Download PDF version Contact company
SAFE suite covers physical identity management, compliance and risk management and security intelligence tools
SAFE suite covers four areas, inlcuding physical identity management and compliance and risk management

Quantum Secure's SAFE software suite manages identities and physical access enterprise-wide across multiple security systems to enable greater compliance, lower operational costs, and streamline and optimise business processes. Further enhancing the intuitive functionality of SAFE, Quantum Secure is demonstrating two new modules at ASIS 2012 designed to automatically match identity and manage duplicate records from multiple databases from multiple access control systems, and provide key metrics of physical security operations with the ability to analyse data using an executive-level, graphical dashboard.

The SAFE enterprise software suite includes a range of applications to automate management of identity-related processes such as on/off boarding of employees and contractors, assigning policy-based physical access rights, issuing ID badges, and managing audit and compliance processes across multiple geographies and locations. SAFE suite applications encompass four main areas: physical identity management, compliance and risk management, security intelligence tools, and identity and event correlation.

“By linking physical security operations to a company's IT infrastructure using centralised management of identities, SAFE software lowers costs and yields an abundance of operational benefits,” said Ajay Jain, President and CEO, Quantum Secure. “We will continue to expand the scope and functionality of our SAFE software suite in response to customers' evolving needs to manage identities and access at the enterprise level.”

New SAFE software modules being introduced at ASIS 2012 include:

  • “By linking physical security operations to a company's IT infrastructure using centralised management of identities, SAFE software lowers costs and yields an abundance of operational benefits...”

    SAFE ID Data Match and Reconciliation provides the ability to match identity records from multiple databases and identify duplicates across or within multiple access control systems. This module provides an intuitive interface to access complex and fuzzy data matching techniques to identify duplicate records, inconsistent formats and other data problems. This ensures identity data integrity across many systems and helps foster a notion of “single” identity in an enterprise.
  • SAFE Security Intelligence defines key metrics of physical security operations and delivers the ability to analyse security events, alarms, space utilisation and trends using an executive-level, graphical dashboard view. This module helps gain insight into physical security data based on key metrics of operations. Metrics include alarms by site, badge allocation by type, and sites and devices that generate the most alarms, etc.

Other SAFE capabilities include the SAFE Analytics suite, enabling end-users to prepare for risks and help prevent risk-based events before they occur. SAFE modules also address compliance for regulations such as Sarbanes-Oxley, TSA, NERC, HSPD-12 / ICAM and hosts of other regulatory policy requirements and provide web-ready reports for easy analysis.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?