Fingerprint reader
HID®, a pioneer in trusted identity solutions announced an extended partnership with its trusted partner Inner Range, a global provider of integrated access control systems and solutions, to offer Inner Range customers a new range of SIFER credentials compatible with wallet-enabled readers, based on HID’s signature line of access control readers, HID Signo®. Mobile access “The sheer opportunity to further deepen collaboration with our partners excites us,” says Steve...
Pioneering global access solutions provider Salto Systems, part of SALTO WECOSYSTEM, is thrilled to announce the launch of the new Design XS Keypad Wall Reader series. With a sleek design that is ideal for any space, this revolutionary product represents a breakthrough in access control technology. Designed for ease of use for both physical credentials and mobile access, the reader is built to last with a durable keypad. To assist the visually impaired, numbers and symbols are embossed with 5-p...
Matrix is excited to present its array of security products and solutions at Booth No. H1.17, Hotel Taj Vivanta, during InnoMetro, 2024. Matrix is the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways. Matrix network cameras are certified by STQC, Delhi lab for following the OWASP ASVS 4.0 L2 norms mandated by RDSO for cybersecurity. Matrix cameras Matrix Cameras are designed to ensure that the data gathered by these cameras is secured...
In collaboration with key partner Trinet Technologies Pte Ltd, Anviz organised two successful roadshow events. Both events brought together more than 30 industry experts who showed great enthusiasm for Anviz's business model of user scenario-driven solutions and interest in the new features of the product. Need for Southeast Asian Markets: RCEP Brings New Opportunities, Largest Incremental Market in the World As the largest FTA in the world, which will lead the development of global free trade...
IDEMIA Public Security North America, the biometrics solutions pioneer for law enforcement agencies, announced that it has implemented its cloud-native, fully functional Automated Biometric Identification System, STORM ABIS, in Volusia County, Florida to support its latent print unit. The Volusia Sheriff’s Office is the first law enforcement agency in the nation implementing a cloud-native ABIS that can search county, state, and federal databases from a single application. Volusia County,...
Money Carer, a UK-based national social enterprise focused on providing secure money management services for vulnerable people, has partnered with global card manufacturer Tag Systems and biometrics company Fingerprint Cards AB (Fingerprints™). The companies have created and launched a biometric-enabled ‘carer card’, addressing barriers that have traditionally restricted vulnerable people in the UK from accessing financial services. Carer card In 2010, Money Carer invented a...
News
Smart Spaces announces that it has partnered with the trusted identity provider, HID, to make access to Workspace’s The Light Bulb building in South West London fast, simple and secure, by making door access credentials available in Google Wallet for all SME customers who lease offices and studios at the centre. Any registered Android smartphone user can gain quick and seamless access to The Light Bulb by holding their device near any NFC-enabled HID Signo reader, with doors then opening automatically. Google Wallet integration Smart Spaces is the first HID Technology Partner to carry out such a Google Wallet integration project, with Workspace the first customer in the world to benefit from this innovative technical collaboration. A FTSE 250 company, Workspace owns and manages 4.6 million sq. ft. of flexible office space across 76 locations in London - home to some of the Capital’s brightest young companies who rent and design their own space and join a vibrant community of other businesses. Ease of access Chris Boultwood, Workspace’s Head of Technology, says, “Our customers are agile, ambitious SMEs who are digitally savvy, and we know how much they appreciate having ease of access to the building with just their phones." Chris Boultwood adds, "We’re always looking to make their experience as seamless as possible and the HID/Google Wallet door access is a natural step forward at The Light Bulb. We’re now excited to start rolling this out across other London locations.” Self-service plus seamless credentials Smart Spaces’ OS is used by Workspace’s customers to not only access the building but to book meeting rooms Smart Spaces’ OS is used by Workspace’s customers to not only access the building but to book meeting rooms and receive information about events and activities happening onsite, with the software branded MyWorkspace. Unlike issuing traditional plastic RFID access cards, shifting to digital offers self-service plus the seamless provisioning of credentials, making it far easier for all concerned – Workspace’s customers as well as onsite facility management staff. Secure and convenient mobile experiences “This partnership highlights our commitment to providing a wider range of secure and convenient mobile experiences for workspaces for all types of end users– from SMEs to larger enterprises. As we diversify and expand our mobile solutions portfolio globally, stay tuned to see more Google Wallet integrations in the coming year,” said Sanjit Bardhan, HID’s Vice President & Head of Global Mobile Business. Smart Spaces’ goal is to be the world’s pioneer in smart building operating systems for commercial real estate. Tap-and-go functionality Winners of the Santander Technology Business of the Year in 2023, a raft of prestigious projects in the UK use its software which has put London centre stage of global smart building implementations. Dan Drogman, Smart Spaces’ Chief Executive Officer, says, “At Smart Spaces, we continuously strive to provide the best possible user experience for our customers. The ‘tap and go’ functionality and convenience offered by Google Wallet provide this seamlessly. We’re delighted we’re the first to offer this to our customers.”
Acre Security, a global pioneer providing state-of-the-art security systems, unveils acre access control in conjunction with the acre Smart Controller and the acre Reader. The combined ecosystem delivers extensive flexibility and offers the fastest and most user-friendly route to cloud adoption. Together, these solutions provide a simple and robust security solution to meet the evolving needs of any organisation. Functionality, flexibility, freedom Built from the outset with cybersecurity in mind, acre access control offers intelligent functionality, flexibility, and the freedom to choose the best deployment option based on the business’ specific requirements. Organisations are no longer constrained to select between on-premises or cloud-based systems as acre access control can be deployed in either a native cloud or local on-premise environment, based upon the same code base and user interface, making the move from on-prem to cloud seamless. User-friendly interface "As the market landscape evolves, our goal is to enable customers to choose the platform that best aligns with their needs, a degree of flexibility they have long desired but have struggled to find," said Don Joos, CE of Acree Security. "Acre access control brings a user-friendly interface, connects with a wide array of networked systems, and supports a myriad of deployment strategies. With acre access control, we pave the way for a smooth transition to stronger, faster, more capable security operations.” Functional Integration Toolkit Scripts (FITS) Contractors are provided immediate access through one-time codes delivered directly to their mobiles Acre access control offers simplicity and efficiency with Functional Integration Toolkit Scripts (FITS), transforming the landscape of workflow efficiency. Visitors and new employees can easily navigate self-enrollment, sending text messages to start the process, while new hires can quickly submit selfies to obtain their mobile credentials. Contractors are provided immediate access through one-time codes delivered directly to their mobile devices. Employees can also reserve workspaces and arrange after-hours access, handling all approvals via TEAMS or text messages. 4-door smart controller Designed to meet dynamic market demands, the 4-door acre smart controller keeps people and property safe with intelligent, affordable, and unparalleled agility. It manages two doors with Wiegand or up to 4 doors with OSDP, supporting up to eight readers for comprehensive entry and exit management. Multi-technology access control readers Acre's solutions offer versatility and modern aesthetics, ensuring customers have the freedom Furthermore, acre introduces a lineup of multi-technology access control readers that enable mobile wallets to be fully compliant with OSDP standards, and support a wide range of technologies, including NFC, Bluetooth, Smart (13.56 MHz), and Proximity (125 kHz.). Acre's solutions offer versatility and modern aesthetics, ensuring customers have the freedom and flexibility to set their migration path to secure credentials and ecosystems. IoT and IT advancements “As the security industry moves away from its reliance on hardware, it aligns more closely with rapid advancements in IoT and IT,” said Darren Learmonth, CT of Acre Security. “This shift signifies a broader trend towards systems that integrate better, work more efficiently, and adapt to the evolving security and enterprise risk landscape.” ISC West 2024 The acre security team invites visitors to experience the future of access control at ISC West 2024. Discover how the organisation revolutionises the industry with innovative, simplified, comprehensive solutions. For an in-person experience, visit us at the Acre Security booth #20059 at ISC West 2024 or schedule a meeting.
HID, a worldwide pioneer in trusted identity solutions, announces its 2024 State of the Security Industry Report, which gathered responses from 2,600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organisation sizes representing over 11 industries. The 2024 State of Security Report delves into the underlying concerns driving upcoming innovations and the technologies underpinning them, helping security pioneers proactively adapt to evolving challenges. Survey findings Conducted in the fall of 2023, 2024’s survey reveals six themes, as follows: Mobile identity is expected to be ubiquitous in the next five years Given the widespread use of mobile devices, momentum continues to build around their use in support of identity. Within the next five years, surveyed end users state that nearly 80% of organisations will deploy mobile IDs. Industry partners are even more optimistic in their outlook, stating that 94% of their customers will have deployed mobile IDs. MFA is widespread, despite the slow but growing implementation of Zero Trust Zero Trust is an approach to security that calls to maintain strict access controls and never trust More than 83% of end-user respondents said their organisation currently uses Multi-Factor Authentication (MFA), mainly due to the vulnerabilities of passwords. For many, this represents the first step on the longer journey toward Zero Trust, an approach to security that calls for organisations to maintain strict access controls and to never trust, or always verify anyone – internal or external – by default. Zero Trust has been implemented in 16% of organisations with over 100,000 employees and 14% in those with up to 10,000 employees, according to the survey. FIDO With MFA being widespread, the eventual end of passwords is imminent. The creation of new standards such as FIDO (Fast Identity Online), which uses “standard public key cryptography techniques to provide phishing-resistant authentication,” will pave the path to new and more secure authentication options that will be part of a more robust Zero Trust architecture. Sustainability becomes a growing driver in business decisions A shift to cloud-based solutions and increased use of mobile devices are two clear strategies Among HID’s survey respondents, sustainability continues to rank high as a business priority, with both end users and partners rating its importance at a “4” on a 1-to-5 scale. Additionally, 74% of end users indicate the importance of sustainability has grown over the past year, and 80% of partners reported the trend growing in importance among their customers. As such, there will likely be a continued emphasis on solutions that minimise energy use, reduce waste, and optimise resource usage. A shift to cloud-based solutions and increased use of mobile devices are two clear strategies to reach these sustainability goals. Biometrics continues its impressive momentum In this year’s survey, 39% of installers and integrators said their customers are using fingerprint or palm print, and 30% said they’re using facial recognition. The momentum continues to build as 8% plan to test or implement some form of biometrics in the next year and 12% plan to do so in the next three to five years. Identity management points up to the cloud Nearly half of end users are moving to cloud-based identity management, with 24% already using it Nearly half of end users are moving to cloud-based identity management, with 24% already using it and another 24% in the process of implementing such systems. Industry partners say their customers face several hurdles here, including existing reliance on legacy/on-prem equipment (28%), lack of budget (24%), and cloud-based identities simply not being a business priority (21%). The rise of artificial intelligence for analytics use cases Conversations about AI have come to dominate the business landscape, and many security professionals see AI’s analytic capabilities as the low-hanging fruit to enhance identity management. Rather than looking to AI to inform the entirety of the security system, it’s possible to leverage data analytics as a way to operationalise AI in support of immediate outcomes. In this scenario, 35% of end users reported they will be testing or implementing some AI capability in the next three to five years, with 15% already using AI-enabled biometrics.
Suprema, a global pioneer in AI-based security solutions, has announced the supply of the latest version of the under-display ultrasonic fingerprint recognition algorithm, BioSign, to the Samsung Galaxy S24 series supported by the Qualcomm 3D Sonic Sensor Gen 2. Since 2019, starting with the Samsung Galaxy S10, Suprema has continuously incorporated fingerprint recognition algorithms into numerous Galaxy S series, earning recognition for its world-class technological capabilities. BioSign 6.0 version The BioSign 6.0 version featured in the Samsung Galaxy S24 has received acclaim in the market for its significantly upgraded fingerprint recognition speed and security. Compared to its predecessor, BioSign 5.0, BioSign 6.0 has achieved a technological innovation that simultaneously enhances speed and accuracy. It provides an improvement in accuracy and a faster response time, to greatly enhance user convenience. AI-based fingerprint analysis AI-based fingerprint analysis algorithm that efficiently recognises abundant fingerprint information Particularly noteworthy is the optimised AI-based fingerprint analysis algorithm that efficiently recognises abundant fingerprint information obtained through the Qualcomm® 3D Sonic Sensor Gen-2. "The adoption of Suprema's fingerprint recognition technology in the Samsung Galaxy smartphone series signifies significant recognition of our top-notch technological capabilities in the global market," said James Lee, Suprema Inc. Founder and Chairman. AI-based fingerprint and facial recognition James Lee adds, "BioSign 6.0, in particular, is being evaluated for delivering overwhelming performance and user convenience compared to existing technologies, creating expectations for market expansion." He continues, “Our commitment to continuous advancement in fingerprint and facial recognition technology based on AI is pioneering the way in the biometric recognition market.”
Janam Technologies, a pioneering provider of rugged mobile computers and contactless access solutions, announced the launch of its XR2 UHF RFID Reader–an all-in-one device designed for real-time tracking and unprecedented visibility into the location and status of items throughout the supply chain. Built to thrive in demanding warehouse, manufacturing and logistics operations, XR2 combines the most advanced RAIN RFID technology with a sleek, intuitive and ergonomic design that sets a new standard for power and performance. Superior sensitivity, long-range RFID reading and lightning-fast processing speeds bring enormous value to inventory management, asset tracking and other line-of-business applications. Key facts XR2 is a state-of-the-art, handheld RFID reader that optimises workflow in the most challenging environments. It helps businesses tackle the complexities of modern supply chains with efficiency and precision and sets a new benchmark for what’s possible in asset tracking and inventory management. XR2 is priced to deliver unparalleled value to enterprise customers who don’t want to spend more than is necessary to acquire a superior, uncompromising, all-in-one UHF RFID reader. Powered by the industry-pioneering Impinj E710 reader chip, XR2 guarantees exceptional signal clarity and incorporates self-jammer cancellation to ensure robust tag detection in areas with a high concentration of tags. Capable of scanning more than 1,000 EPC Class 1 Gen 2 tags per second and from up to 60 feet away, XR2 delivers new levels of efficiency in asset management and inventory control, significantly reducing the time and labour required for businesses of all types and sizes. Equipped with an advanced Honeywell 1D/2D imager for high-throughput capture of even the most difficult-to-read barcodes, XR2 ensures every barcode is acquired and decoded swiftly and accurately. With JanamConnect®, an optional multi-carrier SIM card solution available to XR2 users, businesses gain access to the best-performing cellular networks worldwide, including AT&T, Verizon, T-Mobile and more than 600 other networks. XR2’s built-in GPS functionality not only provides accurate location data but also enhances asset tracking and management. By merging precise tag location information with RFID data, XR2 enables businesses to gain business-critical insights into asset logistics, streamline operations and significantly boost efficiencies across the modern supply chain. Transformative solution Harry B. Lerner, CEO, Janam Technologies: “With XR2, Janam is introducing a transformative solution that will drastically improve how businesses view and manage their assets across the supply chain." "Now that we’re part of HID, a global powerhouse in the RFID industry, we’re especially excited about adding world-class UHF tag reading ability that thrills our customers in terms of performance and affordability.”
With a three-decade history, Matrix has established itself as a globally acknowledged presence in the Security and Telecom Industry. Catering to organisations of various sizes, Matrix is renowned for its commitment to excellence, delivering comprehensive solutions in Video Surveillance, Access Control, Time-Attendance, and Telecom. Enterprise solutions Customised to address a wide range of communication and security requirements, Matrix is a trusted provider of sophisticated and all-encompassing enterprise solutions. Matrix remains unwavering in its dedication to providing technology-driven solutions with a primary focus on ensuring customer satisfaction. This commitment is evident in the development of cutting-edge products originating from internal research and design initiatives. Research and development Matrix's global presence is strengthened by a robust network of over 4000 partners By deliberately allocating resources, 40% of its workforce is dedicated to continuous innovation in research and development. The outcome is a comprehensive portfolio comprising over 60 technologically advanced products across four distinct domains. Matrix's global presence is strengthened by a robust network of over 4000 partners, enabling it to reach a user base exceeding 1 million worldwide. Partner ecosystem Demonstrating steadfast commitment, Matrix directs its sales efforts exclusively through an extensive and well-established partner ecosystem. This strategic approach underscores our commitment to delivering high-quality solutions and cultivating enduring partnerships in the technological landscape. Impact at Smart Lift and Mobility Committed to driving advancements in both local and global markets, Matrix strategically prioritises extensive research to develop state-of-the-art enterprise solutions. As a demonstration of our dedication to innovation, MATRIX made a significant impact at the Smart Lift and Mobility in Bengaluru. This event served as a platform to introduce our latest products in the Security and Telecom sectors. The Smart Lift and Mobility 2024 catalysed collaborating with partners and system integrators, offering a distinctive opportunity to discover and foster new business prospects. IP Video Surveillance solutions IP Video Surveillance solutions including enterprise-level NVRs, UL-listed Cameras, Matrix VMS, and more Matrix introduced a diverse range of IP Video Surveillance solutions, including enterprise-level Network Video Recorders (NVRs), UL-listed Cameras, Matrix Video Management Software (VMS), and more. These solutions are intricately crafted to address various customer challenges, such as bandwidth optimisation, storage costs, efficient multi-site office management, and proactive security measures. Matrix guarantees a customised response to all organisational needs. Camera lineup The highlighted Camera lineup encompasses a variety of Matrix Ruggedised, Turret, Dome, Bullet, and PTZ Cameras, providing resolutions ranging from 2MP to 8MP. These cameras proudly carry both UL Certification, confirming compliance with global safety standards, and NEMA Certification, ensuring robust protection against environmental hazards. This commitment to certification ensures the delivery of high-clarity images crucial for advanced scenario analysis. Enterprise-grade NVRs Additionally, Matrix presented its enterprise-grade NVRs, designed with a server-based architecture and equipped with pre-installed Video Management Software. These NVRs offer support for redundancies and incorporate hot-swappable hard disks (HDD/SSD) boasting an impressive storage capacity of up to 144 TB. This comprehensive solution emphasises Matrix's commitment to delivering outstanding security solutions specifically tailored to the diverse needs of organisations. Access Control and Time-Attendance Matrix's commitment to in-house development ensures a smooth and integrated solution As the exclusive Original Equipment Manufacturer (OEM) specialising in the Access Control and Time-Attendance sector, Matrix takes pride in overseeing the entire development process of architectural components. From panels and door controllers to readers and software, Matrix's commitment to in-house development ensures a smooth and integrated solution. COSEC ARGO FACE During this event, Matrix introduced the COSEC ARGO FACE, an intelligent door controller featuring advanced face recognition technology. This state-of-the-art device distinguishes itself with the incorporation of modern features such as Adaptive Face Recognition, Face Liveness Detection, and Mask Compulsion, providing a comprehensive approach to security and health considerations. With an advanced deep learning algorithm, an impressive identification speed of under 0.5 seconds, and a substantial user capacity of 50,000, the COSEC ARGO FACE represents the epitome of security technology, addressing the evolving needs of organisations. COSEC PANEL200P, Door Controllers, and Readers Adding to the event's appeal, Matrix introduced the versatile Matrix COSEC PANEL200P, an advanced access control hub with the capability to supervise up to 255 COSEC door controllers and manage 25,000 users. This flexible device plays a crucial role in network architecture mode, facilitating a seamless connection between door controllers and servers. In standalone architecture mode, it operates autonomously as the central unit for controllers, functioning independently of server infrastructure. Alongside this notable offering, Matrix presented its carefully crafted extensive range of Door Controllers and Readers at the event, emphasising Matrix's dedication to delivering comprehensive solutions for Access Control and time attendance. Telecom products IP-PBXs, with a particular emphasis on the ETERNITY NENXIP50, and the Hybrid IP-PBXs Making a substantial mark in the Telecom industry, Matrix presented its impressive range of Telecom products at the event. The spotlight was on the Media Gateways, specifically the cutting-edge SETU VFXTH Series. Notable additions to the product lineup included the IP-PBXs, with a particular emphasis on the ETERNITY NENXIP50, and the Hybrid IP-PBXs, prominently featuring the ETERNITY GENX. This event also featured the pure-IP SPARK200 and high-end business IP phones, contributing to the comprehensive showcase of products. Matrix maintains its commitment to delivering innovative and dependable solutions, solidifying its position as a major player in the Telecom sector. Insights into changing market demands Kaushal Kadakia, Head of Marketing, highlighted the Smart Lift and Mobility 2024 as a crucial platform that improved Matrix's understanding of both local and global markets. Successfully building connections with important system integrators and business partners, he stressed the event's value in gaining insights into changing market demands. This understanding empowers Matrix to enhance and tailor its advanced telecom and security solutions to meet the specific needs of the industry.
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Along with the growing adoption of cloud, SaaS applications have accounted for more than triple of the account-takeover attacks between 2019 and 2021, alone. Any given breach can potentially bankrupt many small businesses, with average costs reaching USD 4.35 million in 2022, according to a 2022 IBM report. Every business, no matter its size, must minimise these risks by deploying a range of cybersecurity tools and procedures. One of the most important elements is multifactor authentication (MFA). Some cyber insurance companies mandate MFA as a prerequisite for coverage and others will lower their premiums for companies that have deployed it. These insurers know how much more secure the enterprise is when multiple different verification methods are used for logging into accounts and applications. Importance of Cyber Insurance Cyber insurance has become a must-have for organisations that deploy and rely on digital systems. Small businesses are especially vulnerable to cyber threats since few have invested in the necessary security tools to defend against network breaches, scams and other types of cybercrime. Cyber insurance has become a must-have for organisations that deploy and rely on digital systems The good news is that cyber insurance policies are widely available and offer a broad range of coverage options. Some will pay the costs of direct expenses associated with a network attack as well as legal costs, including litigation defense payments, if the business could not meet contractual obligations because of the breach. Cyber insurance premiums Policies may also cover the cost of losing and then restoring access to technology after a breach. Policies may even cover the costs of transfer payment fraud caused by social engineering, as well as profit losses from reputational damage, although this can be restricted to a finite period of time. Depending on the coverage that is selected, cyber insurance premiums can be expensive, and a policy does not replace the solid foundation of an underlying cybersecurity framework. A foundation that includes MFA will help to stop cybercrime before it is committed while also making it easier to acquire and reduce the costs of cyber insurance. In fact, MFA is now one of the most common conditions for obtaining cyber insurance because of its proven ability to help prevent account takeover attacks and stop identity-related data breaches. Multifactor authentication overview The MFA ‘factors’ for confirming identity during login typically include something the user knows The MFA ‘factors’ for confirming identity during login typically include something the user knows (like a pin), something the user has (like a secure device), and something the user ‘is’ (like presenting a fingerprint or face scan to a reader or camera). Using these factors when accessing sensitive applications, systems, and data helps prevent attackers from compromising accounts. This is true even if the attacker has somehow tricked legitimate users into providing usernames and passwords through phishing schemes, in which seemingly legitimate emails are used to harvest this information. Preventing unauthorised access These types of attacks can be launched at scale and put millions of organisations at risk around the world. Some insurance providers simply will not cover them. They know that MFA can help organisations avoid these ‘user error’ attacks through authentication policies that prevent unauthorised access to any of the organisation's networks, applications and devices, wherever they are located. The U.S. government has also required that all federal agencies use MFA Insurers aren't the only ones recommending and even mandating MFA. The U.S. government has also required that all federal agencies use MFA, per the Executive Order On Improving the Nation's Cybersecurity signed by U.S. President Joe Biden in May 2021. A similar recommendation has been made in Europe as part of ENISA guidelines. The barriers to MFA adoption by SMBs One might wonder why over 40% of small and medium size business(SMBs) in the United States don’t have a cybersecurity plan in place and why less than 15% of the ones that do have a plan, consider it to be inadequate. According to the Cyber Readiness Institute, when we dive deeper into the details, there are three key barriers to MFA adoption: Lack of Awareness — 55% of SMBs are reported to remain unprotected because they’re simply unaware of MFA and its benefits to their organisation. Limited Understanding — Beyond a lack of awareness, 30% of business owners said they don’t utilise MFA because they simply don’t know how it works. In addition to the fundamental functionality, there are a variety of MFA options to consider, including a range of form factors that can be utilised to best meet an organisation’s needs. Perceived Inconvenience — 20% of SMBs believe MFA is too inconvenient, when in reality, we’re all more familiar with the concept than we think. How smaller businesses can best implement MFA SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle by allowing them to quickly and easily increase security and convenience. MFA isn’t only about security, its also about convenience. Implementing MFA allows organisations to eliminate reliance on passwords, which can significantly improve user experience. So what should decision-makers know about MFA in order to implement it for their SMB? Ease of Use — The right MFA solution should offer a variety of authentication methods, but should also be easy to adopt and use across the organisation. Multiple Methods and Form Factors — Determine the best combination of authentication methods and form factors. Some providers offer only a small selection, which can tie you down to very basic and inflexible options that do not fully meet your users unique needs. Easy Deployment and Management — Time is money, especially for SMBs. Some solutions can take months to deploy, require extensive training and new installation codes, as well as potential overhauls to existing applications. Look for a solution that can be up and running in days. A Complete Solution — Any MFA solution should provide comprehensive security across all of your assets, including your PCs, mobile devices, applications and networks Compliance — Compliance impacts businesses of all sizes. As such, be sure to find a provider that meets evolving industry standards, including data protection such as GDPR and CCPA. Adaptability — As your business grows, your security needs will also evolve, with some users or parts of your business requiring more security than others. Make sure your provider allows you to scale and adjust accordingly to offer the right security for the right users. Blocking cybercriminal attempts Leading and growing a smaller business is a big challenge. Fortunately, adopting MFA provides a safety net to help block cybercriminal attempts, protect your business’ reputation and most importantly, help protect your bottom line. MFA should be the foundation for any robust security strategy and many cyber insurance companies now require it to reduce premiums and even qualify for coverage. For best results, organisations should choose a solution that is easy to deploy, offers a broad range of authentication options and form factors, and gives users a smooth and convenient authentication experience.
A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutions. In the world of access control systems, biometric advancements allow for more secure authentication measures and seamless security processes. As more products and services hit the market, learn our predictions for the 2023 biometric trends in this article. Biometric access control systems What are biometric access control systems? Biometric access control systems include safety measures like facial and fingerprint recognition, as well as multi factor identification terminals. These systems decide who is authorised to enter a specific room, floor or even the entire building, using a database of stored identifiable features, like someone’s fingerprints. If an individual tries to enter and is not in the system, then they are denied access. Biometric Access Control Trends to Look Out For in 2023 - From multifactor authentication to contactless security measures, discover the five biggest upcoming trends in biometrics for access control. Real-time facial recognition The cloud has offered us new and innovative ways to store vast amounts of data Cloud Biometrics - The cloud has offered us new and innovative ways to store vast amounts of data. Combined with biometrics, this trend will allow security professionals to forgo the dedicated server and store their data on the cloud. Cloud biometrics facilitate real-time facial recognition and other processing-intensive security measures. It even allows for remote monitoring, which will be essential in our new era of hybrid working. Multifactor Authentication - In 2023, multifactor authentication will become the norm. It is already widely used by people to secure their accounts, but it will be vital in access control security. Multifactor authentication adds another layer of security by combining a traditional password with facial recognition or fingerprint biometrics. This approach has previously been reserved for highly sensitive data, but with cybercrimes on the rise, it will soon be used to protect everyday accounts. Highly sensitive data Contactless Biometrics - The most recent advancements in biometrics allow people to go about their day without being interrupted by pin codes and touchpads. Contactless biometrics, combined with integrated systems and algorithms, allow people to move seamlessly without sacrificing security. The latest biometrics, for example, can let a pre-authorised individual into a building, inform the appropriate people that they have arrived and call them an elevator, all without needing to touch a keypad. They care about security, but people also want to trust that their provider shares their values Ethical Biometrics - Increasingly, people are valuing ethical biometrics. They care about security, but people also want to trust that their provider shares their values. People want to know that their data will be protected, in line with privacy laws, and that the biometrics system they use will be unbiased. This new standard for the industry has been growing steadily, but 2023 will bring stricter expectations for ethical security. Digital IDs - More people than ever are using digital IDs. From the humble digital wallet, which we all have on our phones, to more complex applications used in access control, physical cards are seemingly a thing of the past. This shift has required (and will continue to require) a complete overhaul of existing infrastructure to allow for new forms of identification. TLDR: 2023 biometric trends in access control The latest biometric trends will see contactless security measures become the norm. With advancements in cloud biometrics and digital IDs, the latest technologies will continue to allow for new and innovative security solutions. However, with stricter expectations for ethical biometrics and data privacy, any new security trends will need to align with these standards. As the founder of Elite Security, Ben McCayna is passionate about security. He started the company in 2004 after identifying a need for high-quality door and security installations and specialised maintenance for commercial businesses. Ben is one of the leading security experts in London and beyond, thanks to his highly successful company and network of happy clients. Elite Security has grown to offer a wide range of security and access control systems, including fire safety, intercoms, alarms and CCTV. With decades of experience in both business management and security, Ben has established himself as a true expert in his field.
Security beat
Acre is a company built on mergers and acquisitions (M&A). Since its founding in 2012, Acre acquired several familiar access control companies, from Vanderbilt to RS2 Technologies, Open Options to Feenics, and several others. Acre itself was acquired in 2021 by UK-based private equity firm Triton, thus launching a new chapter in the company's history. Don Joos was named the new CEO in 2022 and set about transforming Acre from a collection of acquired companies into a coherent whole (representing various brands). A year later, we recently caught up with Don Joos to discuss the "new Acre" and what's ahead. Q: How does your background inform your approach to leading Acre Security? In physical security, there is a shift to more of a software-centric versus hardware approach Joos: This is my fourth company as CEO. What I’ve found along the way is that no matter the size or type of business, there’s a common theme, the business is going through some form of evolution or transformation because the industry they're in is going through an evolution. And today, in physical security, there is a shift to more of a software-centric versus hardware approach, and there’s a shift occurring that’s pulling us to the cloud. I think a key thing here is that while the industry is evolving, we must keep a careful eye on the evolution of the customer because the customer is the one who will dictate the pace of change, and I think that is what a lot of people sometimes lose sight of. Q: It seems Acre is on the path from being a “collection of small companies” to “a collection of brands within a single company.” Joos: I think most people think of Acre as a federation of companies. Acre Security was seen more as a holding company. For me, I think the biggest misconception is just that: “This is just a federation of companies” versus “This is a business.” Acre Security is a business that has a range of portfolios to address key verticals and pivotal business problems for customers. Because of what’s happening now and the market dynamics that are occurring, it ties back to “Who is Acre Security?” We have a clear answer as to where we want to be from cloud access control versus on-premise access control. We have clear answers regarding market segments, visitor management, and intrusion. When you think about it, those are the core areas of our business. Q: What has surprised you the most in your first year or so at Acre? Joos: I think the thing that surprised me the most was how similar the problems are because I was coming into a new industry. It’s surprising how strong a correlation [security has] to other industry transformations that I’ve been a part of. Q: What are the points of differentiation among the various Acre Security brands? Joos: I think if you go back to the history of the company, it was designed to compete. That is, that's how it was set up under the logic of, “If we have three bids in a deal, it increases the odds that we're going to win one of them.” As we evolve, to have sustained scalable growth, it is not just about going shallow and casting a wide net. It’s about creating a concentrated focus. Some of the technology is just inherently older technology. And so for me, it’s about creating migration paths for the customers to move to more modern technology, such as the cloud. I love our installed base. When you think about the cost of acquisition to get a new cloud customer, it costs a lot less when you have an installed base that you can migrate to the more modern solution versus having to spend the money and the sales energy to hunt for that next opportunity. Q: Where has Acre positioned itself in the marketplace? We can take care of your current needs, but we also have a clear migration path to take care of your future needs Joos: If you're ready to go to the cloud, we have an answer for you. If you're not ready to go to the cloud, but you're ready to take more cloud-based applications to continue to evolve, we have an answer for you. If you're not quite ready yet and you're still looking for a market-leading premises solution, we have an answer for you, and we have a migration path when you're ready down the road. So, you have a safe bet with Acre because we can take care of your current needs, but we also have a clear migration path to take care of your future needs. Q: How are you building up your team? Joos: In 2023, we’re getting a lot of core building blocks in place and making investments in people who have experience in this space or aligned industries. It is a balance. I think we need a group that understands the industry and a group that's going to come into it and challenge why we do things the way we do. I think that makes us unique: we have fresh eyes looking at things from a different perspective. With that, you’re naturally going to end up with a better answer to problems because people are comfortable challenging the status quo. Q: How are you seeking to expand your dealer channel and/or transition it from the various dealers “inherited” in previous acquisitions? Joos: The channel invests in Acre Security. Our success is their success, and so what we're proposing to them is a range of solutions that supports their longevity and their financial success. But we also continue to build out our portfolio through organic technology innovation or M&A. We're continuing to make investments in our channel strategy and how our partners interact with us We're continuing to expand their addressable market if they want to make investments with us. We're continuing to make investments in our channel strategy and how our partners interact with us. The design of our upcoming technology right now is built with the channel in mind. We want to ensure that we are not creating any channel conflict or any perceived channel conflict. I think that's usually the worst kind: when it's perceived but not real. You need to be very upfront and clear with communications. Q: What is the biggest challenge in the industry right now? Joos: Companies and customers are looking to embed security into their workflows. What I mean is these are not just standalone solutions anymore. They’re integrating with enterprise resource planning (ERP) and human resource (HR) software systems. In property management, they want it integrated into the fitness center, they want it integrated into the cafeteria areas and the dry cleaners, and so forth. So, this is about an ecosystem, and there are times when we are going to be the core, and there is going to be a lot of technology that is adjacent to us. There are times when we are the adjacency to someone else's core in a smart city or a smart building. This gets to why having an open application programming interface (API) is going to be an important part of the technology evolution. It cannot be a closed environment anymore; that is part of the past. Q: What’s next for Acre? We're constantly evolving our cloud access control as well as our on-premise access control Joos: There is a lot of work going on with integrating the business into a single Acre Security company. This is an investment year for us, we are adding people to our team. We are making a lot of investments from a systems and technology perspective. We have a lot of work right now going into integrating the business from an IT infrastructure perspective and all the tools that we use from an employee perspective. We are making a lot of investment as it relates to the commercial side. You're going to see some next-gen technology coming out from an intrusion perspective. We're constantly evolving our cloud access control as well as our on-premise access control. We're also bringing software applications, too. Q: What is Acre’s “message” going forward? Joos: One of the takeaways for me is this is not the Acre of the past. We are making some bold changes. New things are happening here; you better pay attention because clearly, something is different. I think that's one. I think the second is that as they spend time within us, they're going to realize the wide range of solutions and use cases that we can address, whether you're in access control or cloud, whether you're in intrusion, whether you are in visitor management, or whether you're looking at some network connectivity solutions. The third thing that I think people are going to see is a whole lot of energy as they talk to our people and the passion that you see from the team. If I wrap those three points up in one kind of statement there, I think my goal is that people walk away saying “Something is going on at Acre Security. We better pay attention.”
Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzeit, President of Idesco, a provider of ID card solutions. Supply chain concerns Supply chain concerns will continue as companies seek to upgrade and purchase new ID printers and badges An impact of the pandemic was a shortage of supplies related to the ID card industry, says Schonzeit. Like other industries, several leading ID card and printer manufacturers had supply chain issues, and some deliveries were delayed at times for more than six months. Supply chain concerns will continue into 2023 as more companies return to the workplace and others seek to upgrade their current systems and purchase new ID printers and badges. Persistent price increase concerns “The shortage created hardships for end users and often resulted in them purchasing any solution that was readily available even if it was not the preferred one,” says Schonzeit. Another issue during the pandemic was persistent price increases, due both to inflationary pressures and a shortage of products. The industry was used to stable prices with infrequent increases, but the pandemic changed this quickly. Some companies also decided to upgrade their entire system as employees returning to the office increased demand. Oversized credentials advantages Among the advantages of oversized credentials is the ability to print more information on the card, says Schonzeit. For example, a larger credential allows event organisers to preprint the corporate agenda on the back of the card to increase efficiency. In addition, companies can enhance their brand presence by distributing a nice thick plastic badge to attendees. Two categories Standard credit card size These are generally CR100 size, which is around 40% larger than the standard credit card Oversized badges fall into two main categories. One category is for cards that are larger than the standard credit card size (CR80), but smaller than event badges. These are generally CR100 size, which is around 40% larger than the standard credit card. They are generally used by law enforcement or healthcare institutions. It is easier to see an oversized badge more clearly from a distance than a regular-sized badge. Oversized ID badges The other category of oversized ID badges is used for events, these badges are typically 3.5” by 5.5” and are usually worn around the neck. These events include categories such as sporting events, corporate events, music festivals, and trade shows. The badges are generally used only for the duration of the event and are often kept as souvenirs. Anticipating the needs “My advice for event planners is to manage your expectations about badges as it is very hard to order extra badges at the last minute,” says Schonzeit. “It is important to plan well in advance and anticipate your needs upfront to help avoid a shortage.” Idesco often gets requests from customers to include some type of technology on the credentials. The most common technologies are proximity cards, NFC, and/or UHF. “It is a much ‘cleaner’ and safer solution if the chip can be embedded within the credential as opposed to putting a sticker on the outside of the credential,” says Schonzeit. Additional technologies in credentials Customers wanting technology in their credentials should allow additional lead time Generally, these additional technologies are used for gaining entry to a location (access control), or they can be used for gathering valuable information regarding an event, including attendance at seminars, crowd flow, vending, and food services information, among others. Supply chain issues have led to less availability of many of the most common chips, which can impact delivery times. Customers wanting technology in their credentials should allow additional lead time, says Schonzeit. Applications In addition to corporate events, sporting events, and trade shows, other markets can also benefit from oversized ID badges. Industries include healthcare, government, and law enforcement. Oversized badges are becoming more popular in hospitals, for example, where color coding can make it easy to identify doctors, nurses, and hospital personnel from a distance, even in congested hospital spaces. ID card necessity Could there be a negative impact on the ID card industry if more companies allow employees to work from home? It’s always a possibility, says Schonzeit. “However, with many hybrid options out there, most employees are required to come to the office either one or two days a week,” he says. “Employees will still need a way to access their workplace for meetings, conferences, etc., and will require an ID card to do so.” Mobile vs. physical credentials The growing popularity of mobile credentials has created some concerns in the ID card marketplace The growing popularity of mobile credentials has created some concerns in the ID card marketplace about the continuing need for a physical credential. So far it has not been an issue. “[Mobile credentials] have not had any type of meaningful effect on the physical ID card market,” says Schonzeit. Relying on smartphones “Sometimes these disruptive technologies can linger in the background for some time and then suddenly have a massive effect on the market. This is something to be concerned about, but I don’t think there is an imminent threat.” A big issue with using only mobile credentials is the need for a backup plan rather than relying only on a smartphone to enter a facility. Also, for mobile credentials to work, specialised readers are required, which requires a large investment. “In my opinion, ID badges are here to stay for the long haul,” says Schonzeit.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Case studies
Cequence announced that the world's largest navigation device manufacturer has chosen the Cequence bot detection and mitigation solution API Spartan, part of the overall Unified API Protection (UAP) platform, to secure its e-commerce experience and deliver a frictionless shopping experience for its customers. The company joins an already elite roster of clients, standing alongside industry giants spanning diverse sectors such as beauty, retail, government, telecommunications, systems integration, international voice traffic carriers, online automotive, motorcycle enthusiasts, and marine classifieds. Boosting online security As the company aimed to boost online security, it faced alarming numbers: about 100 million SSO login requests monthly, with 15 to 20 percent flagged as malicious. They also uncovered significant financial risks, with account takeovers costing anywhere from $50 (£40) to $12,000 (£9,500) each. Ignoring these unsettling numbers might have spelled financial disaster for the business, potentially surpassing the billion-dollar mark. Lack of behavioural analysis The previous solution relied solely on identifying bots based on bad IP addresses, which proved inadequate In light of the company’s previous experience with a prominent internet security provider that utilised rudimentary bot protection methods, it became evident that their efficacy in stopping malicious bots was compromised. The previous solution relied solely on identifying bots based on bad IP addresses, which proved inadequate in detecting many sophisticated malicious bots due to the lack of behavioural analysis. Consequently, the navigation device manufacturer faced challenges in effectively mitigating bot attacks and ensuring business continuity and customer experience. Cequence API Spartan Recognising the limitations of their existing bot protection measures, the customer sought a more proactive and comprehensive bot management solution like Cequence API Spartan to safeguard their business continuity, protect their online assets, and enhance the overall customer experience. Cequence's ability to distinguish genuine users from bots in real-time and adapt to evolving bot tactics resonated with the company, offering a reliable and future-proof solution to their bot problem. Proactive and comprehensive bot management "Bots aren't just a technical nuisance; they're customer experience assassins,” said Ameya Talwalkar, CEO of Cequence. “Imagine loyal customers, eager to purchase your products, locked out by an army of automated bad actors." "The frustration, lost sales, and reputational damage are a nightmare scenario no business can afford. That's why Cequence is dedicated to providing solutions that go beyond simple bot detection. We empower companies to proactively safeguard their legitimate customers and foster a thriving online environment where trust and genuine interactions flourish." Vulnerability due to automated bot attacks The OWASP API Security Top 10 highlights the vulnerability of poorly secured APIs to automated bot attacks. This blurs the line between traditional API and bot attacks, requiring unified security solutions that address both. Key features of Cequence API Spartan As the only API security solution with bot management capabilities, Cequence provides the navigation device manufacturer with: Continuous Behaviour-based API Threat Detection: Cequence leverages the behavioural fingerprint created by a machine learning-based analytics engine to track sophisticated attacks continuously. Supported by the largest API threat database in the world, with millions of behavioural and malicious infrastructure records, the analysis results are translated into policies and models that can be implemented on day one for high-efficacy protection. Integrated Security Ecosystem: While Cequence offers native real-time attack mitigation capabilities, it seamlessly integrates with existing security solutions such as web application firewalls (WAFs). This collaborative approach ensures holistic protection, allowing organisations to leverage the strengths of multiple security tools for enhanced API security and threat mitigation. Protection in Minutes: Cequence can be enabled to protect your APIs and web applications in as little as 15 minutes and can immediately begin reducing the operational burden associated with preventing attacks that can result in fraud, data loss, and business disruption. Advanced AI and machine learning The current e-commerce environment is increasingly vulnerable to bots exploiting loopholes in business logic. Cequence offers a robust solution to protect web and mobile applications, as well as their underlying API infrastructure, from business logic abuse. Leveraging advanced AI and machine learning, Cequence analyses incoming traffic to effectively identify and thwart even subtle attempts at exploitation.
Situated in Vadodara, Gujarat, India, this venerable university stands as one of the oldest in the country, tracing its roots back to 1881. Honouring a forward-thinking ruler, it has evolved into a prominent public institution that provides a diverse array of academic programmes spanning arts, sciences, engineering, and management. Dedicated to delivering top-notch education and cultivating a culture of research and innovation, the university features a sprawling campus and holds a distinguished position for its commitment to excellence in the realm of Indian education. Project overview Confronted with a significant hurdle in the form of a competitor's attendance tracking system for its teaching staff, the university embarked on a quest for a more precise and streamlined method to record daily attendance across its various campuses. The primary goal was to establish a centralised platform dedicated to attendance management, focusing on improving employee access to attendance records and facilitating efficient leave request management. A key consideration was the necessity for a tailored provision to accommodate professors frequently moving A key consideration was the necessity for a tailored provision to accommodate professors frequently moving across campuses for lecture commitments. This case study explores the university's journey in pursuit of a robust attendance management solution catering to 3000 users, addressing specific challenges and optimising operational efficiency. University challenges The university encountered significant challenges in ensuring the smooth operation of its Attendance Management System, including: Inefficiency in the Existing Attendance Management Solution: The university grappled with issues stemming from an ineffective competitor's attendance management system, adding complexity rather than facilitating streamlined operations. This inefficiency extended to the complexities of managing attendance across diverse faculties, further complicating university-level payroll processing. Inconsistencies in Daily Attendance Recording for Teaching Staff: A crucial necessity for the university was the seamless daily recording of professors' attendance. The imperative for a well-organised system became evident to ensure accurate tracking and efficient payroll management. Lack of Proper Attendance Management Across Multiple Campuses: With campuses spread across different locations, the university faced the pressing need to centralise attendance data. This centralisation was crucial for the effective management of attendance records across all campus locations. Delayed Data Transmission from Devices: The existing solution encountered difficulties as punch data from devices experienced delays in reaching the system promptly. This lag resulted in complications, necessitating manual synchronization efforts to rectify the issue. Employee Accessibility Issues for Attendance Data and Leave Management: Staff members encountered limitations in accessing their attendance data through the current system. Furthermore, the absence of support for submitting leave requests contributed to inefficient leave management practices, prompting a demand for more effective solutions. Faced with these operational challenges, the university embarked on a quest for innovative solutions to improve its attendance management processes' overall efficiency and effectiveness. Matrix's solution To address the critical issues faced by the client, Matrix successfully implemented a comprehensive solution that effectively resolved the organisational challenges they were encountering. Matrix executed its Attendance Management System to achieve: Deployment of a Comprehensive Attendance Management System: Matrix effectively implemented an enterprise-grade Time-Attendance Solution, successfully tackling the client's organisational hurdles in attendance management. This solution streamlined the entire attendance process, simplifying complexities across various campuses. Seamless Attendance Recording for Teaching Staff: Matrix introduced biometric devices across different faculties, enabling effortless attendance logging for teaching staff. The widespread availability of devices ensured accurate tracking and efficient payroll management. Centralised Attendance Management Across Multiple Campuses: Matrix established a centralised solution for attendance management, consolidating data from various campuses. This centralised approach facilitated effective control and oversight of attendance across diverse locations. Automated Data Transmission from Devices: Matrix Time-Attendance terminals were equipped with automated data push technology. This feature ensured timely and automated data transfer from devices to the server, eliminating the need for manual synchronisation and enhancing operational efficiency. User-Friendly Employee Self-Service Portal: Matrix provided a comprehensive solution, including an Employee Self-Service portal. This portal enabled users to access attendance data on their devices and submit leave requests. With its hierarchy-based approval system, Matrix streamlined the leave management process. Improved efficiency The innovative solutions offered by Matrix not only resolved the client's challenges but also significantly enhanced attendance operations, promoting improved efficiency throughout the organisation. This case study highlights Matrix's capability to tailor solutions to meet unique client needs, ultimately optimising business processes. Results acheived Matrix successfully streamlined the entire process, introducing clarity in payroll processing and simplifying attendance Matrix's deployment of its Enterprise-grade Time-Attendance Solution brought about a remarkable transformation in the operations of the historic university based in Vadodara. Confronting challenges posed by an inefficient attendance management system, Matrix successfully streamlined the entire process, introducing clarity in payroll processing and simplifying attendance tracking across diverse faculties. The use of Matrix biometric devices facilitated seamless attendance marking for teaching staff, contributing to efficient payroll management. Centralised attendance management The implementation of a centralised attendance management system across multiple campuses significantly improved control and efficiency in handling attendance data. Matrix addressed delays in data transmission by deploying terminals equipped with automated data push technology, eliminating the need for manual synchronisation. Employee Self-Service Portal Matrix's provision of a hierarchy-based approval system streamlined the client’s leave management requirements Furthermore, the implementation included a user-friendly Employee Self-Service Portal, allowing staff to effortlessly view attendance data and submit leave requests. Matrix's provision of a hierarchy-based approval system streamlined the client’s leave management requirements. These tailored solutions markedly enhanced operational efficiency, resulting in a more streamlined, accurate, and transparent organisational operation. Matrix's success in optimising attendance processes underscores its commitment to delivering innovative solutions tailored to the unique requirements of its clients. Products offered COSEC VEGA FOT: Fingerprint and RFID card-based Time-Attendance Terminal COSEC CENTRA PLT: Platform-based User Licence COSEC CENTRA TAM: User Licence for Time-Attendance Management COSEC CENTRA ESS: User Licence for Employee Self-Service Management
On the occasion of INTERPOL’s 91st General Assembly – and 100th anniversary – the world’s largest international police organisation announces the launch of its enhanced BioHUB, powered by IDEMIA’s newest Multibiometric Identification System (MBIS). Multibiometric Identification System This latest version, MBIS 5, integrates new generation algorithms, which provide a higher matching accuracy rate with a shorter response time and a more user-friendly interface. The first phase of its deployment to enhance the identification of potential Persons of Interest (POIs) for police investigations has already been operational since October 2023. The second phase, which will be rolled out over the next two years, will extend this tool to border control points. The system will then be able to perform up to 1 million forensic searches per day, including fingerprints, palm prints and portraits, making it the top performing automated biometric identification system on the market. Cutting-edge technology to help law enforcement IDEMIA still leads the biometric tech race covering iris, fingerprint and face recognition IDEMIA’s commitment to excellence is reflected in its consistently top-ranked identity and security technologies. IDEMIA still leads the biometric tech race covering iris, fingerprint and face recognition. NIST’s (National Institute of Standards and Technology) latest test results underscore IDEMIA’s outstanding expertise and solutions combining efficiency, accuracy and equity. INTERPOL, creating a safer world INTERPOL currently has 196 member countries and enables law enforcement agencies from around the world to work together to make the world a safer place. INTERPOL’s high-tech infrastructure of technical and operational support helps meet the growing challenge of combating crime in the 21st century. Facial recognition is an important and rapidly evolving technology that has opened up many new opportunities to identify individuals and solve crimes. In 2016, INTERPOL opted for IDEMIA’s advanced facial recognition capabilities to create the INTERPOL Face Recognition System (IFRS). INTERPOL Face Recognition System (IFRS) The IFRS contains face images from more than 170 countries, and since its launch, thousands of terrorists, criminals, fugitives, POIs, and missing persons have been identified. In 2019, INTERPOL renewed its contract with IDEMIA to upgrade the current system and transform it into a Multibiometric Identification System (MBIS). IDEMIA and INTERPOL first began their collaboration in 1999, when IDEMIA delivered the original Automated Fingerprint Identification System (AFIS). Automated Fingerprint Identification System (AFIS) AFIS was designed to make cooperation easier between police forces from member countries The Automated Fingerprint Identification System (AFIS) was designed to make cooperation easier between police forces from member countries, by giving them access to global police tools and services, namely forensics, fingerprint evidence and the exchange of forensic data to support international investigations. Through AFIS, authorised users in member countries can view, submit, and cross-check these records using INTERPOL’s secure global police communications network. IDEMIA and INTERPOL share enhanced partnership Cyril Gout, INTERPOL’s Director of Operational Support and Analysis, said “In the same way that criminals use ever more innovative and sophisticated ways to avoid detection, law enforcement must also leverage the latest advances in technology, especially in biometric security, to better combat all forms of transnational crime. INTERPOL’s enhanced partnership with IDEMIA will further help our member countries better protect their borders and communities.” Matt Cole, Group Executive Vice President, Public Security and Identity at IDEMIA, said “IDEMIA is proud to be collaborating with INTERPOL again and to continue making the world a safer place for all. This project reinforces our longstanding partnership with INTERPOL, which has been going strong for over 20 years.” INTERPOL receives delivery of the new MBIS Matt Cole adds, “With the delivery of the new MBIS, developed thanks to our strong dedication to R&D, INTERPOL will have access to cutting-edge fingerprint, palm print and face identification technologies, enabling it and member countries to identify persons of interest faster than ever before.” He continues, “We look forward to many more years of supporting INTERPOL to ensure the safety of potentially billions of citizens around the world.”
Christ’s Hospital School has a long history. It first opened its doors to 380 pupils in November 1552, at that time located in Newgate Street, London. In 2022 the school needed to replace their obsolete security system with a new solution that would be simple to manage while maintaining the security of the site, staff, and pupils. Requirements The school has around 900 students, over 95% of which board. With 18 boarding houses on site, all requiring different access permissions, as well as the school buildings, dining hall, and other common areas. The school’s new security system needed to be able to manage a huge number of doors and users, while still providing a simple, user-friendly experience. Net2 Net2 is Paxton’s flagship, networked access control solution, designed to make the management of any site James Brookes, Operations Manager at Vistec, said, “I’ve been working with Paxton systems for over 12 years, and as soon as I heard the requirements for Christ’s Hospital, I knew that Net2 would be the right solution.” Net2 is Paxton’s flagship, networked access control solution, designed to make the management of any site straightforward. Features and benefits Easy to use and with a range of features, it moves beyond the basics of controlling the flow of people around a building, offering benefits such as building control and system integration. The Net2 system is easily scalable, making it perfectly suited to the school’s needs. Easy installation James Brookes continues, “There were a few challenges to contend with for this installation, including the need to use existing cabling, limited space for hardware storage, and most difficult time!" He adds, "We needed to install over 280 readers and all of the supporting Net2 plus access control units in only six weeks while the students were on their summer holidays. Thanks to the ease of the Net2 system to install, and the occasional help from Paxton’s Technical Support team, we were able to deliver!” Solution I knew Net2 would be a great choice to manage a site of this size, and this time we got to install the Net2 Marine Readers" David, who is responsible for the security decisions made at the school, has experience with Net2 from a previous job and was pleased with the proposal to use it again at Christ’s Hospital. He said, “I knew Net2 would be a great choice to manage a site of this size, and this time we got to install the Net2 Marine Readers. I’d seen them installed when collecting my wife from work, and I just thought I had to have them. They’re visually appealing, but also provide a clear, lit indication of where the door is, and whether access has been granted or denied. I can’t speak more highly of them.” Read-in/read-out access Christ’s Hospital’s new security system provides simple read-in/read-out access on all doors, helping to maintain the security of the site and its staff and students. As every user needs to present their access token to get in and out of a building, the Net2 software can provide exhaustive reporting on how many people are on-site, in any given building, and even pinpoint the location of specific users in an emergency. The school also has an ingenious alert system to ensure the students’ safety; the security team will get a notification if students leave their dorms outside of hours. Keypad readers After a set time, should a student present their Net2 token to a reader to exit the building, an alert will be flagged in the system and the security team will know who is trying to leave the site (and from which building they’ll be trying to exit). To further support the school’s unique requirements, several keypad readers have also been installed on the external doors of relevant buildings, to allow access and egress to temporary students who board over the Easter and Summer holidays. PINs The use of PINs instead of physical tokens in this instance saves time, admin, and money Students will be issued PINs instead of tokens, which may otherwise be lost or not returned. The use of PINs instead of physical tokens in this instance saves time, admin, and money for the school when the students depart at the end of their term. Net2 plus 1 door controller James from Vistec adds, “To overcome the challenge of the limited space, we used the Net2 plus 1 door controller in the PCB-only format and installed a number of them in a single Haydon PSU cabinet to minimise the amount of wall space required for the installation. This is another reason why Net2 was the best option for this site; its flexibility allows us to make it work to our advantage.” Result The Net2 system has been in use since September 2022. All staff, students, and system administrators are pleased with how easy Net2 access control is to use and have fully gotten to grips with all the features. There are plans to further extend the already vast system to secure all of the internal doors on the higher floors of the boarding houses.
The University of New Haven offers a range of National Security and Public Service programmes, some of which were the first of their kind when launched decades ago. Having such a sturdy academic background, the university searched for the proper equipment to let the students practice and polish their knowledge. After thorough market research, the choice was made in favour of Regula 4308S, which is already being used in educational forensic research. Features of Regula 4308S Regula 4308S enables truly advanced examination of any crime evidence, from all kinds of documents, to fingerprints, blood stains, and more. The highest optical magnification (320x) and camera resolution (14 MP), over 40 light sources, and more than 20 light filters, as well as 3D visualisation capabilities and the ability to examine large objects, make Regula 4308S a powerful tool for forensic research. Device has modules for reading MRZs, RFID chips, hidden images (IPI), and 1D and 2D barcodes For the purpose of identity document examination, the device has modules for reading MRZs, RFID chips, hidden images (IPI), and 1D and 2D barcodes. Plus, Regula 4308S has a unique motorised oblique lighting system, which makes it possible to change the light source's angle of incidence, and thus gives a wide range of opportunities for examining the microrelief of a document in the visible and infrared spectrum range. Author's quote “Regula’s device provides us with wide capabilities for forensic research, so our students can be easily trained on the basics they need to use. We also liked the good balance between the device’s functionality and its price. So far, I must say that our experience of using Regula 4308S is very positive,” says Dr. Josep De Alcaraz-Fossoul, Assistant Professor of Forensic Science at the University of New Haven. “With fraud being so sophisticated these days, it’s really crucial to equip forensic experts with not only powerful tools, but what is probably more important, fundamental knowledge. We are honoured that the University of New Haven decided to rely on the capabilities of our device in their educational programmes,” comments Arif A. Mamedov, President and CEO at Regula Forensics, Inc.
Continental Tyres ranks among the top 5 automotive suppliers worldwide. With their expertise in mobility, transport, and processing, they keep development as a foreword to bettering the world. Since bringing in the first tread pattern tyre in the world, they strive for automotive safety for the last 140 years. Need for access control system The major challenge that the factory faced was that without an access control system, the entire asset and materials were unsecured and easily accessible to all employees without any restriction. This is especially concerning as securing a shutter and its accompanying door needed to be managed simultaneously. Moreover, with the shutter being imported from Germany, Many OEMs were finding it tough to integrate it alongside other access control solutions. An all-out solution Matrix took up the mantle to solve their troubles once and for all with an all-out solution to manage their security concerns for the door as well as the shutter. This solution involved the installation of COSEC VEGA FAX, for providing authorisation to a prescribed set of employees. Furthermore, to maintain proper and consolidated access logs, Matrix helped the management to keep a real-time track at their required endpoint. Management control With the intervention of Matrix, this factory unit of Continental Tyres could easily secure its premises as well as assets. This, in combination with, the timely logs of those who accessed gives the management proper control over the rights to entry. This also helps in getting a real-time update on people accessing the area as required by the client. Products offered COSEC VEGA FAX: Fingerprint and Card-based Door Controller with Touchscreen, IP65, Wi-Fi, and 3G/4G Connectivity Option. COSEC CENTRA PLATFORM: Platform Licence for COSEC CENTR. COSEC CENTRA PLT10: 10 Platform Users Licence for COSEC CENTRA. COSEC CENTRA ACM10: 10 Access Control Users Licence for COSEC CENTRA.
Round table discussion
Technology offers a range of tools to bolster security at public events, including before, during, and after. This year, the 2024 Summer Olympics in Paris will draw the attention of the world, requiring the best protection available for the venues, the athletes, and the attendees. Other happenings such as the FIFA World Cup, the Super Bowl, the Tour de France, and the U.S. NBA Finals are momentous events that challenge security and law enforcement personnel to keep them safe. We asked this week’s Expert Panel Roundtable: How is technology contributing to security in the arena of public events?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?
Products
Videos
Fingerprint reader: Manufacturers & Suppliers
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadBank security
Download