Fingerprint recognition
Matrix, a major provider of advanced security and telecom solutions, is thrilled to announce its participation in the prestigious Dahej Industrial Expo 2024. Taking place from November 20th to 22nd at GIDC Road, Dahej, Gujarat. This event serves as an ideal platform for Matrix to showcase its latest advancements in IP Video Surveillance, Access Control, Time-Attendance, and Telecom solutions. Transforming security and communication At Dahej Industrial Expo 2024, Matrix will showcase its...
Verifying identities and conducting criminal background checks in the field has traditionally been one of the most time-consuming tasks for law enforcement officers. Real-time mobile biometrics In the past, this often required detaining individuals and transporting them to a station for fingerprint identification. Forward-thinking agencies like the Florida Department of Law Enforcement (FDLE) are tapping into highly accurate, real-time mobile biometric technology — Rapid ID — tran...
This new algorithmic solution, MBIS 5/MBSS, is fully integrated into the INTERPOL Bio HUB system. It includes increasingly accurate and relevant algorithms, allowing for easy and regular updates. The organisation’s 196 member countries can now query the Interpol database with fingerprints and facial images. The goal is to solve the most complex cases while optimising the use of tools, enabling criminal investigators to access post-event forensic analysis, covering fingerprints, palm pri...
Sentry Enterprises, an industry pioneer in decentralised identity and biometric security solutions, proudly announces the launch of SentryCard360—a groundbreaking innovation addressing the escalating risks of employee identity fraud, including the rise of new hire "bait & switch" schemes. In collaboration with Info Security pioneer, Credenti, and biometric identity pioneer, PrivateID. SentryCard360 SentryCard is already recognised for its industry-pioneering security features, includ...
Anviz, a brand of Xthings, a global pioneer in intelligent security solutions, announces the upcoming release of its latest access control solution, the M7 Palm, equipped with cutting-edge Palm Vein Recognition technology. This innovative device is designed to provide superior accuracy, security, and convenience to high-security and privacy-sensitive environments in industries such as banking, data centres, laboratories, airports, prisons, and government institutions. Launching globally today,...
IDEMIA Public Security North America, the provider of convenient and trusted biometric-based solutions, has launched its newest product, ID2Issuance, a cloud native credential issuance and management system that Motor Vehicle Agencies can use to quickly validate applicants’ photos and signatures, perform one-to-many (1:N) facial and fingerprint biometric matching, and document management for driver licenses and/or ID cards, all while keeping individuals’ Personal Identifiable Informa...
News
Anviz, together with its key partner Solotec, participated in the 30th ESS+ International Security Fair, the most international and comprehensive security fair in Latin America, Central & South America, and the Caribbean, with exhibitors from 20 countries and regions around the world, attracting nearly 20,000 professionals from all sectors of the industry. In this exhibition, Anviz focused on the popular and innovative products of smart biometric access control and time & attendance solutions, which combined with the current trends and technical features. It received great attention from customers and industry experts from the Latin American market, who were pleasantly surprised by the high recognition accuracy and multiple applications of the products. Innovation driving security in Latin America Anviz will introduce smarter and more reliable solutions to help them realise digital transformation Within the last two decades, the economy of the Latin American region has generally maintained a steady growth trend. As Latin American countries invest heavily in smart cities, transportation security, and the digital economy, the demand for AIoT technology in the region grows rapidly. Anviz believes that the security market in Latin America is in urgent need of products and technologies suitable for the security management and efficiency improvement demands of various industries. Therefore, Anviz will introduce smarter and more reliable solutions to help them realise digital transformation. Anviz will introduce smarter and more reliable solutions Product showcase FaceDeep3: As the most preferred face recognition terminal in the world, featuring Anviz's latest face biometric BioNANO® deep learning algorithms. It delivers the most matching speed, accuracy, and security level. With support for up to 10,000 dynamic face databases, it can quickly identify users within 2 metres (6.5 feet) in 0.3 seconds. Works with the Anviz CrossChex Standard to provide a flexible management platform for business use, which is practical for a wide range of access control and time and attendance sites in various enterprises. W3: A cloud-based intelligent face recognition access control and time attendance device with powerful functional applications, users can enjoy cloud-based attendance management, 0.5-second recognition matching speed, live face recognition, and wireless network connectivity. Users can easily access and manage the device through a web browser without any software, while managers can manage employee status anytime, anywhere with the CrossChex Cloud. Users can easily access and manage the device through a web browser W2 Pro: A new generation of fingerprint access control and time attendance terminals based on the Linux platform. An equipped color LCD provides a good HCI experience. Touch Keyboard and Optical Fingerprint Sensor to support multiple clocking options. Provides higher flexibility and multiple installation options for different environments, ensuring that it can be installed quickly and easily. C2 Slim: The most compact outdoor standalone access control device controller for installation in various environments. Combined with biometric fingerprint recognition and RFID cards, which meet higher security requirements. PoE support reduces installation and maintenance costs. Easily track employee time with CrossChex Cloud for more effortless workforce management. C2 KA: As a traditional RIFD access control device, capable of handling large volumes of data while providing fast matching speeds and quick response times. The PoE design provides additional flexibility for security systems while reducing installation and maintenance costs. Overall body design has been fully sealed to protect against dust and liquid ingress, ensuring stable operation in wide conditions. Digital transformation Andrew, Brand Director of Anviz, said, “Going forward, Anviz will continue to stay attentive to business trends in Latin America and continue to introduce smarter and more reliable smart security solutions to effectively meet the changing needs of the local market." "To assist global digital transformation and contribute wisdom and power to build a world, where everything is interconnected, is our original intention to move forward steadily.” Live event feedback Anviz's products quickly attracted the interest of many exhibitors with their close exterior design Just in time, Anviz's products quickly attracted the interest of many exhibitors with their compact exterior design designed for outdoor applications and the application of the latest biometric algorithm technology. Whether in the areas of live identification, people management, or multi-point control, the products showed excellent adaptability, matching the needs of Latin America for improved security and efficiency in enterprises. Cost-effective security solutions One attendee commented, "The live recognition feature of FaceDeep 3 is amazing, which effectively eliminates the possibility of fake faces and provides more reliable access control management for businesses and employees. The easy installation and high stability of FaceDeep 3 also meet local market demand for cost-effective security solutions in Latin America. We're pleased to see the application of such advanced technology locally.” The live recognition feature of FaceDeep 3 is amazing Rogelio Stelzer, Business Development Manager at Anviz, said, “In response to the challenges faced at the forefront of the evolving market environment, Anviz has an unwavering commitment to smart security, continues to push the limits of technology for sustainable and proactive solutions to Latin America's security challenges.”
IDEMIA Public Security North America, the global provider of convenient and trusted biometric-based solutions, including physical and digital secure credentialing in the U.S, is partnering with My Family ID to bring families an easy way to capture important identification information for their children, including a photo and fingerprints, through the My Family ID app. As the first-ever digital fingerprint scanner and child safety profile for smartphones, the My Family ID app serves as an important safety measure in the event a child or other family member goes missing. My Family ID app The My Family ID app allows families to capture and store a photo of a child’s face Using face scan and cutting-edge touchless fingerprinting technology, the My Family ID app, which is available on the Apple App Store and Google Play, allows families to capture and store a photo of a child’s face, as well as high-resolution, detailed prints of a child’s fingerprints (not just a blue smudge). For a one-time fee of $0.99, families can create safety profiles for up to six family members that include important identification information, such as the full name, date of birth, hair colour, eye colour, height, weight, as well as safety information like allergies and medicines, and parent/guardian information. Designed to protect user information and privacy The result is a simple and effective tool that helps families have up-to-date images and descriptions of their children and family members. Designed to protect user information and privacy, the app fully encrypts the images and information, and files are only stored on the user’s device. The My Family ID app is the first app designed to identify missing loved ones and return them to their families. When searching for a missing child, law enforcement relies on an up-to-date, good quality photo, the child’s descriptive information, and fingerprints. Importance of fingerprints According to the Federal Bureau of Investigation (FBI) and the National Center for Missing and Exploited Children (NCMEC), fingerprints are most critical to ensuring a child can be quickly identified by law enforcement. With a click of a button and at a moment’s notice, families can go into the My Family ID app With a click of a button and at a moment’s notice, families can go into the My Family ID app and generate a PDF of any child safety profile, which can be shared with other family members, caregivers, or law enforcement officials in the time of emergency. This PDF includes all of the identification and safety information provided by the user, along with the child’s photo and fingerprints, and can be sent to law enforcement for analysis and matching for family members. Face ID Face ID also plays a monumental part when trying to locate a missing person. The biometric features inside the My Family ID app are designed to provide law enforcement with high-quality images suitable for facial recognition. In addition to children, the app’s face scan be used for adults and seniors to aid in their safety. Charles Still, Retired Juvenile Detective and Creator of My Family ID, said “Improving how we deal with missing and run-away children is a passion of mine. It started when I was a juvenile detective and continues to this day. I see My Family ID as a practical tool for our time; a tool that that is easy for parents to use and is helpful to law enforcement too!” Maintain digital IDs and fingerprints for children Donnie Scott, CEO, IDEMIA Public Security North America, said “As a leader in producing and supplying the nation’s physical and digital driver’s licenses and government identification cards and a company that is committed to creating technologies and solutions that help make the world safer, we immediately saw the value in the My Family ID app.” Donnie Scott adds, “The My Family ID app enables parents, guardians, or caregivers to easily maintain a digital ID and fingerprints for children that they can access within easy reach - from their smartphone! This is crucial in the event of an emergency when every second counts.” Access to children’s up-to-date information Casey Mayfield, SVP Justice & Public Safety, IDEMIA Public Security North America, said “When looking for missing children, having access to children’s up-to-date information is most crucial for law enforcement agencies.” Casey Mayfield adds, “We are a long-time partner to the law enforcement community with our globally recognised biometric and fingerprint technology and high-ranking performance in the National Institute of Standards and Technology (NIST)’s benchmarks. Our team is excited to work with My Family ID to help bring another important and effective tool to law enforcement to keep communities across our country safe.”
With immediate effect, netfiles GmbH, a provider of virtual data rooms and highly secure data exchange solutions, is adopting passkey authentication as an additional and convenient option to log in. Thanks to passkeys, users no longer have to remember passwords and can keep their user accounts reliably protected against phishing and cyber-attacks. It has long been understood that logging in with a password is a not particularly secure way of accessing applications, websites and online shops. Why? Because there is a serious danger that passwords could be intercepted or become known due to data breaches. Troublesome chore Microsoft reported 4,000 password attacks per second last year–up from “only” 115 attacks in 2015 Moreover, this threat is constantly on the rise: Microsoft alone reported 4,000 password attacks per second last year–up from “only” 115 attacks in 2015. For users, it is also a troublesome chore to think up passwords that are hard for others to guess – and then remember them. This explains why simple passwords are used all too often, and why one and the same password is often used for multiple services. Security and data protection “We attach supreme importance to security and data protection, because our customers use netfiles mostly to exchange confidential, mission-critical and/or personal information,” explains Thomas Krempl, Managing Director of netfiles GmbH. “This being the case, it is crucial to make the login procedure too as secure as possible. That is why we are now one of the first data room providers to support passkeys as an exceptionally secure but also simple and convenient login alternative.” How does passkey authentication work? Secret private key is stored either on the user’s computer or mobile device, under password manager Passkeys are based on pairs of cryptographic keys. When a user registers with a web service, two keys – the passkeys – are generated. A secret private key is stored either on the user’s computer or mobile device, under their password manager, or on their FIDO2 security key (a hardware token similar to a USB stick). In contrast, the online service only stores the public key. For all future login attempts, the web service issues a “challenge” that can only be solved correctly with the private key. Users then authenticate themselves with a fingerprint, via facial recognition, with their FIDO2 stick or by entering the device PIN. In the background, the correct answer is then forwarded to the web service and the user is granted access to his or her account. The advantage? Since no passwords have to be transmitted via the Internet and users no longer have to remember their passwords, passkeys provide robust protection against data theft and are quite simply easier to use. Netfiles products With immediate effect, customers can use passkey authentication to log in to all netfiles products: netfiles Deal Room – a virtual data room for due diligence audits and company/real estate transactions netfiles Board Room – for meeting management and board-level communication All netfiles data exchange solutions.
Suprema, a global pioneer of AI-based security solutions, has announced the official launch of CLUe, an open cloud integration platform designed to make access control easy and secure. Suprema CLUe is built on a native cloud architecture, allowing devices to connect directly to the cloud via standard REST APIs. This eliminates the need for on-premise server adoption, significantly simplifying integration and reducing cost. CLUe - open cloud integration platform With CLUe, businesses can easily and cost-efficiently adopt Suprema’s advanced AI-powered biometric access control devices, which support a wide range of multi-credential methods, including facial authentication, fingerprint recognition, dynamic/static QR codes, and RFID cards. This ensures a high level of security and user convenience, allowing users to choose the most convenient and secure method. Multi-location management capabilities CLUe stands out with its multi-location control abilities via a web portal and mobile application CLUe is ideal for customers who need access control, visitor management, membership management, and multi-location management. Especially, CLUe stands out with its multi-location management capabilities through a web portal and mobile application. Administrators can effortlessly manage access control for various locations, anytime and anywhere, ensuring convenience and operational efficiency. CLUe was first showcased in the Korean and Japanese markets in 2023, proving its reliability and effectiveness with successful deployments in various areas such as fitness centres, screen golf facilities, and shared offices across these regions. Now, CLUe is available to customers worldwide. Integrated total security solutions Suprema, a globally trusted security solution provider, is certified with CSA STAR Level 2 for cloud security, along with ISO 27001 and ISO 27701, ensuring the highest standards in data protection and cloud security. "With the launch of CLUe, our first cloud-based platform, we enhance our commitment to delivering integrated total security solutions worldwide," said Suprema Inc. CEO, Hanchul Kim, adding "CLUe offers a scalable, secure, and user-friendly access control platform based on cloud technology that will meet the needs of businesses globally."
Fingerprint Cards AB (Fingerprints™) and IN Groupe through SPS brand, a pioneer in contactless and dual interface cards, announce the launch of its secure Component solution for contactless biometric payment cards, supporting global card manufacturers to scale up production of next-generation payment cards. Secure Component solution In line with consumer preferences for contactless, the global biometric payment card market is anticipated to rise at a considerable rate over the coming years. To support mass global adoption, Fingerprints and IN Groupe partnered in November 2023 to simplify the manufacturing process, allowing for increased production by improving reliability and reducing costs. Through the SPS brand of IN Groupe, the next-generation cards are ready for mass global rollout. Contactless biometric payment cards CEO of Fingerprints, Adam Philpott, comments, “Our continuing collaboration with IN Groupe and its SPS brand is supporting the global adoption of secure, convenient, and high-quality biometric payment cards." "The launch of these cards into the market reinforces Fingerprints’ position as the world pioneer in biometrics and commitment to providing innovative solutions that improve our daily lives.” T2 sensor module and software platform T2 offers ultra-low power consumption and is based on STMicroelectronics STPay-Topaz-Bio solution SPS’s cards incorporate Fingerprints’ second-generation T-Shape® (T2) sensor module and software platform, which offers ultra-low power consumption and pioneering biometric performance and is based on STMicroelectronics STPay-Topaz-Bio solution. In 2023 Fingerprints reached the one million sensors shipped milestone specifically for biometric payment cards, highlighting the robust and proven nature of the technology. Cost-effective biometric solutions Jean-Baptiste Leos, Product Director for SPS Banking Products at IN Groupe adds, “As a company with innovation at its core, we are very pleased to have expanded our product offering with Fingerprints’ next-generation biometric technology." "This helps us in our mission to continue innovating and offer secure and cost-effective biometric solutions to our customers. As a part of our offer, Technical support around Card construction, milling, embedding, and certification are key assets for the product deployment and will be our key priority in the coming quarters.”
Matrix successfully demonstrated its cutting-edge security products and solutions at InnoMetro 2024, held from May 21st to 22nd at the Hotel Taj Vivanta. As a pioneering Indian company, Matrix proudly presented its RDSO 6.0-compliant network cameras, specifically designed for Indian Railways, at Booth No. H1.17. During the event, Matrix highlighted its commitment to cybersecurity with network cameras certified by STQC, Delhi lab, adhering to OWASP ASVS 4.0 L2 norms. These cameras ensure the security of video data during transmission and storage, safeguarding critical passenger information against cyber threats. Compliant with EN50155 standards Also, Matrix showcased its acclaimed Project Bullet IP Cameras and Project Dome IP Cameras Matrix captivated attendees with its state-of-the-art IP Video Surveillance, Access Control, and Time-Attendance solutions tailored for Metro Rail Systems. A standout attraction was the newly launched Ruggedised IP Camera, compliant with EN50155 standards, designed to withstand vibrations and shocks, and ideal for transportation monitoring. This camera delivers high-quality video, exceptional low-light sensitivity, and robust performance in dynamic transit environments. Additionally, Matrix showcased its acclaimed Project Bullet IP Cameras and Project Dome IP Cameras, both RDSO 6.0 ready, offering high-resolution imagery for large-scale organisational needs. Visitors also explored the compact 4-Channel NVR, featuring up to 10TB storage capacity, and a fanless, ventless design minimising dust, wear, and system malfunctions. Advanced face recognition technology Device offers swift authentication through AADHAAR numbers and fingerprints In the realm of Access Control and Time-Attendance, Matrix presented the COSEC ARGO FACE, an intelligent door controller with advanced face recognition technology. Its features include Adaptive Face Recognition, Face Liveness Detection, and Mask Compulsion, ensuring rapid and secure identification with a user capacity of 50,000. Matrix also showcased COSEC VEGA, an embedded Linux-based AADHAAR-enabled biometric attendance device registered on the AEBAS Server. This device offers swift authentication through AADHAAR numbers and fingerprints, optimising workforce productivity for government organisations. Advance security measures Kaushal Kadakia, Marketing Head at Matrix, expressed, "InnoMetro provided a perfect platform for us to demonstrate our specialised security solutions for Indian Railways and Metro Rail Systems." "We engaged with key government decision-makers, discussing potential collaborations to advance security measures in the transportation sector."
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Along with the growing adoption of cloud, SaaS applications have accounted for more than triple of the account-takeover attacks between 2019 and 2021, alone. Any given breach can potentially bankrupt many small businesses, with average costs reaching USD 4.35 million in 2022, according to a 2022 IBM report. Every business, no matter its size, must minimise these risks by deploying a range of cybersecurity tools and procedures. One of the most important elements is multifactor authentication (MFA). Some cyber insurance companies mandate MFA as a prerequisite for coverage and others will lower their premiums for companies that have deployed it. These insurers know how much more secure the enterprise is when multiple different verification methods are used for logging into accounts and applications. Importance of Cyber Insurance Cyber insurance has become a must-have for organisations that deploy and rely on digital systems. Small businesses are especially vulnerable to cyber threats since few have invested in the necessary security tools to defend against network breaches, scams and other types of cybercrime. Cyber insurance has become a must-have for organisations that deploy and rely on digital systems The good news is that cyber insurance policies are widely available and offer a broad range of coverage options. Some will pay the costs of direct expenses associated with a network attack as well as legal costs, including litigation defense payments, if the business could not meet contractual obligations because of the breach. Cyber insurance premiums Policies may also cover the cost of losing and then restoring access to technology after a breach. Policies may even cover the costs of transfer payment fraud caused by social engineering, as well as profit losses from reputational damage, although this can be restricted to a finite period of time. Depending on the coverage that is selected, cyber insurance premiums can be expensive, and a policy does not replace the solid foundation of an underlying cybersecurity framework. A foundation that includes MFA will help to stop cybercrime before it is committed while also making it easier to acquire and reduce the costs of cyber insurance. In fact, MFA is now one of the most common conditions for obtaining cyber insurance because of its proven ability to help prevent account takeover attacks and stop identity-related data breaches. Multifactor authentication overview The MFA ‘factors’ for confirming identity during login typically include something the user knows The MFA ‘factors’ for confirming identity during login typically include something the user knows (like a pin), something the user has (like a secure device), and something the user ‘is’ (like presenting a fingerprint or face scan to a reader or camera). Using these factors when accessing sensitive applications, systems, and data helps prevent attackers from compromising accounts. This is true even if the attacker has somehow tricked legitimate users into providing usernames and passwords through phishing schemes, in which seemingly legitimate emails are used to harvest this information. Preventing unauthorised access These types of attacks can be launched at scale and put millions of organisations at risk around the world. Some insurance providers simply will not cover them. They know that MFA can help organisations avoid these ‘user error’ attacks through authentication policies that prevent unauthorised access to any of the organisation's networks, applications and devices, wherever they are located. The U.S. government has also required that all federal agencies use MFA Insurers aren't the only ones recommending and even mandating MFA. The U.S. government has also required that all federal agencies use MFA, per the Executive Order On Improving the Nation's Cybersecurity signed by U.S. President Joe Biden in May 2021. A similar recommendation has been made in Europe as part of ENISA guidelines. The barriers to MFA adoption by SMBs One might wonder why over 40% of small and medium size business(SMBs) in the United States don’t have a cybersecurity plan in place and why less than 15% of the ones that do have a plan, consider it to be inadequate. According to the Cyber Readiness Institute, when we dive deeper into the details, there are three key barriers to MFA adoption: Lack of Awareness — 55% of SMBs are reported to remain unprotected because they’re simply unaware of MFA and its benefits to their organisation. Limited Understanding — Beyond a lack of awareness, 30% of business owners said they don’t utilise MFA because they simply don’t know how it works. In addition to the fundamental functionality, there are a variety of MFA options to consider, including a range of form factors that can be utilised to best meet an organisation’s needs. Perceived Inconvenience — 20% of SMBs believe MFA is too inconvenient, when in reality, we’re all more familiar with the concept than we think. How smaller businesses can best implement MFA SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle by allowing them to quickly and easily increase security and convenience. MFA isn’t only about security, its also about convenience. Implementing MFA allows organisations to eliminate reliance on passwords, which can significantly improve user experience. So what should decision-makers know about MFA in order to implement it for their SMB? Ease of Use — The right MFA solution should offer a variety of authentication methods, but should also be easy to adopt and use across the organisation. Multiple Methods and Form Factors — Determine the best combination of authentication methods and form factors. Some providers offer only a small selection, which can tie you down to very basic and inflexible options that do not fully meet your users unique needs. Easy Deployment and Management — Time is money, especially for SMBs. Some solutions can take months to deploy, require extensive training and new installation codes, as well as potential overhauls to existing applications. Look for a solution that can be up and running in days. A Complete Solution — Any MFA solution should provide comprehensive security across all of your assets, including your PCs, mobile devices, applications and networks Compliance — Compliance impacts businesses of all sizes. As such, be sure to find a provider that meets evolving industry standards, including data protection such as GDPR and CCPA. Adaptability — As your business grows, your security needs will also evolve, with some users or parts of your business requiring more security than others. Make sure your provider allows you to scale and adjust accordingly to offer the right security for the right users. Blocking cybercriminal attempts Leading and growing a smaller business is a big challenge. Fortunately, adopting MFA provides a safety net to help block cybercriminal attempts, protect your business’ reputation and most importantly, help protect your bottom line. MFA should be the foundation for any robust security strategy and many cyber insurance companies now require it to reduce premiums and even qualify for coverage. For best results, organisations should choose a solution that is easy to deploy, offers a broad range of authentication options and form factors, and gives users a smooth and convenient authentication experience.
A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutions. In the world of access control systems, biometric advancements allow for more secure authentication measures and seamless security processes. As more products and services hit the market, learn our predictions for the 2023 biometric trends in this article. Biometric access control systems What are biometric access control systems? Biometric access control systems include safety measures like facial and fingerprint recognition, as well as multi factor identification terminals. These systems decide who is authorised to enter a specific room, floor or even the entire building, using a database of stored identifiable features, like someone’s fingerprints. If an individual tries to enter and is not in the system, then they are denied access. Biometric Access Control Trends to Look Out For in 2023 - From multifactor authentication to contactless security measures, discover the five biggest upcoming trends in biometrics for access control. Real-time facial recognition The cloud has offered us new and innovative ways to store vast amounts of data Cloud Biometrics - The cloud has offered us new and innovative ways to store vast amounts of data. Combined with biometrics, this trend will allow security professionals to forgo the dedicated server and store their data on the cloud. Cloud biometrics facilitate real-time facial recognition and other processing-intensive security measures. It even allows for remote monitoring, which will be essential in our new era of hybrid working. Multifactor Authentication - In 2023, multifactor authentication will become the norm. It is already widely used by people to secure their accounts, but it will be vital in access control security. Multifactor authentication adds another layer of security by combining a traditional password with facial recognition or fingerprint biometrics. This approach has previously been reserved for highly sensitive data, but with cybercrimes on the rise, it will soon be used to protect everyday accounts. Highly sensitive data Contactless Biometrics - The most recent advancements in biometrics allow people to go about their day without being interrupted by pin codes and touchpads. Contactless biometrics, combined with integrated systems and algorithms, allow people to move seamlessly without sacrificing security. The latest biometrics, for example, can let a pre-authorised individual into a building, inform the appropriate people that they have arrived and call them an elevator, all without needing to touch a keypad. They care about security, but people also want to trust that their provider shares their values Ethical Biometrics - Increasingly, people are valuing ethical biometrics. They care about security, but people also want to trust that their provider shares their values. People want to know that their data will be protected, in line with privacy laws, and that the biometrics system they use will be unbiased. This new standard for the industry has been growing steadily, but 2023 will bring stricter expectations for ethical security. Digital IDs - More people than ever are using digital IDs. From the humble digital wallet, which we all have on our phones, to more complex applications used in access control, physical cards are seemingly a thing of the past. This shift has required (and will continue to require) a complete overhaul of existing infrastructure to allow for new forms of identification. TLDR: 2023 biometric trends in access control The latest biometric trends will see contactless security measures become the norm. With advancements in cloud biometrics and digital IDs, the latest technologies will continue to allow for new and innovative security solutions. However, with stricter expectations for ethical biometrics and data privacy, any new security trends will need to align with these standards. As the founder of Elite Security, Ben McCayna is passionate about security. He started the company in 2004 after identifying a need for high-quality door and security installations and specialised maintenance for commercial businesses. Ben is one of the leading security experts in London and beyond, thanks to his highly successful company and network of happy clients. Elite Security has grown to offer a wide range of security and access control systems, including fire safety, intercoms, alarms and CCTV. With decades of experience in both business management and security, Ben has established himself as a true expert in his field.
Security beat
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System helps in tailgating mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy enrolment and deployment Enrolment in the system is easy. Companies can deploy a separate enrolment station, or any reader can be used for enrolment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrolment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting intent from positioning of eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed. The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based video systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. the economics of the cloud make implementation of analytics much more affordable Augmented identity: biometrics in security Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial intelligence applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades. Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live video streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customisable turnstile solutions Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.” Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.
Case studies
For years, the Civil Police of the State of São Paulo, Brazil’s largest state police force faced significant challenges with criminal bookings and identification, including: A Fragmented Identity System - Each of Brazil’s 27 states has its own siloed programme that does not interconnect. This not only hinders statewide criminal booking but also undermines the community’s confidence in the criminal justice system. Identity Fraud With Multiple IDs - Imagine having 43 identities. This was the case for one unlawful Brazilian. The prevalence of identity fraud is extremely high across the country. If a person wants to hide their identity, it’s common for them to simply move to another state and set up a new profile. Manual Ink-and-Paper Fingerprinting Techniques - Many law enforcement departments across Brazil administered manual fingerprinting techniques, resulting in inaccuracies and low matching rates. Slow, Inefficient Criminal Booking Processes - Inefficiency was another setback for justice. It took numerous steps to confirm one’s identity and, on average, a whole workweek to get matching results returned. Biometric National ID Compliance - The civil police must modernise systems to comply with the Brazilian government’s mandates for all citizens to tie biometrics to their IDs. The Civil Police of the State of São Paulo needed a more reliable and efficient solution to break down identification silos and put the agency on the path toward a unified, national system rooted in the power of biometrics. HID's solution The HID ten-print scanner is designed to quickly capture flat and rolled fingerprints for background checks Working through HID’s partner, Golden Distribuidora, one of Brazil’s largest distributors of IT products, the Civil Police of the State of São Paulo selected a comprehensive biometrics-based identification system called BioKit, featuring HID’s ten-print scanner. The HID ten-print scanner is designed to quickly capture flat and rolled fingerprints for background checks and identity validation programmes. It is also certified for FBI Appendix F (FAP 60) and offers an economical approach to fingerprint acquisition without sacrificing image quality. Automated Biometric Identification System The criminal booking process at São Paulo civil police stations is simplified and can be accomplished in minutes not days. First, agents use HID’s ten-print scanner to capture fingerprints and determine if the individual has a biometric file on record. The fingerprint images are compared against the state-run Automated Biometric Identification System (ABIS). If there is a match, the civil police move forward with their investigation. If there is no match, the officer then creates a new biographic/biometric profile for the individual in question and enrolls them into the ABIS. HID ten-print scanner HID ten-print scanners deliver superior performance and reliability at a competitive price point. Key advantages include: High-Quality Tenprint Capture - The scanner is FBI Appendix F (FAP 60) certified and can quickly capture high-resolution rolled and flat fingerprints. Ease of Use - User-friendly pictographs and LED indicators simplify the process for operators. Automatic Capture - Patented “Auto-Capture” offers fast and error-free image capture. Difficult Fingerprint Capability - An optional silicone membrane improves image quality for dry or damaged skin ensuring consistent results. ABIS Integration - The scanner seamlessly integrates with Brazil’s Automated Biometric Identification System (ABIS) to enable quick and accurate background checks. Results delivered Using the BioKit system, featuring the HID ten-print scanner significantly streamlines the criminal booking Using the BioKit system, featuring the HID ten-print scanner significantly streamlines the criminal booking process and improves matching accuracy for the State of São Paulo Civil Police. “Working with criminals can be difficult and dangerous, and the HID ten-print scanners help us identify and book criminals quickly and simply,” said Dr. Luiz Ortiz, Chief Delegate, Civil Police of the State of São Paulo. Easy to use Dr. Luiz Ortiz adds, “The HID ten-print scanner is easy to use and provides clear direction through pictographs, which is a big differentiator from other offerings.” To date, the BioKit system with HID’s print scanners is deployed in 500 civil police stations throughout São Paulo. This system has transformed criminal booking and identification processes, resulting in an increase in solved criminal cases and a steep reduction in identity fraud. HID fingerprint technology “What used to take 4 to 5 days is now done in minutes using the BioKit system and HID fingerprint technology,” said Dr. Ortiz. Dr. Ortiz adds, “Our agents can accurately identify or onboard suspects, and each new biometric enrollment into the centralised ABIS contributes to strengthening our country’s overall identity system and ability to bring about justice faster and smarter.” Biometric enrollment and verification “Each individual the Civil Police of the State of São Paulo onboards ties to a single set of fingerprints that verifies their true identity,” said Danilo Fernandes, Business Development Manager at Golden Distribuidora. Danilo Fernandes adds, “Utilising biometric enrollment and verification, our nation has the potential to streamline millions of records, while preventing countless cases of fraud. This establishes a fierce force to fight fraud here in Brazil.” A simple, fast, and trusted experience Additional use cases for the BioKit + HID ten-print scanner, beyond criminal bookings, include border control, background checks, correctional centres, courtrooms, voter registration, and national ID programmes. The team at Golden Distribuidora expects to continue distributing these biometric systems throughout the country to support Brazil in combating fraud and making biometric enrollment and identification a simple, fast, and trusted experience for all citizens and stakeholders.
Established in 1997, Dubai-based BMA International operates fashion retail in the Middle East and Asia across the Kingdom of Saudi Arabia (KSA), United Arab Emirates (UAE), Bahrain, Oman, Kuwait and Qatar with more than 250 stores offering two major brands — Redtag and twenty4. BMA’s steady growth is a testament to its focus on building trust with its shoppers, employees, suppliers and stakeholders to create a company that is people-centric, ambitious and results-oriented. Challenge Fraud is a common problem in the retail sector, particularly within large chains with hundreds of locations and tens of thousands of employees. BMA’s retail stores were no exception. Following an internal audit, security of point-of-sale (POS) terminals in retail outlets were identified as a serious concern, particularly the misuse of floor supervisors’ credentials to access terminals and modify or cancel transactions. The problem persisted even after BMA switched from passwords to a smart card-based authentication system The problem persisted even after BMA switched from passwords to a smart card-based authentication system. The most common issues involved supervisors leaving smart cards with cashiers to use in their absence and failing to return the cards when separation from an employer occurs — a frequent occurrence as many of BMA’s retail employees are expatriates who often return to their home countries. Fraudulent use of the smart card was also a common problem. Once a sale was completed and the customer had left the store with their purchased items, the smart card could be used to improperly access the system so the cashier could void the transaction and pocket the “refund,” resulting in both monetary and inventory losses. Biometric-based system “BMA’s internal auditors were concerned with the lack of control over the cards and the potential for fraudulent transactions due to their mishandling. They observed clear gaps in security and authentication practices that led directly to fraud and revenue leakage, resulting in the Internal Audit Committee recommending to the BMA Board of Directors that action be taken to plug the security holes by tightening the authentication process,” said Nainan M. Kurian, CEO of Technowave International LLC. The decision was made to transition authentication to a biometric-based system that would provide the required security at a competitive price that aligned with the aesthetics of the retail stores. The system also needed to be compatible with the Oracle Retail Xstore Office Cloud Service, which BMA International was adopting across its brands. Solution A fingerprint reader from HID is ideal for use by multiple people in a shared environment BMA International and its technology partner, Technowave International LLC, determined that the HID DigitalPersona® 4500 Fingerprint Reader met all their requirements — a decision supported by recommendations from other retailers that had deployed the product, and by the fact that competitive solutions were incompatible with Oracle Retail Xstore, a crucial requirement. A USB peripheral with a compact design to conserve space, this fingerprint reader from HID is ideal for use by multiple people in a shared environment. Its professional, modern design looks elegant in retail settings while offering superior authentication control via biometric functionality that uses optical scanning technology to achieve excellent image quality and reliability. HID DigitalPersona 4500 Fingerprint Reader With this easy-to-use technology, floor supervisors simply place their finger on the reader window, which rapidly captures and encrypts the fingerprint image, and then provides a red flash as a visual cue indicating that it was properly captured. That image is sent to the DigitalPersona FingerJetTM biometric engine for verification, and once the user has been authenticated, access to the POS terminal is granted. “Deploying the HID DigitalPersona 4500 Fingerprint Reader was simple and caused no disruption to retail operations. It paved the way for significant reduction in the malpractice that had been occurring with the smart card system,” said Kurian. Result Since deploying more than 1,100 HID fingerprint readers in retail outlets across KSA, UAE, Oman, Bahrain, Kuwait and Qatar, BMA has eliminated nearly all POS fraud and abuse. The system has also driven tangible improvements in the attendance and punctuality of floor supervisors, who must now be physically present in the store for authentication to take place. The HID authentication system is also capable of multiple types of authentications — providing flexibility that is appreciated by users who work at multiple locations. “Because the HID DigitalPersona 4500 Fingerprint Reader requires proof of presence for authentication, there is greater accountability among supervisors which resulted in immediate cessation of POS fraud and stopped both revenue and inventory leakage. The exceptional support provided by HID Global has also allowed BMA to take full advantage of the system’s functionality and flexibility,” said Kurian.
Biometrics company, Fingerprint Cards AB (Fingerprints™), has upgraded the physical access security of its Gothenburg HQ. S-Key biometric access cards from Freevolt Technologies Limited, which embed Fingerprints’ own T2 sensors, have been implemented across the entire Gothenburg site. The updated authentication system further strengthens Fingerprints’ workplace security and enables role-based access control, whilst ensuring a convenient and easy-to-use experience. Role-based access control Fingerprints’ Gothenburg HQ has security gates to enter and exit the building, and restricted areas for hardware and software R&D. By replacing access keyfobs with biometrics access cards, site-wide security has been enhanced and role-based access control has been enabled to better control access to sensitive areas of the site. By replacing traditional security methods based on something they know/have with something they are, multi-factor authentication has been enabled while maintaining convenience for employees. Fingerprints’ latest ‘T2’ sensors Solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs Caroline Krüger, CHRO of Fingerprints comments: “The workplace has evolved significantly in recent years. At Fingerprints, we offer hybrid working whilst still ensuring our workforce has 24/7 access to HQ. Amidst this dynamic working environment, it is essential our team feels the workplace is accessible and safe. This requires a flexible, secure and convenient access control solution.” Fingerprints has implemented Freevolt’s flagship biometric access card solution, S-Key. The solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs. The card incorporates Fingerprints’ latest ‘T2’ sensors which deliver optimised image quality, processing speed and power efficiency. Traditional security methods Adam Philpott, CEO of Fingerprints comments: “To meet today’s security challenges we must move away from traditional security methods. And, as a biometrics company, it is important that we lead the way in ensuring robust, frictionless security in our own operations." "There is an opportunity here too; what can we learn, what innovations will we identify by using these systems day to day? I look forward to continuing our strong and innovative collaboration with Freevolt technologies.” Energy harvesting technology Gonzalo de Gisbert, Head of Product & Business Development at Freevolt Technologies, adds: “Fingerprints are pioneers in biometrics, with sensors in billions of products, so they know what makes a good biometric solution. We’re therefore thrilled that Fingerprints has chosen S-Key to strengthen security at their global headquarters, in Gothenburg." "Our pioneering radio frequency energy harvesting technology combined with Fingerprints’ ‘T2’ sensors, known as FPC 1323, enables S-Key to be completely battery-less, lasting for many years. Roll-out was seamless, with everyone set up in less than 1 hour. That’s simple, safe, and secure biometrics, powered by Freevolt.”
Situated in Vadodara, Gujarat, India, this venerable university stands as one of the oldest in the country, tracing its roots back to 1881. Honouring a forward-thinking ruler, it has evolved into a prominent public institution that provides a diverse array of academic programmes spanning arts, sciences, engineering, and management. Dedicated to delivering top-notch education and cultivating a culture of research and innovation, the university features a sprawling campus and holds a distinguished position for its commitment to excellence in the realm of Indian education. Project overview Confronted with a significant hurdle in the form of a competitor's attendance tracking system for its teaching staff, the university embarked on a quest for a more precise and streamlined method to record daily attendance across its various campuses. The primary goal was to establish a centralised platform dedicated to attendance management, focusing on improving employee access to attendance records and facilitating efficient leave request management. A key consideration was the necessity for a tailored provision to accommodate professors frequently moving A key consideration was the necessity for a tailored provision to accommodate professors frequently moving across campuses for lecture commitments. This case study explores the university's journey in pursuit of a robust attendance management solution catering to 3000 users, addressing specific challenges and optimising operational efficiency. University challenges The university encountered significant challenges in ensuring the smooth operation of its Attendance Management System, including: Inefficiency in the Existing Attendance Management Solution: The university grappled with issues stemming from an ineffective competitor's attendance management system, adding complexity rather than facilitating streamlined operations. This inefficiency extended to the complexities of managing attendance across diverse faculties, further complicating university-level payroll processing. Inconsistencies in Daily Attendance Recording for Teaching Staff: A crucial necessity for the university was the seamless daily recording of professors' attendance. The imperative for a well-organised system became evident to ensure accurate tracking and efficient payroll management. Lack of Proper Attendance Management Across Multiple Campuses: With campuses spread across different locations, the university faced the pressing need to centralise attendance data. This centralisation was crucial for the effective management of attendance records across all campus locations. Delayed Data Transmission from Devices: The existing solution encountered difficulties as punch data from devices experienced delays in reaching the system promptly. This lag resulted in complications, necessitating manual synchronization efforts to rectify the issue. Employee Accessibility Issues for Attendance Data and Leave Management: Staff members encountered limitations in accessing their attendance data through the current system. Furthermore, the absence of support for submitting leave requests contributed to inefficient leave management practices, prompting a demand for more effective solutions. Faced with these operational challenges, the university embarked on a quest for innovative solutions to improve its attendance management processes' overall efficiency and effectiveness. Matrix's solution To address the critical issues faced by the client, Matrix successfully implemented a comprehensive solution that effectively resolved the organisational challenges they were encountering. Matrix executed its Attendance Management System to achieve: Deployment of a Comprehensive Attendance Management System: Matrix effectively implemented an enterprise-grade Time-Attendance Solution, successfully tackling the client's organisational hurdles in attendance management. This solution streamlined the entire attendance process, simplifying complexities across various campuses. Seamless Attendance Recording for Teaching Staff: Matrix introduced biometric devices across different faculties, enabling effortless attendance logging for teaching staff. The widespread availability of devices ensured accurate tracking and efficient payroll management. Centralised Attendance Management Across Multiple Campuses: Matrix established a centralised solution for attendance management, consolidating data from various campuses. This centralised approach facilitated effective control and oversight of attendance across diverse locations. Automated Data Transmission from Devices: Matrix Time-Attendance terminals were equipped with automated data push technology. This feature ensured timely and automated data transfer from devices to the server, eliminating the need for manual synchronisation and enhancing operational efficiency. User-Friendly Employee Self-Service Portal: Matrix provided a comprehensive solution, including an Employee Self-Service portal. This portal enabled users to access attendance data on their devices and submit leave requests. With its hierarchy-based approval system, Matrix streamlined the leave management process. Improved efficiency The innovative solutions offered by Matrix not only resolved the client's challenges but also significantly enhanced attendance operations, promoting improved efficiency throughout the organisation. This case study highlights Matrix's capability to tailor solutions to meet unique client needs, ultimately optimising business processes. Results acheived Matrix successfully streamlined the entire process, introducing clarity in payroll processing and simplifying attendance Matrix's deployment of its Enterprise-grade Time-Attendance Solution brought about a remarkable transformation in the operations of the historic university based in Vadodara. Confronting challenges posed by an inefficient attendance management system, Matrix successfully streamlined the entire process, introducing clarity in payroll processing and simplifying attendance tracking across diverse faculties. The use of Matrix biometric devices facilitated seamless attendance marking for teaching staff, contributing to efficient payroll management. Centralised attendance management The implementation of a centralised attendance management system across multiple campuses significantly improved control and efficiency in handling attendance data. Matrix addressed delays in data transmission by deploying terminals equipped with automated data push technology, eliminating the need for manual synchronisation. Employee Self-Service Portal Matrix's provision of a hierarchy-based approval system streamlined the client’s leave management requirements Furthermore, the implementation included a user-friendly Employee Self-Service Portal, allowing staff to effortlessly view attendance data and submit leave requests. Matrix's provision of a hierarchy-based approval system streamlined the client’s leave management requirements. These tailored solutions markedly enhanced operational efficiency, resulting in a more streamlined, accurate, and transparent organisational operation. Matrix's success in optimising attendance processes underscores its commitment to delivering innovative solutions tailored to the unique requirements of its clients. Products offered COSEC VEGA FOT: Fingerprint and RFID card-based Time-Attendance Terminal COSEC CENTRA PLT: Platform-based User Licence COSEC CENTRA TAM: User Licence for Time-Attendance Management COSEC CENTRA ESS: User Licence for Employee Self-Service Management
IDEMIA has been selected by ACSA to implement its solution in South Africa’s three main international airports: OR Tambo, Cape Town, and King Shaka including the border clearance process using the latest e-Gates technologies. Interconnected with all the major airlines in the world, South Africa is a key country when it comes to air transportation in Africa. ID2Travel The four-year project started in October 2023 and will be deployed in three phases. As soon as 2026, nine South African airports will be equipped with IDEMIA’s end-to-end PFF solution: ID2Travel. IDEMIA’s win was made possible by the long-standing relationship with South Africa and in particular the successful implementation of the ABIS program with the Department of Home Affairs (DHA). Biometric solutions IDEMIA’s expertise and solutions regarding its biometric technologies, combine efficiency, accuracy, and equity The biometric solutions deployed in these airports (three international and six domestic) will enhance the quality of services offered to passengers all along their journey, from the check-in to the boarding of the plane. IDEMIA’s expertise in biometrics, repeatedly recognised in industry rankings, enables it to offer advanced fingerprint, facial, and iris biometric technologies that enhance passenger security while making their experience more seamless. The National Institute of Standards and Technology (NIST) latest test results underscore IDEMIA’s outstanding expertise and solutions regarding its biometric technologies, combining efficiency, accuracy, and equity. Facial recognition technology This partnership with ACSA builds on IDEMIA’s long-standing expertise in equipping world-class airports around the globe with its cutting-edge technologies. From Singapore’s Changi airport, which facilitates passenger flow from baggage check-in to boarding the plane, to India’s Delhi, Hyderabad, and Goa airports where facial recognition technology verifies the identity of domestic flyers, to trials at Lyon-Saint Exupéry and Paris-Orly (France), IDEMIA’s solutions are proven to be highly accurate, thereby offering the best security and an efficient and smooth passenger journey. Passenger facilitation solution This new solution will offer our passengers a seamless, unique, and secure new airport experience" "We are thrilled to be launching a new passenger facilitation solution at our nine ACSA airports, and for the first time in Southern Africa. Based on biometrics, airport processes will be automated using state-of-the-art technology from our partner IDEMIA," said Mthoko Mncwabe, Chief Information Officer, ACSA. "This new solution, which we are currently deploying in our airports, will offer our passengers a seamless, unique, and secure new airport experience. In line with our Sustain, Grow, and Digitise strategy, this solution positions ACSA as the pioneering airport management services company in Africa." Safe and smooth passenger experience "We are delighted to have been awarded this landmark contract for IDEMIA in Africa, which demonstrates the competitiveness and quality of the solutions that we provide to our clients worldwide," said Matt Cole, IDEMIA Executive Vice President of Public Security and Identity. "We are looking forward to working with ACSA on this historic and ambitious partnership, which will ultimately ensure a safer and smoother passenger experience at these nine South African airports."
On the occasion of INTERPOL’s 91st General Assembly – and 100th anniversary – the world’s largest international police organisation announces the launch of its enhanced BioHUB, powered by IDEMIA’s newest Multibiometric Identification System (MBIS). Multibiometric Identification System This latest version, MBIS 5, integrates new generation algorithms, which provide a higher matching accuracy rate with a shorter response time and a more user-friendly interface. The first phase of its deployment to enhance the identification of potential Persons of Interest (POIs) for police investigations has already been operational since October 2023. The second phase, which will be rolled out over the next two years, will extend this tool to border control points. The system will then be able to perform up to 1 million forensic searches per day, including fingerprints, palm prints and portraits, making it the top performing automated biometric identification system on the market. Cutting-edge technology to help law enforcement IDEMIA still leads the biometric tech race covering iris, fingerprint and face recognition IDEMIA’s commitment to excellence is reflected in its consistently top-ranked identity and security technologies. IDEMIA still leads the biometric tech race covering iris, fingerprint and face recognition. NIST’s (National Institute of Standards and Technology) latest test results underscore IDEMIA’s outstanding expertise and solutions combining efficiency, accuracy and equity. INTERPOL, creating a safer world INTERPOL currently has 196 member countries and enables law enforcement agencies from around the world to work together to make the world a safer place. INTERPOL’s high-tech infrastructure of technical and operational support helps meet the growing challenge of combating crime in the 21st century. Facial recognition is an important and rapidly evolving technology that has opened up many new opportunities to identify individuals and solve crimes. In 2016, INTERPOL opted for IDEMIA’s advanced facial recognition capabilities to create the INTERPOL Face Recognition System (IFRS). INTERPOL Face Recognition System (IFRS) The IFRS contains face images from more than 170 countries, and since its launch, thousands of terrorists, criminals, fugitives, POIs, and missing persons have been identified. In 2019, INTERPOL renewed its contract with IDEMIA to upgrade the current system and transform it into a Multibiometric Identification System (MBIS). IDEMIA and INTERPOL first began their collaboration in 1999, when IDEMIA delivered the original Automated Fingerprint Identification System (AFIS). Automated Fingerprint Identification System (AFIS) AFIS was designed to make cooperation easier between police forces from member countries The Automated Fingerprint Identification System (AFIS) was designed to make cooperation easier between police forces from member countries, by giving them access to global police tools and services, namely forensics, fingerprint evidence and the exchange of forensic data to support international investigations. Through AFIS, authorised users in member countries can view, submit, and cross-check these records using INTERPOL’s secure global police communications network. IDEMIA and INTERPOL share enhanced partnership Cyril Gout, INTERPOL’s Director of Operational Support and Analysis, said “In the same way that criminals use ever more innovative and sophisticated ways to avoid detection, law enforcement must also leverage the latest advances in technology, especially in biometric security, to better combat all forms of transnational crime. INTERPOL’s enhanced partnership with IDEMIA will further help our member countries better protect their borders and communities.” Matt Cole, Group Executive Vice President, Public Security and Identity at IDEMIA, said “IDEMIA is proud to be collaborating with INTERPOL again and to continue making the world a safer place for all. This project reinforces our longstanding partnership with INTERPOL, which has been going strong for over 20 years.” INTERPOL receives delivery of the new MBIS Matt Cole adds, “With the delivery of the new MBIS, developed thanks to our strong dedication to R&D, INTERPOL will have access to cutting-edge fingerprint, palm print and face identification technologies, enabling it and member countries to identify persons of interest faster than ever before.” He continues, “We look forward to many more years of supporting INTERPOL to ensure the safety of potentially billions of citizens around the world.”
Round table discussion
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?
It’s safe to say there has been more change in the workplace in the last two years than ever before. Driven by the pandemic, technology has both allowed greater flexibility for employees and enabled continuing prosperity for many companies that otherwise would have had to cease operation. But have security protocols and practices done enough to enable companies to keep pace with the changes? We asked this week’s Expert Panel Roundtable: Have security protocols and practices kept up with the changing ways people work?
Products
Videos
Fingerprint recognition: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download