Fingerprint recognition
Matrix successfully demonstrated its cutting-edge security products and solutions at InnoMetro 2024, held from May 21st to 22nd at the Hotel Taj Vivanta. As a pioneering Indian company, Matrix proudly presented its RDSO 6.0-compliant network cameras, specifically designed for Indian Railways, at Booth No. H1.17. During the event, Matrix highlighted its commitment to cybersecurity with network cameras certified by STQC, Delhi lab, adhering to OWASP ASVS 4.0 L2 norms. These cameras ensure the s...
In collaboration with key partner Trinet Technologies Pte Ltd, Anviz organised two successful roadshow events. Both events brought together more than 30 industry experts who showed great enthusiasm for Anviz's business model of user scenario-driven solutions and interest in the new features of the product. Need for Southeast Asian Markets: RCEP Brings New Opportunities, Largest Incremental Market in the World As the largest FTA in the world, which will lead the development of global free trade...
IDEMIA Public Security North America, the biometrics solutions pioneer for law enforcement agencies, announced that it has implemented its cloud-native, fully functional Automated Biometric Identification System, STORM ABIS, in Volusia County, Florida to support its latent print unit. The Volusia Sheriff’s Office is the first law enforcement agency in the nation implementing a cloud-native ABIS that can search county, state, and federal databases from a single application. Volusia County,...
The Security Event (TSE) 2024 was a landmark occasion for CIE Group, which marked its 60th year in business with an impressive display of innovative security products and a champagne drinks reception on the first two days of the show. Latest brand offerings Long established for its unique and value-added distribution model in the audiovisual industry, CIE is making a significant impact in the security sector. Consequently, TSE 2024 served as a powerful platform to unveil the company’s l...
Money Carer, a UK-based national social enterprise focused on providing secure money management services for vulnerable people, has partnered with global card manufacturer Tag Systems and biometrics company Fingerprint Cards AB (Fingerprints™). The companies have created and launched a biometric-enabled ‘carer card’, addressing barriers that have traditionally restricted vulnerable people in the UK from accessing financial services. Carer card In 2010, Money Carer invented a...
Fingerprint Cards AB has partnered with Lapa Electric, an Indian-based premium electric mobility start-up, to bring the best security to two-wheelers and create India’s first biometric-enabled electric scooter (e-scooter). The use of e-scooters in India has sky-rocketed in recent years, and this growth is expected to continue. In 2023, the penetration rate of e-scooters in India was 13%, yet by 2030 this is projected to grow to 75%. Use of biometrics Adam Philpott, CEO of Fingerpri...
News
Suprema, a global pioneer of AI-based security solutions, has announced its participation in ISC West 2024, the largest security trade show in the United States, scheduled to take place from April 10 to 12 in Las Vegas. Suprema will showcase the exceptional performance of its deep-learning-based AI algorithms in facial authentication and fingerprint recognition, exemplified by its advanced on-device AI solutions, namely the award-winning BioStation 3 and BioStation 2a. BioStar 2 access control platform Attendees can also anticipate a preview of an upcoming AI-based facial authentication product that will be a game changer at the door slated for release in the latter half of the year. In addition, making its entry to the North American Market, Suprema will introduce CLUe, a cloud-based access authentication API service designed to streamline the integration of Suprema devices with third-party cloud platforms. One of the highlights will be the integration of the BioStar 2 access control platform with VMS One of the highlights will be the integration of the BioStar 2 access control platform with a Video Management System (VMS), offering users a comprehensive view of real-time video and data from on-device AI access authentication solutions, all accessible through a single interface. Strategic initiatives The BioStar 2 platform boasts a flexible architecture that caters to both small-scale offices and enterprise-scale operations, showcasing its scalability and customisable features tailored to diverse organisational requirements. As part of its strategic initiatives to bolster its market presence and extend its footprint in North America, Suprema has collaborated with pioneering global security providers to integrate its renowned biometric devices seamlessly. At ISC West 2024, Suprema will demonstrate various integration solutions, emphasising the seamless user experience with partners such as Genetec, Software House, Verkada, and Honeywell. Delivering advanced solutions “By showcasing our extensive product portfolio at ISC West, we are reaffirming our commitment to expanding in the North American market," stated Bob McKee, President of Suprema America, a global pioneer selling into over 147 countries. He emphasised that Suprema continues to demonstrate its dedication to cutting-edge technology with the introduction of AI-based face authentication and fingerprint recognition platforms. "Innovation is not just a word at Suprema," Bob added, highlighting the company's commitment to pushing boundaries and delivering advanced solutions to its customers worldwide.
Iris ID, the global pioneer in iris recognition technology, is showcasing its newest advancements in identity detection and authentication technology at ISC West 2024 in booth #28057. The company is emphasising its portfolio of multi-modal iris and facial recognition solutions that deliver the highest levels of non-invasive personal identification and authentication accuracy. The frictionless solutions are designed for a myriad of mainstream and critical infrastructure applications, as well as use in the most demanding environments found in highly volatile manufacturing, industrial and mining applications. Range of private and public users "Iris ID continues to push the ceiling for biometrics, bringing to market the most accurate and versatile iris and face recognition solutions for personal identity detection and authentication. With solutions designed to fulfil both mainstream and specialised applications, our proven biometrics solutions stand out in the industry for their ability to accurately authenticate individuals even in the most demanding applications, including through hazmat suits, safety goggles, and even with worn-down fingerprints," said Mohammed Murad, Vice President, Iris ID. “This coupled with our unparalleled deployment success has generated demand from a wide range of private and public users, and we’re excited to share these innovations and use cases with ISC West attendees.” Product portfolio and solutions Iris ID is showcasing its full product portfolio and solutions that are currently used across several verticals Iris ID's solutions excel in high-security settings like power plants, data centres, airports and labs, meeting the growing needs of government agencies on both local and global scales. Particularly noteworthy is Iris ID's expanding influence on law enforcement and border applications following its integration into the FBI’s Next Generation Identification (NGI) Iris Service in 2020. At ISC West, Iris ID is showcasing its full product portfolio and solutions that are currently used across several verticals. Additionally, they are proud to debut a new iris and face fusion device for the access control and time and attendance industries. Cutting-edge biometric solutions “Our journey of innovation has culminated in our iris biometric technology becoming the first to attain certification for SIA OSDP version 2,” added Murad. "This significant achievement, combined with longstanding partnerships with industry pioneers such as HID and NXP, underscores our unwavering commitment to advancing heightened security with personal privacy protection using our cutting-edge biometric solutions." Iris ID continues to lead the identity and security sector by further evolving its iris recognition technology to deliver seamless compatibility, broader compliance, web-based functionality, and long-distance operation.
Intercede, the global pioneer in managing digital identities announces the launch of MyID® MFA (Multi-Factor Authentication) 5.0. The latest addition to the MyID product family raises the security bar, by enabling organisations to protect on-premise and cloud-based applications, as well as the Windows desktop logon (on and off-line) with a range of phishing-resistant MFA options including OTP (one-time passwords), mobile apps, syncable FIDO passkey, and biometric protected hardware devices. FIDO-enable multiple applications Bringing enterprise-managed FIDO passkeys into MyID MFA makes it easy to FIDO-enable multiple applications and deploy passkeys to end users, enhancing security and improving the user experience. MyID MFA acts as both a FIDO authentication server and a passkey issuance solution. End users authenticate to MyID MFA with their passkey, and by support for standard federated identity protocols, MyID MFA provides authentication services to multiple applications including cloud, on-premise, and Windows desktop logon. Secure and passwordless authentication process MyID MFA supports device-bound passkeys which deliver a similarly seamless authentication Organisations can choose from syncable passkeys, that use the FIDO protocol built into mobile devices and web browsers, to deliver a simple, secure, and passwordless authentication process, via fingerprint, face ID, or PIN. For organisations requiring higher levels of security and control, MyID MFA supports device-bound passkeys, such as Yubikey and the innovative YubiKey Bio device, which delivers a similarly seamless authentication experience while ensuring the highest level of security. MyID MFA MyID MFA also enables the federation of applications (the ability to share identity and authentication information between systems in a managed way), be they cloud-based or on-premise, with support for standards-based protocols such as OpenID Connect and SAML. With federated identity provider (IDP) capabilities built into MyID MFA, it is a natural successor to Microsoft ADFS (Active Directory Federation Services). Reduces operational costs In addition to acting as an IDP, MyID MFA enables federation with an organisation's existing credentials and identity providers, including Google and Microsoft Authenticator apps. This allows users to use the apps they are already familiar with and enables organisations to use credentials that are already deployed, reducing operational costs and speeding up the time to deployment. Unified authentication experience Organisations have a wider choice than ever on how to protect the primary gateway to their data, networks, and applications MyID MFA supports the delivery of a unified authentication experience across the entire application suite, including authentication to applications, accessing self-service portals (to reset credentials), as well as logging on to the Windows desktop. The Windows Desktop Agent has been enhanced in v5.0 with added support for federation, the inclusion of third-party authenticators and FIDO passkeys, meaning organisations have a wider choice than ever on how to protect the primary gateway to their data, networks, and applications, regardless of whether they are on Windows 11 or Windows 10 devices. Simple, secure, and scalable authentication Allen Storey, Chief Product Officer at Intercede, states, “It is our mission to help organisations protect themselves against data breach by deploying stronger authentication simply, securely, and at scale, whether they are SMBs with hundreds of users, larger enterprises, or federal authorities with thousands of users." "MyID MFA is the simplest way for any organisation to protect their applications, data, and networks against cyber-attacks, with phishing-resistant authentication that is easy to deploy, manage, and use.” Product availability MyID MFA is part of the MyID product family that includes MyID PSM (Password Security Management) and MyID CMS (Credential Management System) that enables organisations to choose the level of security that best fits their needs, from passwords to one-time codes, mobile apps, FIDO passkeys and public key infrastructure (PKI). MyID MFA is available from Intercede.
Suprema, a global pioneer in AI-based security solutions, has announced the supply of the latest version of the under-display ultrasonic fingerprint recognition algorithm, BioSign, to the Samsung Galaxy S24 series supported by the Qualcomm 3D Sonic Sensor Gen 2. Since 2019, starting with the Samsung Galaxy S10, Suprema has continuously incorporated fingerprint recognition algorithms into numerous Galaxy S series, earning recognition for its world-class technological capabilities. BioSign 6.0 version The BioSign 6.0 version featured in the Samsung Galaxy S24 has received acclaim in the market for its significantly upgraded fingerprint recognition speed and security. Compared to its predecessor, BioSign 5.0, BioSign 6.0 has achieved a technological innovation that simultaneously enhances speed and accuracy. It provides an improvement in accuracy and a faster response time, to greatly enhance user convenience. AI-based fingerprint analysis AI-based fingerprint analysis algorithm that efficiently recognises abundant fingerprint information Particularly noteworthy is the optimised AI-based fingerprint analysis algorithm that efficiently recognises abundant fingerprint information obtained through the Qualcomm® 3D Sonic Sensor Gen-2. "The adoption of Suprema's fingerprint recognition technology in the Samsung Galaxy smartphone series signifies significant recognition of our top-notch technological capabilities in the global market," said James Lee, Suprema Inc. Founder and Chairman. AI-based fingerprint and facial recognition James Lee adds, "BioSign 6.0, in particular, is being evaluated for delivering overwhelming performance and user convenience compared to existing technologies, creating expectations for market expansion." He continues, “Our commitment to continuous advancement in fingerprint and facial recognition technology based on AI is pioneering the way in the biometric recognition market.”
IDEMIA Public Security, the global provider of biometric and secure identity solutions for government, travel, and law enforcement has once again proven its leadership, showcasing the most accurate algorithms in the National Institute of Standards and Technology’s (NIST) latest Evaluation of Latent Fingerprint Technologies (ELFT) tests. NIST ELFT NIST ELFT is the global benchmark for latent fingerprint and palm print identification used to identify latent fingerprints and palm prints found at crime scenes. For the fourth time in a row, IDEMIA Public Security leads the market with the most accurate and fastest (among the most accurate) algorithms. Low FPIR IDEMIA demonstrated vastly superior performance in palmprint identification In addition to accuracy, which increases the chances of identifying leads in law enforcement investigations, IDEMIA’s algorithms showed a very low False Positive Identification Rate (FPIR at less than 8% whereas the nearest competitor is at above 11%), allowing the latent examiner to process more cases, accurately and faster. Furthermore, IDEMIA demonstrated vastly superior performance in palmprint identification, another highly significant contribution. Using this technology, the human-artificial Intelligence (AI) duo becomes more productive, and the examiner’s valuable time is optimised. Fast, accurate, and fair solutions IDEMIA is committed to the highest level of performance to provide fast, accurate, and fair solutions. As a result, IDEMIA’s customers can solve crimes more quickly, while the communities and the world are made a safer place. These ELFT results come on the heels of other recent high-ranking performances in NIST benchmarks, further demonstrating IDEMIA’s technology leadership. These include: FINGERPRINT: 1 in the NIST Proprietary Fingerprint Template (PFT) III benchmark on all test datasets in December 2023, 1 in NIST ELFT February 2024, 1 in the mFIT Challenge in June 2022, FACE: 1 in fairness and demonstrated lack of bias for the NIST Face Recognition Vendor Test (FRVT) in January 2023, IRIS: 1 in the latest NIST Iris Exchange (IREX 10) ranking in September 2023. Multi-Biometric Search Services (MBSS) solutions "Based on our performance in this benchmark, we can confirm our long-term commitment to investing in further developing the technology and creating continuously more value for the customers. Our ability to offer cutting-edge products goes hand in hand with our long-standing 50-plus-year pledge to provide law enforcement agencies with the best systems on the market." "I am very proud to announce that the latest algorithms submitted to this benchmark are already available in our flagship Multi-Biometric Search Services (MBSS) solutions. I would like to congratulate our teams of developers on their hard work and innovation," said Jean-Christophe Fondeur, IDEMIA Public Security Chief Technology Officer.
When it comes to ensuring the security of the home, business, or any other property, high-end locksmiths in the UK play a crucial role. These professionals are experts in enhancing the security of the spaces and providing advanced solutions for the locksmithing needs. KBO Fire & Security answers some key questions about high-end locksmiths in the UK and how they can find the best in the business. What do locksmiths change? Locksmiths are skilled in changing, repairing, and installing various types of locks. Traditional Locks: This includes replacing or repairing traditional locks found on doors, windows, and cabinets. High-Security Locks: High-end locksmiths are experts in installing and maintaining high-security locks, providing an extra layer of protection for the property. Anti-Snap Locks: Anti-snap locks are designed to resist snapping attacks. High-end locksmiths can install these locks, making it difficult for burglars to break in. Can locksmiths open any door? A professional locksmith has the tools and knowledge to unlock them without causing damage Locksmiths are highly skilled at opening most types of doors and locks. Whether it’s a traditional lock, an electronic lock, or a high-security system, a professional locksmith has the tools and knowledge to unlock them without causing damage. However, it’s essential to provide proof of ownership or legal access when requesting such services to ensure security and legality. Can anti-snap locks be broken? While anti-snap locks are highly resistant to snapping attacks, no lock is entirely impervious to determined intruders. High-end locksmiths recommend combining anti-snap locks with other security measures to maximise protection. These locks significantly increase the time and effort required to break in, making them valuable to the security. How do I find a reputable locksmith? Finding a reputable locksmith is crucial to ensuring the security of the property. Here are some tips to help them locate a reliable, high-end locksmith: Verify the credentials: Ensure that the locksmith is licenced, insured, and certified by relevant industry bodies. Read the reviews properly: Look for customer reviews and testimonials to gauge the locksmith’s reputation. Ask for recommendations: Seek recommendations from friends, family, or colleagues who have used locksmith services. Check online directories: Utilise online directories like the KBO website for a list of certified locksmiths in the area. Request quotes: Obtain quotes from multiple locksmiths to compare services and costs. Verify their identification: Ensure the locksmith provides proper identification when they arrive at the location. KBO: Best residential locksmith service in the UK KBO offers high-quality locksmith services to secure the home and protect the family. Lock installations normally include five-lever mortice deadlocks, which must comply with standard BS3621. KBO is a proud member of the Master Locksmiths Association (MLA), specialising in residential locksmith services. In conclusion, high-end locksmiths are the partners in securing valuable assets. By choosing the right locksmith and the best security solutions, they can ensure peace of mind and safeguard the property against potential threats.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Along with the growing adoption of cloud, SaaS applications have accounted for more than triple of the account-takeover attacks between 2019 and 2021, alone. Any given breach can potentially bankrupt many small businesses, with average costs reaching USD 4.35 million in 2022, according to a 2022 IBM report. Every business, no matter its size, must minimise these risks by deploying a range of cybersecurity tools and procedures. One of the most important elements is multifactor authentication (MFA). Some cyber insurance companies mandate MFA as a prerequisite for coverage and others will lower their premiums for companies that have deployed it. These insurers know how much more secure the enterprise is when multiple different verification methods are used for logging into accounts and applications. Importance of Cyber Insurance Cyber insurance has become a must-have for organisations that deploy and rely on digital systems. Small businesses are especially vulnerable to cyber threats since few have invested in the necessary security tools to defend against network breaches, scams and other types of cybercrime. Cyber insurance has become a must-have for organisations that deploy and rely on digital systems The good news is that cyber insurance policies are widely available and offer a broad range of coverage options. Some will pay the costs of direct expenses associated with a network attack as well as legal costs, including litigation defense payments, if the business could not meet contractual obligations because of the breach. Cyber insurance premiums Policies may also cover the cost of losing and then restoring access to technology after a breach. Policies may even cover the costs of transfer payment fraud caused by social engineering, as well as profit losses from reputational damage, although this can be restricted to a finite period of time. Depending on the coverage that is selected, cyber insurance premiums can be expensive, and a policy does not replace the solid foundation of an underlying cybersecurity framework. A foundation that includes MFA will help to stop cybercrime before it is committed while also making it easier to acquire and reduce the costs of cyber insurance. In fact, MFA is now one of the most common conditions for obtaining cyber insurance because of its proven ability to help prevent account takeover attacks and stop identity-related data breaches. Multifactor authentication overview The MFA ‘factors’ for confirming identity during login typically include something the user knows The MFA ‘factors’ for confirming identity during login typically include something the user knows (like a pin), something the user has (like a secure device), and something the user ‘is’ (like presenting a fingerprint or face scan to a reader or camera). Using these factors when accessing sensitive applications, systems, and data helps prevent attackers from compromising accounts. This is true even if the attacker has somehow tricked legitimate users into providing usernames and passwords through phishing schemes, in which seemingly legitimate emails are used to harvest this information. Preventing unauthorised access These types of attacks can be launched at scale and put millions of organisations at risk around the world. Some insurance providers simply will not cover them. They know that MFA can help organisations avoid these ‘user error’ attacks through authentication policies that prevent unauthorised access to any of the organisation's networks, applications and devices, wherever they are located. The U.S. government has also required that all federal agencies use MFA Insurers aren't the only ones recommending and even mandating MFA. The U.S. government has also required that all federal agencies use MFA, per the Executive Order On Improving the Nation's Cybersecurity signed by U.S. President Joe Biden in May 2021. A similar recommendation has been made in Europe as part of ENISA guidelines. The barriers to MFA adoption by SMBs One might wonder why over 40% of small and medium size business(SMBs) in the United States don’t have a cybersecurity plan in place and why less than 15% of the ones that do have a plan, consider it to be inadequate. According to the Cyber Readiness Institute, when we dive deeper into the details, there are three key barriers to MFA adoption: Lack of Awareness — 55% of SMBs are reported to remain unprotected because they’re simply unaware of MFA and its benefits to their organisation. Limited Understanding — Beyond a lack of awareness, 30% of business owners said they don’t utilise MFA because they simply don’t know how it works. In addition to the fundamental functionality, there are a variety of MFA options to consider, including a range of form factors that can be utilised to best meet an organisation’s needs. Perceived Inconvenience — 20% of SMBs believe MFA is too inconvenient, when in reality, we’re all more familiar with the concept than we think. How smaller businesses can best implement MFA SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle by allowing them to quickly and easily increase security and convenience. MFA isn’t only about security, its also about convenience. Implementing MFA allows organisations to eliminate reliance on passwords, which can significantly improve user experience. So what should decision-makers know about MFA in order to implement it for their SMB? Ease of Use — The right MFA solution should offer a variety of authentication methods, but should also be easy to adopt and use across the organisation. Multiple Methods and Form Factors — Determine the best combination of authentication methods and form factors. Some providers offer only a small selection, which can tie you down to very basic and inflexible options that do not fully meet your users unique needs. Easy Deployment and Management — Time is money, especially for SMBs. Some solutions can take months to deploy, require extensive training and new installation codes, as well as potential overhauls to existing applications. Look for a solution that can be up and running in days. A Complete Solution — Any MFA solution should provide comprehensive security across all of your assets, including your PCs, mobile devices, applications and networks Compliance — Compliance impacts businesses of all sizes. As such, be sure to find a provider that meets evolving industry standards, including data protection such as GDPR and CCPA. Adaptability — As your business grows, your security needs will also evolve, with some users or parts of your business requiring more security than others. Make sure your provider allows you to scale and adjust accordingly to offer the right security for the right users. Blocking cybercriminal attempts Leading and growing a smaller business is a big challenge. Fortunately, adopting MFA provides a safety net to help block cybercriminal attempts, protect your business’ reputation and most importantly, help protect your bottom line. MFA should be the foundation for any robust security strategy and many cyber insurance companies now require it to reduce premiums and even qualify for coverage. For best results, organisations should choose a solution that is easy to deploy, offers a broad range of authentication options and form factors, and gives users a smooth and convenient authentication experience.
A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutions. In the world of access control systems, biometric advancements allow for more secure authentication measures and seamless security processes. As more products and services hit the market, learn our predictions for the 2023 biometric trends in this article. Biometric access control systems What are biometric access control systems? Biometric access control systems include safety measures like facial and fingerprint recognition, as well as multi factor identification terminals. These systems decide who is authorised to enter a specific room, floor or even the entire building, using a database of stored identifiable features, like someone’s fingerprints. If an individual tries to enter and is not in the system, then they are denied access. Biometric Access Control Trends to Look Out For in 2023 - From multifactor authentication to contactless security measures, discover the five biggest upcoming trends in biometrics for access control. Real-time facial recognition The cloud has offered us new and innovative ways to store vast amounts of data Cloud Biometrics - The cloud has offered us new and innovative ways to store vast amounts of data. Combined with biometrics, this trend will allow security professionals to forgo the dedicated server and store their data on the cloud. Cloud biometrics facilitate real-time facial recognition and other processing-intensive security measures. It even allows for remote monitoring, which will be essential in our new era of hybrid working. Multifactor Authentication - In 2023, multifactor authentication will become the norm. It is already widely used by people to secure their accounts, but it will be vital in access control security. Multifactor authentication adds another layer of security by combining a traditional password with facial recognition or fingerprint biometrics. This approach has previously been reserved for highly sensitive data, but with cybercrimes on the rise, it will soon be used to protect everyday accounts. Highly sensitive data Contactless Biometrics - The most recent advancements in biometrics allow people to go about their day without being interrupted by pin codes and touchpads. Contactless biometrics, combined with integrated systems and algorithms, allow people to move seamlessly without sacrificing security. The latest biometrics, for example, can let a pre-authorised individual into a building, inform the appropriate people that they have arrived and call them an elevator, all without needing to touch a keypad. They care about security, but people also want to trust that their provider shares their values Ethical Biometrics - Increasingly, people are valuing ethical biometrics. They care about security, but people also want to trust that their provider shares their values. People want to know that their data will be protected, in line with privacy laws, and that the biometrics system they use will be unbiased. This new standard for the industry has been growing steadily, but 2023 will bring stricter expectations for ethical security. Digital IDs - More people than ever are using digital IDs. From the humble digital wallet, which we all have on our phones, to more complex applications used in access control, physical cards are seemingly a thing of the past. This shift has required (and will continue to require) a complete overhaul of existing infrastructure to allow for new forms of identification. TLDR: 2023 biometric trends in access control The latest biometric trends will see contactless security measures become the norm. With advancements in cloud biometrics and digital IDs, the latest technologies will continue to allow for new and innovative security solutions. However, with stricter expectations for ethical biometrics and data privacy, any new security trends will need to align with these standards. As the founder of Elite Security, Ben McCayna is passionate about security. He started the company in 2004 after identifying a need for high-quality door and security installations and specialised maintenance for commercial businesses. Ben is one of the leading security experts in London and beyond, thanks to his highly successful company and network of happy clients. Elite Security has grown to offer a wide range of security and access control systems, including fire safety, intercoms, alarms and CCTV. With decades of experience in both business management and security, Ben has established himself as a true expert in his field.
Security beat
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System helps in tailgating mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy enrolment and deployment Enrolment in the system is easy. Companies can deploy a separate enrolment station, or any reader can be used for enrolment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrolment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting intent from positioning of eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed. The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based video systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. the economics of the cloud make implementation of analytics much more affordable Augmented identity: biometrics in security Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial intelligence applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades. Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live video streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customisable turnstile solutions Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.” Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.
Case studies
Biometrics company, Fingerprint Cards AB (Fingerprints™), has upgraded the physical access security of its Gothenburg HQ. S-Key biometric access cards from Freevolt Technologies Limited, which embed Fingerprints’ own T2 sensors, have been implemented across the entire Gothenburg site. The updated authentication system further strengthens Fingerprints’ workplace security and enables role-based access control, whilst ensuring a convenient and easy-to-use experience. Role-based access control Fingerprints’ Gothenburg HQ has security gates to enter and exit the building, and restricted areas for hardware and software R&D. By replacing access keyfobs with biometrics access cards, site-wide security has been enhanced and role-based access control has been enabled to better control access to sensitive areas of the site. By replacing traditional security methods based on something they know/have with something they are, multi-factor authentication has been enabled while maintaining convenience for employees. Fingerprints’ latest ‘T2’ sensors Solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs Caroline Krüger, CHRO of Fingerprints comments: “The workplace has evolved significantly in recent years. At Fingerprints, we offer hybrid working whilst still ensuring our workforce has 24/7 access to HQ. Amidst this dynamic working environment, it is essential our team feels the workplace is accessible and safe. This requires a flexible, secure and convenient access control solution.” Fingerprints has implemented Freevolt’s flagship biometric access card solution, S-Key. The solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs. The card incorporates Fingerprints’ latest ‘T2’ sensors which deliver optimised image quality, processing speed and power efficiency. Traditional security methods Adam Philpott, CEO of Fingerprints comments: “To meet today’s security challenges we must move away from traditional security methods. And, as a biometrics company, it is important that we lead the way in ensuring robust, frictionless security in our own operations." "There is an opportunity here too; what can we learn, what innovations will we identify by using these systems day to day? I look forward to continuing our strong and innovative collaboration with Freevolt technologies.” Energy harvesting technology Gonzalo de Gisbert, Head of Product & Business Development at Freevolt Technologies, adds: “Fingerprints are pioneers in biometrics, with sensors in billions of products, so they know what makes a good biometric solution. We’re therefore thrilled that Fingerprints has chosen S-Key to strengthen security at their global headquarters, in Gothenburg." "Our pioneering radio frequency energy harvesting technology combined with Fingerprints’ ‘T2’ sensors, known as FPC 1323, enables S-Key to be completely battery-less, lasting for many years. Roll-out was seamless, with everyone set up in less than 1 hour. That’s simple, safe, and secure biometrics, powered by Freevolt.”
Situated in Vadodara, Gujarat, India, this venerable university stands as one of the oldest in the country, tracing its roots back to 1881. Honouring a forward-thinking ruler, it has evolved into a prominent public institution that provides a diverse array of academic programmes spanning arts, sciences, engineering, and management. Dedicated to delivering top-notch education and cultivating a culture of research and innovation, the university features a sprawling campus and holds a distinguished position for its commitment to excellence in the realm of Indian education. Project overview Confronted with a significant hurdle in the form of a competitor's attendance tracking system for its teaching staff, the university embarked on a quest for a more precise and streamlined method to record daily attendance across its various campuses. The primary goal was to establish a centralised platform dedicated to attendance management, focusing on improving employee access to attendance records and facilitating efficient leave request management. A key consideration was the necessity for a tailored provision to accommodate professors frequently moving A key consideration was the necessity for a tailored provision to accommodate professors frequently moving across campuses for lecture commitments. This case study explores the university's journey in pursuit of a robust attendance management solution catering to 3000 users, addressing specific challenges and optimising operational efficiency. University challenges The university encountered significant challenges in ensuring the smooth operation of its Attendance Management System, including: Inefficiency in the Existing Attendance Management Solution: The university grappled with issues stemming from an ineffective competitor's attendance management system, adding complexity rather than facilitating streamlined operations. This inefficiency extended to the complexities of managing attendance across diverse faculties, further complicating university-level payroll processing. Inconsistencies in Daily Attendance Recording for Teaching Staff: A crucial necessity for the university was the seamless daily recording of professors' attendance. The imperative for a well-organised system became evident to ensure accurate tracking and efficient payroll management. Lack of Proper Attendance Management Across Multiple Campuses: With campuses spread across different locations, the university faced the pressing need to centralise attendance data. This centralisation was crucial for the effective management of attendance records across all campus locations. Delayed Data Transmission from Devices: The existing solution encountered difficulties as punch data from devices experienced delays in reaching the system promptly. This lag resulted in complications, necessitating manual synchronization efforts to rectify the issue. Employee Accessibility Issues for Attendance Data and Leave Management: Staff members encountered limitations in accessing their attendance data through the current system. Furthermore, the absence of support for submitting leave requests contributed to inefficient leave management practices, prompting a demand for more effective solutions. Faced with these operational challenges, the university embarked on a quest for innovative solutions to improve its attendance management processes' overall efficiency and effectiveness. Matrix's solution To address the critical issues faced by the client, Matrix successfully implemented a comprehensive solution that effectively resolved the organisational challenges they were encountering. Matrix executed its Attendance Management System to achieve: Deployment of a Comprehensive Attendance Management System: Matrix effectively implemented an enterprise-grade Time-Attendance Solution, successfully tackling the client's organisational hurdles in attendance management. This solution streamlined the entire attendance process, simplifying complexities across various campuses. Seamless Attendance Recording for Teaching Staff: Matrix introduced biometric devices across different faculties, enabling effortless attendance logging for teaching staff. The widespread availability of devices ensured accurate tracking and efficient payroll management. Centralised Attendance Management Across Multiple Campuses: Matrix established a centralised solution for attendance management, consolidating data from various campuses. This centralised approach facilitated effective control and oversight of attendance across diverse locations. Automated Data Transmission from Devices: Matrix Time-Attendance terminals were equipped with automated data push technology. This feature ensured timely and automated data transfer from devices to the server, eliminating the need for manual synchronisation and enhancing operational efficiency. User-Friendly Employee Self-Service Portal: Matrix provided a comprehensive solution, including an Employee Self-Service portal. This portal enabled users to access attendance data on their devices and submit leave requests. With its hierarchy-based approval system, Matrix streamlined the leave management process. Improved efficiency The innovative solutions offered by Matrix not only resolved the client's challenges but also significantly enhanced attendance operations, promoting improved efficiency throughout the organisation. This case study highlights Matrix's capability to tailor solutions to meet unique client needs, ultimately optimising business processes. Results acheived Matrix successfully streamlined the entire process, introducing clarity in payroll processing and simplifying attendance Matrix's deployment of its Enterprise-grade Time-Attendance Solution brought about a remarkable transformation in the operations of the historic university based in Vadodara. Confronting challenges posed by an inefficient attendance management system, Matrix successfully streamlined the entire process, introducing clarity in payroll processing and simplifying attendance tracking across diverse faculties. The use of Matrix biometric devices facilitated seamless attendance marking for teaching staff, contributing to efficient payroll management. Centralised attendance management The implementation of a centralised attendance management system across multiple campuses significantly improved control and efficiency in handling attendance data. Matrix addressed delays in data transmission by deploying terminals equipped with automated data push technology, eliminating the need for manual synchronisation. Employee Self-Service Portal Matrix's provision of a hierarchy-based approval system streamlined the client’s leave management requirements Furthermore, the implementation included a user-friendly Employee Self-Service Portal, allowing staff to effortlessly view attendance data and submit leave requests. Matrix's provision of a hierarchy-based approval system streamlined the client’s leave management requirements. These tailored solutions markedly enhanced operational efficiency, resulting in a more streamlined, accurate, and transparent organisational operation. Matrix's success in optimising attendance processes underscores its commitment to delivering innovative solutions tailored to the unique requirements of its clients. Products offered COSEC VEGA FOT: Fingerprint and RFID card-based Time-Attendance Terminal COSEC CENTRA PLT: Platform-based User Licence COSEC CENTRA TAM: User Licence for Time-Attendance Management COSEC CENTRA ESS: User Licence for Employee Self-Service Management
IDEMIA has been selected by ACSA to implement its solution in South Africa’s three main international airports: OR Tambo, Cape Town, and King Shaka including the border clearance process using the latest e-Gates technologies. Interconnected with all the major airlines in the world, South Africa is a key country when it comes to air transportation in Africa. ID2Travel The four-year project started in October 2023 and will be deployed in three phases. As soon as 2026, nine South African airports will be equipped with IDEMIA’s end-to-end PFF solution: ID2Travel. IDEMIA’s win was made possible by the long-standing relationship with South Africa and in particular the successful implementation of the ABIS program with the Department of Home Affairs (DHA). Biometric solutions IDEMIA’s expertise and solutions regarding its biometric technologies, combine efficiency, accuracy, and equity The biometric solutions deployed in these airports (three international and six domestic) will enhance the quality of services offered to passengers all along their journey, from the check-in to the boarding of the plane. IDEMIA’s expertise in biometrics, repeatedly recognised in industry rankings, enables it to offer advanced fingerprint, facial, and iris biometric technologies that enhance passenger security while making their experience more seamless. The National Institute of Standards and Technology (NIST) latest test results underscore IDEMIA’s outstanding expertise and solutions regarding its biometric technologies, combining efficiency, accuracy, and equity. Facial recognition technology This partnership with ACSA builds on IDEMIA’s long-standing expertise in equipping world-class airports around the globe with its cutting-edge technologies. From Singapore’s Changi airport, which facilitates passenger flow from baggage check-in to boarding the plane, to India’s Delhi, Hyderabad, and Goa airports where facial recognition technology verifies the identity of domestic flyers, to trials at Lyon-Saint Exupéry and Paris-Orly (France), IDEMIA’s solutions are proven to be highly accurate, thereby offering the best security and an efficient and smooth passenger journey. Passenger facilitation solution This new solution will offer our passengers a seamless, unique, and secure new airport experience" "We are thrilled to be launching a new passenger facilitation solution at our nine ACSA airports, and for the first time in Southern Africa. Based on biometrics, airport processes will be automated using state-of-the-art technology from our partner IDEMIA," said Mthoko Mncwabe, Chief Information Officer, ACSA. "This new solution, which we are currently deploying in our airports, will offer our passengers a seamless, unique, and secure new airport experience. In line with our Sustain, Grow, and Digitise strategy, this solution positions ACSA as the pioneering airport management services company in Africa." Safe and smooth passenger experience "We are delighted to have been awarded this landmark contract for IDEMIA in Africa, which demonstrates the competitiveness and quality of the solutions that we provide to our clients worldwide," said Matt Cole, IDEMIA Executive Vice President of Public Security and Identity. "We are looking forward to working with ACSA on this historic and ambitious partnership, which will ultimately ensure a safer and smoother passenger experience at these nine South African airports."
On the occasion of INTERPOL’s 91st General Assembly – and 100th anniversary – the world’s largest international police organisation announces the launch of its enhanced BioHUB, powered by IDEMIA’s newest Multibiometric Identification System (MBIS). Multibiometric Identification System This latest version, MBIS 5, integrates new generation algorithms, which provide a higher matching accuracy rate with a shorter response time and a more user-friendly interface. The first phase of its deployment to enhance the identification of potential Persons of Interest (POIs) for police investigations has already been operational since October 2023. The second phase, which will be rolled out over the next two years, will extend this tool to border control points. The system will then be able to perform up to 1 million forensic searches per day, including fingerprints, palm prints and portraits, making it the top performing automated biometric identification system on the market. Cutting-edge technology to help law enforcement IDEMIA still leads the biometric tech race covering iris, fingerprint and face recognition IDEMIA’s commitment to excellence is reflected in its consistently top-ranked identity and security technologies. IDEMIA still leads the biometric tech race covering iris, fingerprint and face recognition. NIST’s (National Institute of Standards and Technology) latest test results underscore IDEMIA’s outstanding expertise and solutions combining efficiency, accuracy and equity. INTERPOL, creating a safer world INTERPOL currently has 196 member countries and enables law enforcement agencies from around the world to work together to make the world a safer place. INTERPOL’s high-tech infrastructure of technical and operational support helps meet the growing challenge of combating crime in the 21st century. Facial recognition is an important and rapidly evolving technology that has opened up many new opportunities to identify individuals and solve crimes. In 2016, INTERPOL opted for IDEMIA’s advanced facial recognition capabilities to create the INTERPOL Face Recognition System (IFRS). INTERPOL Face Recognition System (IFRS) The IFRS contains face images from more than 170 countries, and since its launch, thousands of terrorists, criminals, fugitives, POIs, and missing persons have been identified. In 2019, INTERPOL renewed its contract with IDEMIA to upgrade the current system and transform it into a Multibiometric Identification System (MBIS). IDEMIA and INTERPOL first began their collaboration in 1999, when IDEMIA delivered the original Automated Fingerprint Identification System (AFIS). Automated Fingerprint Identification System (AFIS) AFIS was designed to make cooperation easier between police forces from member countries The Automated Fingerprint Identification System (AFIS) was designed to make cooperation easier between police forces from member countries, by giving them access to global police tools and services, namely forensics, fingerprint evidence and the exchange of forensic data to support international investigations. Through AFIS, authorised users in member countries can view, submit, and cross-check these records using INTERPOL’s secure global police communications network. IDEMIA and INTERPOL share enhanced partnership Cyril Gout, INTERPOL’s Director of Operational Support and Analysis, said “In the same way that criminals use ever more innovative and sophisticated ways to avoid detection, law enforcement must also leverage the latest advances in technology, especially in biometric security, to better combat all forms of transnational crime. INTERPOL’s enhanced partnership with IDEMIA will further help our member countries better protect their borders and communities.” Matt Cole, Group Executive Vice President, Public Security and Identity at IDEMIA, said “IDEMIA is proud to be collaborating with INTERPOL again and to continue making the world a safer place for all. This project reinforces our longstanding partnership with INTERPOL, which has been going strong for over 20 years.” INTERPOL receives delivery of the new MBIS Matt Cole adds, “With the delivery of the new MBIS, developed thanks to our strong dedication to R&D, INTERPOL will have access to cutting-edge fingerprint, palm print and face identification technologies, enabling it and member countries to identify persons of interest faster than ever before.” He continues, “We look forward to many more years of supporting INTERPOL to ensure the safety of potentially billions of citizens around the world.”
Continental Tyres ranks among the top 5 automotive suppliers worldwide. With their expertise in mobility, transport, and processing, they keep development as a foreword to bettering the world. Since bringing in the first tread pattern tyre in the world, they strive for automotive safety for the last 140 years. Need for access control system The major challenge that the factory faced was that without an access control system, the entire asset and materials were unsecured and easily accessible to all employees without any restriction. This is especially concerning as securing a shutter and its accompanying door needed to be managed simultaneously. Moreover, with the shutter being imported from Germany, Many OEMs were finding it tough to integrate it alongside other access control solutions. An all-out solution Matrix took up the mantle to solve their troubles once and for all with an all-out solution to manage their security concerns for the door as well as the shutter. This solution involved the installation of COSEC VEGA FAX, for providing authorisation to a prescribed set of employees. Furthermore, to maintain proper and consolidated access logs, Matrix helped the management to keep a real-time track at their required endpoint. Management control With the intervention of Matrix, this factory unit of Continental Tyres could easily secure its premises as well as assets. This, in combination with, the timely logs of those who accessed gives the management proper control over the rights to entry. This also helps in getting a real-time update on people accessing the area as required by the client. Products offered COSEC VEGA FAX: Fingerprint and Card-based Door Controller with Touchscreen, IP65, Wi-Fi, and 3G/4G Connectivity Option. COSEC CENTRA PLATFORM: Platform Licence for COSEC CENTR. COSEC CENTRA PLT10: 10 Platform Users Licence for COSEC CENTRA. COSEC CENTRA ACM10: 10 Access Control Users Licence for COSEC CENTRA.
Swiss Arabian is the pioneer of Arabian perfumes that spans over 40 years. Over the years, the Swiss Arabian Perfumes Group has grown from strength to strength. Currently, it stands tall as the first perfume manufacturer in the UAE. They operate five modern manufacturing facilities spread across an area of 165,000 sq. ft., producing more than 35 million perfumes annually and exporting the same to over 80 countries. Challenges Swiss Arabian has a prominent presence across several cities in the UAE. Considering this, centralised data management of the employee attendance details, from all the units was critical. Besides, overtime calculation and managing rollover shifts were tedious tasks as well. Furthermore, verifying the attendance data with detailed reports, bifurcated by locations was a part of their key requirements. Solution Time-Attendance solution assists them in procuring accurate attendance details of an employee in no time Matrix addressed these challenges by proposing a Door Controller at each location, connected via a centralised platform, COSEC CENTRA, to manage all the data, from one place. This Time-Attendance solution assists them in procuring accurate attendance details of an employee in no time! Web-based employee portal Through the web-based employee portal, the solution offers efficient leave and shift management. Furthermore, it helped the HR team generate customised reports most efficiently. Results Centralised and effortless attendance management of multiple locations. Streamlined shift allocation and automated shift correction. Customised attendance policy formation. Real-time alert on attendance events. Auto-scheduled reporting. Efficient employee database management. Improved productivity. Products offered COSEC VEGA FAX: Fingerprint and Card-based Door Controller with Wi-Fi and Internet Connectivity Options. COSEC DOOR FOT: Optical Fingerprint and RFID Card-based Door Controller for Time-Attendance. COSEC PATH DCFM: Optical Fingerprint and RFID Card based Door Controller for Time-Attendance & Access Control. COSEC CENTRA PLT: Application Software Platform. COSEC CENTRA ESS: Employee Self-Service Portal for Attendance Management. COSEC CENTRA TAM: Time-Attendance and Leave Management Module for COSEC Software Platform. COSEC CENTRA ACM: Access Control Application Software for Enterprises.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?
It’s safe to say there has been more change in the workplace in the last two years than ever before. Driven by the pandemic, technology has both allowed greater flexibility for employees and enabled continuing prosperity for many companies that otherwise would have had to cease operation. But have security protocols and practices done enough to enable companies to keep pace with the changes? We asked this week’s Expert Panel Roundtable: Have security protocols and practices kept up with the changing ways people work?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)