. An iris recognition system can also grant facility access as employee’s clock in for work. Iris recognition case study Here’s an example of how an iris recognition system has benefitted a major Turkish fruit and vegetable grower and one of Europe’s largest providers of juice. The nature of the local work force created a major time-and-attendance challenge. "Fingerprint and facial recognition systems were tried briefly. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear" New labourers arrive daily seeking work. Once hired, they might work a few days and then leave before returning a week later. Unreliable schedules made standard time cards virtually impossible to manage. The company’s security integrator suggested smart cards as an option. But that wasn’t much of an improvement as authorising, printing, distributing and tracking cards for thousands of on-and-off workers continued the human resources nightmare. Also, improper use of the cards threatened to cut into the company’s profits. Both fingerprint and facial recognition systems were tried briefly. The constant cuts and scars workers get from the manual labour impaired the accuracy of readers. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear. Daily payroll reports are transmitted to the company’s Istanbul headquarters using wide area networks in the fields and satellite communication. Software links the received data to a payroll module which automatically calculates employee hours and produces paychecks. The system currently has more than 10,000 enrolled workers. More are being added on an almost daily basis. Once a worker is in the system, it doesn’t matter how often he may leave. When he returns, the iris system immediately recognises him. Also, the contactless iris-based technology inhibits the transfer of virus or bacteria as there is no direct employee contact with the biometric readers. If these systems can work in remote areas of Turkey, they can certainly work in downtown Boston. And they do. There, a boutique hotel uses iris-based identity authentication to keep the hours of its employees. The same system also allows VIP guests to enter their suites without a key card. Reductions in cost Recent reductions in both product and deployment costs have made using biometrics, including iris recognition, a practical time and attendance investment for organisations of almost any size and in any location. Of course, biometrics still remains the go-to choice for protecting sensitive locations and international borders, as well as national identity and voter registration programmes.
Part 4 of our Security in Healthcare series Secure visitor management integrated with physical access control systems (PACS) is increasingly popular Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. For instance, one children’s hospital recently chose HID Global’s EasyLobby Secure Visitor Management solution to streamline screening/badging using driver’s licenses or other government-issued IDs. Integration with hospital databases enables benefits like accessing real-time patient feeds using Health Level-7 (HL7) standards. All visitor information Is seamlessly passed to the hospital’s access control system to optimise efficiency at nine stations badging more than 160,000 visitors annually. The example shows what technology can do in the area of visitor management. Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or “after hours” An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during “after hours” periods, according to HID Global. Systems should support real-time patient feeds using HL7 integration, which ensures that no visitor is sent to the wrong location or to see a patient who is no longer checked in. Systems should also pre-register approved vendors and temporary employees through Status Blue integration, and support integration with access control systems for the most efficient badging. Barriers to visitor management "Due to financial limitations, many hospitals are trying to make do with older desktop technology, and have not been able to benefit from some of the newer efficient options, such as mobile tablet-based visitor management, "says Paul Terschuren, CEO, STOPware Inc. "And, some hospitals have the mistaken belief that the multiple entrances and complexity of a modern hospital facility pose a barrier to implement visitor management, or that managing visitors more closely will create an unwelcoming culture or environment," says Terschuren. "As a result, some hospitals only implement visitor management after hours, when the number of entrances and visitors is reduced." "However, neither of these ideas should be barriers", says Terschuren –" visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software. And, many hospitals have found that visible security improvements, when they are not overly burdensome, actually improve the feeling of safety and security with patients, visitors and families alike. Some hospitals with limited implementations are already realising this and changing their plans to implement systems hospital-wide." Visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software STOPware PassagePoint visitor registration STOPware specialises in visitor management, a critical element in physical security for hospitals and healthcare facilities. STOPware’s flagship software product, PassagePoint, provides visitor registration and pre-registration, visit approvals, identity confirmation, visit logging, and integration with access systems. STOPware also provides related hardware including self-registration kiosk, mobile registration tablets, credential scanners, and badge printers. As announced in March, PassagePoint software now integrates with HL7 to allow real-time patient location tracking for hospitals and healthcare facilities, as well as integration with more than 20 access control systems to help make the healthcare environment more secure. STOPware takes Health Insurance Portability and Accountability Act (HIPAA) and all privacy regulations very seriously. The PassagePoint HL7 module only uses patient location data, and functions as a “listener;” that is, the data used by the module is not “stored” in PassagePoint. The HL7 integration only makes use of patient location data and does not collect or use any diagnosis information. PassagePoint is also designed to protect visitors’ Personal Identifiable Information – either by not capturing certain data or by encrypting information that is stored. By treating sensitive information of both patients and visitors in this way, STOPware Visitor Management system is designed to help healthcare facilities protect privacy in alignment with the letter and the spirit of their required regulations. Pre-booking and advance approval Tighter control of visitor and contractor management in non-public areas through pre-booking and advance approval are developing areas, says Dave Ella, Vice President of Product Marketing, AMAG Technology. AMAG has developed a new visitor management solution called Symmetry GUEST that allows visitors to be vetted to provide a safer and more secure environment for patients and staff, as well as the use of smartphones as identification and access credentials. "Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation" Staff training and turnaround processes are an often-overlooked element of a security plan in general, and a Visitor Management plan in particular, says Terschuren of STOPware. “It is well and good to put guards and checkpoints in place, but what should those guards do when they find someone that should be denied entry? Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation while minimising the chances of negative impact on the facility. “ STOPware expects that remote reception desk management, which makes use of an operator from another location and/or country who can greet and process visitors efficiently, will continue to grow and improve. Integration of Visitor Management systems with access control and other security-related systems provides for safety and an audit trail in such implementations. “We are also seeing a groundswell of interest in Mobile Visitor Registration and Kiosk Self-Registration and Sign-ins,” says Terschuren. “These systems increase efficiency, empower visitors, and provide for a better visit experience that many facilities find compelling.” Combining identity verification and visitor management “We are also seeing the growing importance of identity verification; and, in particular, the use of biometric methods to verify identity, ranging from fingerprints and facial recognition all the way to higher security iris readers,” Terschuren adds. “Identity verification can tie in with Visitor Management, both in terms of identifying visitors, but also in terms of verifying the authority of hosts and approvers, to improve the security of sensitive areas and facilities in general.” One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Read Part 5 of our Security in Healthcare series here
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrols in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
Kredi Kayıt Bürosu (KKB) was founded by the then nine leading banks of Turkey on 11th April, 1995. KKB is a highly regarded financial institution in turkey and has a total of 156 members. The KKB Anadolu Data Center is located in the capital city of Ankara across 43,000 square meters of land, consists of three main sections. The facility is equipped with protection systems against lightning and earthquake. Center authorities to provide the supervisors with an additional option of authentication through RFID cards Need of cost effective solution The data center has cabinet system in place while access to data racks require biometric authentication. The center is equipped with numerous data racks for which they required a display device at the entrance. Each rack was locked with physical locks as a result of which the center required a cost effective solution that did not include a device for each rack. Moreover, they required devices that supported both smart card authentication as well as door locks. The center authorities were looking forward to provide the supervisors with an additional option of authentication through RFID cards. With respect to gaining access, they wanted a solution that would grant access through two steps, biometric authentication and physically opening the locking system. Finally, the center wanted a solution that could alert them in case of situations such as a door being left open. Data Center solution Matrix, in association with SouthCo, provided the KKB Anadolu Data Center with the following solution. The data center required a display device at the entrance, integrated with the biometric device installed by Matrix. So, we integrated our Data Center solution with a touch screen display. Whenever any user tried to access the data center with their biometric credentials, the touch screen would display a list of racks the respective user is authorized to access. From the display, the user would be allowed to choose the racks he/she would like to access. Once the user is granted access into the chosen racks, they will be allowed to access the same for a pre-defined period of time. COSEC ARC provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps Gather customized reports User based access makes ensures security of sensitive company data. We also installed 200 COSEC ARCs, at the entry/exit of racks between 400 SouthCo locks, one between two door locks, making it a cost-effective solution for the center. Additionally, the COSEC ARC also provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps such as an open door, a door forced open, door being left open, etc. The personnel can also gather customized reports on events like who, when and which rack was accessed. Results Maintenance of Diverse Data Foolproof Security with Biometric User-wise Rack Access Accurate Records of Who Accessed Data Center at What Time
JK Tyre & Industries Ltd. have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to Time-Attendance and Visitor Management. Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees Matrix Time-Attendance solution Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage Time-Attendance of over 500+ workers. Moreover, we provided Employee Self Service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so we delivered Visitor Management software, which helped them create a visitor pass, fetch visitor records and generate reports of the same. 40% Increase in Productivity of Employees and Workers Results Reduction in Cumbersome HR tasks Automatic Maintenance of Visitor Records on Day-to-Day basis 40% Increase in Productivity of Employees and Workers The Products COSEC VEGA FAX - Fingerprint and Card based Door Controller with Touchscreen, IP65, Wi-Fi and 3G/4G Connectivity Option COSEC PATH RDFM - Fingerprint and Card based Exit Reader with IP65 COSEC CENTRA ME - Application Server Platform with 500 Users and Expandable up to 1,000 Users for Basic Access Control and Raw Event Data COSEC ME TAM - Time-Attendance Software Module for COSEC CENTRA ME Users COSEC ME ESS - Employee Self Service Software Module for COSEC CENTRA ME Users COSEC ME VMM - Visitor Management Software Module for COSEC CENTRA ME Users
JCB Co. Ltd, the only international payments brand based in Japan, will conduct a pilot trial of its latest JCB Biometrics Card with fingerprint authentication. JCB's contactless payment solution is provided by IDEMIA, a global augmented identity solution provider. Toppan Printing will also take part in the demonstration trial in respect of card personalisation. Users first record one or more fingerprints for authentication purposes. When they want to buy something, they need only touch the fingerprint sensor on the card's lower right corner with their finger so as to authenticate payment. The fingerprint record is only kept in the card and given that fingerprint authentication is also done on the card, merchants do not need any further equipment to accept payment. The purpose of the pilot is to validate whether the solution is convenient for consumers and practical for the payment Secure customer experiences While currently most contact chip cards rely on users entering a PIN number for authentication, this will be replaced by the fingerprint authentication. With the new JCB Biometrics Card strict security is upheld with fingerprint authentication for any payment method, while maintaining efficiency and speed. The pilot trial first involves issuing the JCB Biometric Card to JCB employees from April. Once card users have recorded their fingerprints using a smartphone or tablet app, they can make purchases via fingerprint authentication at merchants accepting JCB Contactless payments. The purpose of the pilot is to validate whether the solution is convenient for consumers and practical for the payment. JCB will continue to explore and develop various authentication solutions in order to provide consumers with reliable and secure customer experiences.
HID Global, a global provider of trusted identity solutions, is driving biometrics adoption throughout Latin America, and especially in Mexico, ahead of the October 2018 deadline set by the country’s National Banking and Security Commission (CNBV) to deploy fingerprint identification technology across financial institutions. “Banks, government services agencies and commercial entities in Latin America have embraced our biometrics solutions over the past decade because of their speed, accuracy, reliability and fraud-fighting capabilities,” said Greg Sarrail, Vice President of Global Sales, Extended Access Technologies, Biometrics with HID Global. “Now we are helping to extend these benefits across Mexico’s banking infrastructure as part of a major initiative to curb identity theft.” HID’s multispectral fingerprint devices have helped eliminate fraud in Mexico’s national vaccination program and other healthcare initiatives Enhancing the security of ATMs HID Global’s Lumidigm biometrics sensors with multispectral imaging technology are currently used in Latin America’s retail banks, financial institutions and government agencies to create a more convenient customer experience while increasing the security of ATM and other transactions. More than 115,000 multispectral fingerprint sensors are deployed in Brazil to protect billions of ATM transactions per year, with nearly 80 percent of the nation’s ATMs used by over 85 million banking customers. Financial institutions in Chile and Argentina have embraced HID’s technology to secure pension payments for over one million elderly citizens. HID’s multispectral fingerprint devices have helped eliminate fraud in Mexico’s national vaccination program and other healthcare initiatives that provide millions of underprivileged citizens with subsidies for medicine and medical care. Most reliable fingerprint capture technology The company’s biometrics sensors are also used extensively in commercial applications in Mexico, including verifying identity for more than 70,000 members of a large fitness club franchise. Now, the same technology is poised to improve banking security and convenience in Mexico as the CNVB gets closer to the October 2018 deadline for financial institutions to verify their customers’ identity using fingerprint biometrics when creating accounts, applying for loans and conducting other transactions. HID’s patented multispectral fingerprint imaging technology captures unique characteristics from both the surface and subsurface of the skin HID’s patented multispectral fingerprint imaging technology captures unique characteristics from both the surface and subsurface of the skin, providing the most reliable fingerprint capture technology available. Multispectral fingerprinting works for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions--from dirt and grease to sunlight to wet or cold conditions. Liveness detection capabilities to eliminate fraud HID Global’s Lumidigm biometrics solutions also feature field-updatable ‘liveness detection’ capabilities that help eliminate fraud by preventing the use of fake fingerprints or ‘spoof’ attacks. The devices use a top-ranked NIST certified MINEX III minutia algorithm for proven interoperability with industry-standard fingerprint template databases. HID will be demonstrating its biometrics solutions at Expo Seguridad Mexico from April 24-26 in Stand #3131 at the Centro CitiBanamex in Mexico City.
Boon Edam Inc., a manufacturer of security entrances and architectural revolving doors, has announced that Georgia Southern University’s state-of-the-art Recreation Activity Center (RAC) has deployed an integrated pedestrian access solution so only members can access the facility. A Boon Edam Trilock 60 tripod turnstile is integrated with Iris ID IrisAccess solution to enable swift user verification and access with a minimum of effort for students, faculty and staff. Centre of campus life The RAC at Georgia Southern serves as the centre of campus life, welcoming over 5,000 students each day. Originally opened in 1998 with 80,000 square feet, the facility was expanded in 2006 to its present size of 215,000 square feet. The expansion achieved LEED certification, the first building to do so at Georgia Southern, which reflected the university’s culture of sustainability. Among the many amenities at the RAC are an aquatics centre with a 25-metre swimming pool, eight indoor basketball courts, group fitness studios, a rock climbing wall and an 18,000 square foot fitness centre.When students used the iris scanners in the dining halls, it took no more than 2 seconds to process their entry Iris recognition-based access control The newly renovated RAC deployed Boon Edam waist-high turnstiles and gates as a means to control access for the increased number of visitors each day under staff supervision. In 2006, the turnstiles were paired with fingerprint scanning technology to confirm the identity of each member. But in 2014, when the Iris ID IrisAccess solution was paired with tripod turnstiles at two dining centres on campus, the RAC facility managers decided to investigate integrating an eye scanner with their current access control software. “With each passing year, the size of the database would grow, leading to an increase in the time it would take to verify each member. The process slowed, taking five to 12 seconds to grant access, causing unwanted delays for our users,” said Jason Schmidt, facility coordinator at the RAC. “When students used the iris scanners in the dining halls, it took no more than 2 seconds to process their entry. Once we realised that Iris ID was the superior method for access control, we decided to upgrade our system to better meet the needs of our members.”Once members purchase a membership and are entered into our database, the system grants them seamless access to the facility" Trilock Side Gate-controlled egress Currently, as members enter the RAC in the main lobby, they can choose from two different access points. They can scan their iris at the iCAM7000S Series mounted on the turnstile, or swipe their ID at the main desk and proceed through a gate. Boon Edam Trilock Side Gates are used on the other side of the main desk for dedicated egress. “The arrangement of a turnstile paired with the iris scanner technology is extremely fast and we’re encouraging our members to use it,” said Schmidt. “Once they purchase a membership and are entered into our database, the system grants them access to the facility and it is pretty seamless.” The RAC is planning to renovate in the near future to have a total of 4 turnstiles integrated with the Iris ID IrisAccess solution. Towards multiple entrance lanes “The Iris ID and Boon Edam partnership goes back to early 2000 when the two technologies were integrated at Schipol airport in Amsterdam,” said Mohammed Murad, vice president for Iris ID. “We’re very excited to continue delivering integrated technology solutions to our customers.” “We are always concerned with who is coming in and prefer to have as many turnstiles as possible to automate the process and reduce the burden on our staff. Everyone who is registered for the iris scanner likes it; we’re looking forward to the next stage when we can have multiple entrance lanes, bringing everything up to speed,” concludes Schmidt.