Fingerprint scanner
Verifying identities and conducting criminal background checks in the field has traditionally been one of the most time-consuming tasks for law enforcement officers. Real-time mobile biometrics In the past, this often required detaining individuals and transporting them to a station for fingerprint identification. Forward-thinking agencies like the Florida Department of Law Enforcement (FDLE) are tapping into highly accurate, real-time mobile biometric technology — Rapid ID — tran...
Sentry Enterprises, an industry pioneer in decentralised identity and biometric security solutions, proudly announces the launch of SentryCard360—a groundbreaking innovation addressing the escalating risks of employee identity fraud, including the rise of new hire "bait & switch" schemes. In collaboration with Info Security pioneer, Credenti, and biometric identity pioneer, PrivateID. SentryCard360 SentryCard is already recognised for its industry-pioneering security features, includ...
IDEMIA Public Security North America, the global provider of convenient and trusted biometric-based solutions, including physical and digital secure credentialing in the U.S, is partnering with My Family ID to bring families an easy way to capture important identification information for their children, including a photo and fingerprints, through the My Family ID app. As the first-ever digital fingerprint scanner and child safety profile for smartphones, the My Family ID app serves as an import...
Fingerprint Cards AB (Fingerprints™) unveils FPC AllKey, its new biometric system for logical and physical access control. The solution has been designed to enable fast and seamless integration into devices and to bring smooth, secure authentication to use cases including peripherals, cryptocurrency wallets, residential or workplace smart door locks, FIDO authenticator tokens, padlocks, and more. Biometric system The biometric system includes all components needed – hardware, soft...
With immediate effect, netfiles GmbH, a provider of virtual data rooms and highly secure data exchange solutions, is adopting passkey authentication as an additional and convenient option to log in. Thanks to passkeys, users no longer have to remember passwords and can keep their user accounts reliably protected against phishing and cyber-attacks. It has long been understood that logging in with a password is a not particularly secure way of accessing applications, websites and online shops. Wh...
Matrix is excited to present its security products and solutions at Hotel Le Méridien, New Delhi, during the 5th edition of Rail and Metro Technology Conclave, 2024. Network cameras Matrix is the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways. Matrix network cameras have been certified by the STQC, Delhi lab for adhering to the OWASP ASVS 4.0 L2 standards required by RDSO for cybersecurity compliance. Cybersecurity compliance Ma...
News
An ideal manufacturing workshop features continuous monitoring of all machines and processes, offering a comprehensive view of the production line. This visualisation transforms complex data into easy-to-understand visuals, enabling quicker decision-making and proactive issue resolution. With full visibility, businesses can gain deeper insights into their operations, streamline processes, and enhance overall productivity. Production efficiency Here are three ways production line visualisation can significantly enhance production efficiency: 1. Efficient remote AR inspection Using video and AR technology, inspections are faster by streamlining equipment and production evaluations and eliminating time-consuming manual paper forms. An AR map simultaneously provides a comprehensive view of the entire workshop and specific details through picture-in-picture mode. Clicking on a specific point within the live feed reveals detailed information, enabling a more intuitive view and immediate issue responses, thus preventing disruptions. Proactive and seamless approach Moreover, the entire process is managed online, from scheduling to regular video inspections, with tasks promptly assigned to maintenance personnel. This ensures a proactive and seamless approach to monitoring, alarm handling, maintenance, and quality assurance. 2. Clear video tracing for production ramp-up analysis Output scaling from 100 to 10,000 units requires careful analysis to identify optimisation opportunities Operators often struggle with equipment malfunctions in production lines, necessitating video playback for diagnostics. This process can be time-consuming due to unclear images or difficulties locating the video feed. Moreover, in fast-paced industries like electronics, setting up a new production line involves a capacity ramp-up. For instance, output scaling from 100 to 10,000 units requires careful analysis to identify optimisation opportunities and improve line capacity. This also necessitates quick and clear video tracing. Specialised production line cameras are invaluable in these scenarios. Production improvement features Unlike traditional models, their compact, industrial design and variable zoom make them perfect for different assembly lines, even in tight spaces. These cameras capture fast-moving processes at high frame rates and offer slow-motion playback for detailed analysis. When integrated with third-party systems like PLCs or barcode scanners, they quickly locate video feeds, aiding in rapid issue identification, equipment diagnostics, and production improvements. 3. Real-time video viewing with rapid response In production lines, having real-time visibility of various parts is crucial. Imagine working in one area and needing to see what’s happening in another instantly. Relaying messages between people can waste time and lead to mistakes. HDMI cameras connected directly to screens offer real-time high-definition, low-latency live feeds, allowing workers to assess conditions quickly and accurately. Use of AR With instant alerts directly on the AR screen, they can swiftly pinpoint and resolve issues on-site Enhanced by AR, these live feeds display vital data such as production metrics, safety updates, and equipment statuses. This integration empowers operators to oversee operations efficiently. For instance, when a production line halts unexpectedly, operators traditionally call personnel for investigation. With instant alerts directly on the AR screen, they can swiftly pinpoint and resolve issues onsite. Discover Hikvision’s production line visualisation solution Hikvision combines AR technology, specialised cameras, and centralised management software to strengthen the connection between production line operations and management. This approach enhances situational awareness and efficiency, creating a safer and more productive work environment. Specialised cameras Explosion-proof cameras ensure safety in flammable environments, and air-cooled withstand high temperatures To meet diverse production line needs, Hikvision offers various specialised cameras. High-frame-rate cameras capture rapid movements on fast-moving conveyor belts, while vibration-resistant cameras provide stable footage for overhead cranes. Macro cameras with auto-focus lenses deliver detailed close-ups, while separated covert cameras fit confined spaces. Explosion-proof cameras ensure safety in flammable environments, and air-cooled or water-cooled cameras withstand high temperatures. Visualisation solutions By implementing Hikvision’s visualisation solutions, enterprises can boost production efficiency and management, gaining a competitive edge in the market. Embracing advanced technologies fosters intelligent and efficient production management, paving the way for future growth.
Integrity360, one of the pan-European cyber security specialists announced its partnership with Darktrace which will see Integrity360 act as a reseller for Darktrace’s entire portfolio of IT/OT services and initially offer the Darktrace/DETECT and RESPOND/Network™ solutions as part of its Managed Detection and Response (MDR) offering. Darktrace/DETECT and RESPOND provide threat detection and autonomous response capabilities to address the burgeoning attack surface across the extended perimeter. Darktrace ActiveAI Security Platform™ Under the terms of the agreement, Integrity360 will act as a channel partner offering the entirety of the Darktrace ActiveAI Security Platform™, including its AI-powered solutions: PREVENT, DETECT, RESPOND, and HEAL with the DETECT and RESPOND Network services also available as part of Integrity360’s MDR offering. The managed service will see DETECT and RESPOND telemetry data fed into Integrity360’s SOCs The managed service will see DETECT and RESPOND telemetry data fed into Integrity360’s Security Operations Centres (SOCs) and supplemented with support services. Integrity360 plans to add the Darktrace/OT offering integrated with MDR later in 2024, consolidating Integrity360’s reputation as a pioneering MDR provider. Darktrace DETECT Darktrace DETECT is the company’s flagship Network Detection and Response (NDR) offering and gathers data from proprietary hardware, virtual sensors, and endpoint sensors as well as data from other endpoint and infrastructure security solutions. It utilises Darktrace’s unique Self-Learning AI engine and can enhance its analytics by leveraging third-party APIs. There are no prerequisites for the NDR solution, such as a SIEM or firewall, which has previously been a barrier to some of those organisations looking to procure the technology. RESPOND is an automated response solution available alongside DETECT that can take autonomous action to disrupt an attack. Darktrace’s Self-Learning AI Darktrace’s AI learns from native and 3rd party sources to understand the unique digital fingerprint of a business The heart of Darktrace DETECT + RESPOND/Network is Darktrace’s Self-Learning AI, which features multiple types of AI, including supervised and unsupervised machine learning techniques, Bayesian probabilistic methods, LLMs, and hundreds of behavioural models to learn an organisation in real-time from the inside out. Wherever it is deployed, Darktrace’s AI learns from native and 3rd party sources to understand the unique digital fingerprint of a business which means it can spot when something is out of character. This approach empowers organisations to spot unknown unknowns. Advanced managed service Integrity360’s MDR is unique in the market in that it enables customers to select the right combination of XDR, SIEM, EDR, and NDR technologies for them, depending upon the size of the organisation, its risk profile, and compliance requirements. The Darktrace technologies will be offered across three incrementally advanced managed service tiers: Managed Platform – an entry-level offering for those looking for an optimally implemented, monitored, and managed NDR platform with alert forwarding Managed Threat Detection – adds SOAR integration, threat intelligence enrichment, alert triage, incident investigation and notification, and ongoing alert tuning Managed Detection and Response – add response and containment, proactive threat hunting, and threat intelligence reporting Comprehensive assessment Delivery of the Integrity360 Darktrace MDR Services involves a comprehensive assessment Delivery of the Integrity360 Darktrace MDR Services involves a comprehensive assessment of the organisation’s architecture and appliances before Darktrace sensors are strategically placed across the network. The sensors continuously collect metadata which is fed into the Darktrace platform where the detection engine uses advanced behavioural modelling techniques powered by ML and AI-driven threat-hunting algorithms. All telemetry is then analysed in a SOAR and alerts are passed to the Integrity360 SOC team who have complete visibility of the environment by the Darktrace Threat Visualizer console and can advise upon incident management and compliance reporting. Real-time visibility “Security teams are struggling to monitor increasingly complex environments and adhere to compliance frameworks amid the noise of alerts,” states Brian Martin, Director of Product Management, Integrity360. "NDR can facilitate rapid detection across these networks, giving real-time visibility into attack paths associated with ransomware, supply chain attacks, crypto-mining, and insider threats, for instance." Extra service layer Key markets for DETECT and RESPOND include large enterprises, critical national infrastructure "At the same time, autonomous response can help arrest the attack. But organisations don’t necessarily know what to do with that telemetry. That’s where MDR comes in, providing that extra service layer over the technology to meet investigative and compliance demands." "It’s a value add that turns a useful solution into an indispensable one." Key markets for DETECT and RESPOND include large enterprises, critical national infrastructure, and associated industries, highly regulated sectors subject to strict compliance mandates, and those with high-value or sensitive data sets. Vital, proactive, defence "We are thrilled to partner with Integrity360, to help strengthen their MDR offering and expand the protection Integrity360 offers," said Eloina Pesce, VP of Channel, EMEA at Darktrace. “Darktrace’s Self-Learning AI Engine, combined with Integrity360’s deep cybersecurity expertise and support services can provide a vital, proactive, defence to customers no matter how complex their environment. We look forward to extending our partnership.”
In collaboration with key partner Trinet Technologies Pte Ltd, Anviz organised two successful roadshow events. Both events brought together more than 30 industry experts who showed great enthusiasm for Anviz's business model of user scenario-driven solutions and interest in the new features of the product. Need for Southeast Asian Markets: RCEP Brings New Opportunities, Largest Incremental Market in the World As the largest FTA in the world, which will lead the development of global free trade, RCEP will also drive the Southeast Asian region to embrace better development opportunities. Anviz believes that at this time, the Southeast Asian market needs to be more mature high-tech, and innovative security solutions for ASEAN to become the world's largest incremental market escort. Product showcase Face Deep 5 - With the verification of over one million faces around the world, the Anviz face recognition series has become one of the most accurate face recognition terminals suitable for various environments and conditions. Anviz's BioNANO face algorithm accurately recognises faces from different countries and recognises faces in masks, glasses, long hair, beards, etc., with a recognition rate of over 99%. CrossChex Cloud - As a Cloud-based Time & Attendance Management System, it is dedicated to providing an efficient and convenient employee time management service tailored to save businesses' resource costs. It is super fast to set up and easy to use, no software is needed. Whenever there is an Internet connection, it can be used without any web browser limitation. C2 Series - Being a biometric and RFID card access control and time and attendance system based on Anviz's advanced technology, it provides multiple employee clocking methods for easy access. Anviz Artificial Intelligence Fake Fingerprint Recognition System (AFFD) brings together AI and Deep Learning technology to recognise and set off alarms in 0.5 seconds with 99.99% accuracy. Anviz biometric card technology stores biometric data on the user's personal RFID card and provides one-to-one matching of the data for a combination of security and convenience. VF 30 Pro - New generation standalone fingerprint and smart card access control terminal with flexible POE and WIFI communication. It also supports web server functions to ensure easy self-management and a professional standalone access control interface, providing users with lower installation costs, simpler configuration, and lower maintenance costs. New security products and solutions Said Cai Yanfeng, Business Development Manager at Anviz, "Anviz is committed to delivering simple, integrated solutions including cloud and AIOT-based smart access control, time and attendance, and video surveillance solutions for a smarter, safer world." "In the Southeast Asian market, we will maintain this same dedication to providing new security products and solutions for the sustainable future of local businesses." Live Event Feedback Successful Roadshow event got the industry fellows jointly for face-to-face trade contact The successful Roadshow event brought the industry partners together for face-to-face business communication, discussing Anviz's latest products and technologies, with a strong interest in cooperation projects. One of the attendees said, "In the competitive and challenging industry environment, it's great to see that Anviz can keep up with the pressure to deliver surprising innovations. In the following cooperation process, we will also keep on investing in a positive attitude to develop this market which is full of potential together with Anviz." A future of opportunities and challenges In Southeast Asia, an emerging market, with the popularity of the Internet, local business security awareness, and security product scene awareness in place, the participants in the existing market are also pushing the spread of security products. The larger market also means that more competition lurks, which makes it even more important for us to do long-term brand-building and product planning. Technical Sales Manager of Anviz, Dhiraj H said, "We will get the long-term planning done on brand building and product hard power enhancement to keep pace with the industry trends. It will also continue to make progress with our partners, face the market challenges head-on, and make a complete eco-service."
IDEMIA Public Security North America, the biometrics solutions pioneer for law enforcement agencies, announced that it has implemented its cloud-native, fully functional Automated Biometric Identification System, STORM ABIS, in Volusia County, Florida to support its latent print unit. The Volusia Sheriff’s Office is the first law enforcement agency in the nation implementing a cloud-native ABIS that can search county, state, and federal databases from a single application. Volusia County, which is located in the east-central part of Florida, is home to over 579,000 citizens. Biometric matching algorithms Designed by latent print aces for latent print examiners, STORM ABIS users work efficiently With over 40 years of experience working alongside the world’s pioneering law enforcement agencies, IDEMIA understands the technology that latent print units need. Designed by latent print experts for latent print examiners, STORM ABIS users work efficiently to upload, encode, search, and compare latent prints. As the industry’s first cloud-native ABIS, each Latent Print Examiner can log into STORM ABIS from wherever they are, securely and conveniently through a web browser to access state-of-the-art biometric matching algorithms. It supports local and national searches with tools for analysis, comparison, and case management, so users don’t have to log onto different systems. Latent print casework Independent testing from the National Institute of Standards and Technology (NIST) showed that IDEMIA has the most accurate latent print search algorithms, and the Volusia Sheriff’s Office has seen incredible benefits with this technology. The Latent Print Unit typically handles latent print casework for 15-16 different agencies, and STORM ABIS has helped increase efficiency and allowed examiners to complete more cases. STORM ABIS has helped increase efficiency and allowed examiners to complete more cases “The ease of use stands out for us. We prepare the images for a case, upload it to STORM ABIS, and then run searches for the case. With its capabilities, we’ve gone from handling 5 cases a week (per examiner) to 8-15 cases per week! We can now also send searches at the local, state, or federal level at the same time within one application,” Lindsay Jones, CLPE, Supervisor of the Latent Print Unit. Partner with the Volusia Sheriff’s Office “We’re honoured to partner with the Volusia Sheriff’s Office and help streamline their processes and further their goals to keep their communities safe. It’s exciting to see the benefits they are already seeing, and to see how they will use the technology to expand their capabilities not only at the local level, but for state and federal cases,” Casey Mayfield, SVP, Justice & Public Safety, IDEMIA Public Security North America. “The IDEMIA team has been with us every step of the way, and we’ve loved working with them. The team is knowledgeable and transparent about what we can do with their technology, we’re looking forward to continuing to collaborate with them in the future,” Lindsay Jones.
Money Carer, a UK-based national social enterprise focused on providing secure money management services for vulnerable people, has partnered with global card manufacturer Tag Systems and biometrics company Fingerprint Cards AB (Fingerprints™). The companies have created and launched a biometric-enabled ‘carer card’, addressing barriers that have traditionally restricted vulnerable people in the UK from accessing financial services. Carer card In 2010, Money Carer invented and launched the first ‘carer card’, a secure shopping card solution that enables carers to make purchases for those they care for. The card system has since evolved, offering balance limits, a sweep system, free ATM withdrawals, and spending controls. The Money Carer Card supports hundreds of care providers and thousands of individual carers across the UK and is also used by many local authorities and law firms who are responsible for managing the finances of their vulnerable clients. PIN for authentication Vulnerable cardholders, or their carers, no longer need to remember and enter a PIN Before incorporating Fingerprints’ technology, the Money Carer Card relied on the PIN as a means of authentication. Vulnerable cardholders, or their carers, no longer need to remember and enter a PIN to make a payment. They simply place their selected thumb or finger on the sensor and tap to make the payment at the point of sale. This simultaneously simplifies the checkout process while enhancing security. Inclusivity and autonomy Sean Tyrer, CEO of Money Carer, comments, “At Money Carer, we are committed to promoting inclusivity and autonomy." "For many of our clients, especially those with memory or visual impairments, the PIN on a payment card is a barrier that restricts financial inclusivity. With biometrics, our clients will never have to remember or input a PIN again, opening doors to financial autonomy that were previously closed.” T-Shape® (T2) sensor module BCaaS allows Money Carer to issue the next generation of cards seamlessly The next-generation carer cards come from Tag Systems, which incorporate Fingerprints’ second-generation T-Shape® (T2) sensor module, software platform, and algorithm. Tag’s unique Biometric Card as a Service (BCaaS) offering which includes payment processing, allows Money Carer to issue the next generation of cards seamlessly. The cards will be available soon through the Money Carer website and app. For each account with Money Carer, up to five biometrics-enabled cards can be issued. Simple authentication Adam Philpott, CEO of Fingerprints, comments, “Our primary objective at Fingerprints has always been to make strong authentication simple." "We’re extremely proud to be part of a project directly addressing barriers that have traditionally restricted vulnerable people from accessing financial services. This is a perfect example of how technology can be used to drive inclusivity.”
Fingerprint Cards AB has partnered with Lapa Electric, an Indian-based premium electric mobility start-up, to bring the best security to two-wheelers and create India’s first biometric-enabled electric scooter (e-scooter). The use of e-scooters in India has sky-rocketed in recent years, and this growth is expected to continue. In 2023, the penetration rate of e-scooters in India was 13%, yet by 2030 this is projected to grow to 75%. Use of biometrics Adam Philpott, CEO of Fingerprints, comments, “Over the last 10 years, biometrics has become the preferred authentication method for consumers and businesses alike. From our phones, laptops, and payment cards to our homes and workplaces, biometrics is adding security while removing friction." He adds, "As our lives, and our vehicles, become increasingly connected, we must enhance security processes and biometrics is a natural progression to underpin the future of mobility.” Biometric smartness Users won’t have to worry about losing or having their keys stolen anymore as they become the key By replacing traditional physical keys with biometric authentication, only enrolled users will be able to use the e-scooter, drastically reducing the risk of theft. In addition, users won’t have to worry about losing or having their keys stolen anymore as they become the key. Pavan Kumar at Lapa Electric, said, “At Lapa Electric we are on the verge of bringing in a new engineering approach to E two-wheelers like for example replacing heavy steel chassis with weddings and bolts and nuts with light and robust seamless monocoque carbon fiber chassis. Now we’re replacing physical keys with biometric smartness. The resulting scooter embodies premium and performance.” Biometric sensor and algorithm Lapa Electric’s key challenge was to find the smallest sensors that could be integrated into its patented console and throttle system. This is where the engineering collaboration between Fingerprints and Lapa started. Lapa Electric’s e-scooter will integrate Fingerprints’ proven biometric sensor and algorithm. The biometric-enabled e-scooters are presently under vehicle road testing and will be launched in limited numbers by early 2025.
Expert commentary
Residential burglaries and break-ins are a problem for many homeowners. The FBI estimates there were approximately 1,117,696 burglaries in 2019 in the United States, which accounted for 16.1% of property crimes. Having proper home security can not only protect your home and belongings, but it can also keep your family safe. Even if you’re new to the idea of having and using smart home security devices, it’s easy to get started. This guide will provide the information and actionable tips you need to get started with your home security system. Why do I need a home security system? When you have a home security system, you’re able to detect a possible intrusion into your home, even when you’re not there. This detection system may help protect you, your family, and your property from various crimes, including home invasions. Property crime and theft cost Americans billions of dollars each year. Installing and using a home security system can prevent you from becoming a victim. Some homeowner insurance companies also offer customers a discount for installing a security system. Not only will you feel safer and more protected, but you could also save money in the long run. Multi-layered security system New smart security technology makes it easier than ever to monitor your home from almost anywhere Having the right home security keeps you safe, and it’ll also cause criminals to think twice before entering your home. Using the right equipment can prevent these crimes from happening to you in the first place. It’s vital to ensure that you’re using multi-layered security, including alarms, intrusion detection, cameras, and more. New smart security technology makes it easier than ever to monitor your home from almost anywhere in the world. The more barriers you can put in place between your home and potential criminals, the safer you and your family will be. Important equipment for installing a home security system Every home security system needs some fundamental pieces of equipment in order to be effective. Here are the most important items you’ll need to get started: Intrusion detection: This equipment includes the main security panel that allows you to control the system. It can be called the keypad, control panel, or security hub. The panel allows you to make changes or arm and disarm the system as needed. Door and window sensors alert you when someone tries to enter your home, as well as motion sensors that detect any unusual movement. Glass break sensors are another great piece of equipment, they recognise breaking glass, which signals the alarm if someone tries to break a window. Lighting: Even something as simple as bright exterior lighting can keep your home safer. Consider upgrading your outdoor lighting to motion-sensing lights that turn on whenever they detect movement. Add this lighting to the corners of your home, near the garage, and at the front and back doors. Cameras: Security cameras record activity in and around your home. Choose a PTZ or pan-tilt-zoom camera so you can move the camera, zoom in, and adjust it remotely for better footage. Use cameras that store the footage just in case you need to view it or show it to the police later. Some cameras include built-in memory cards, while others require payment for storage on a cloud network. A camera doorbell is another great way to keep you safe. It alerts you and records video when someone approaches your home. Monitoring: If you travel or you’re away from home frequently, enrolling in home security monitoring is a great way to protect your property. It requires a monthly fee, but this service connects to your system and keeps a watchful eye over your home when you’re not there. The authorities and you will be immediately alerted if an alarm goes off or fire is detected. This is a great way to get peace of mind whenever you’re not at home. If you’re unfamiliar with how to install any of your new pieces of security equipment, a professional installer can help. They have the skills and experience required to ensure that every piece of equipment is correctly installed and connected for the best coverage to keep you safe. Secure your Wi-Fi network with strong passwords The longer and more complex your password is, the less likely your network will be hacked by nefarious outsiders Once you have your new smart home security system installed, you’ll need to protect it from hackers. Most Wi-Fi routers aren’t immediately secure upon installation until you change the password. Make sure you’re using a strong password containing a unique mixture of letters, numbers, and symbols. Integrating capital letters will also make it more difficult for hackers to access them. The longer and more complex your password is, the less likely your network will be hacked by nefarious outsiders. It’s also crucial to ensure that your Wi-Fi network and equipment come from a trusted, reputable manufacturer with a long history of providing security to its customers. You should also double-check to see how the manufacturer uses the information it collects and if it’s being given to third parties for marketing or other purposes. Enable multi-factor authentication The term multi-factor authentication refers to the several pieces of information required from a user to access an account. This access method is put in place to protect yourself from possible breaches and verify your identity. This option is usually available with the majority of newer smart home security systems and collects more than just a password. Using multi-factor authentication may require you to scan your fingerprint or retina to ensure it’s really you trying to access the system. It may also ask for things like a numeric passcode or have you answer a security question. If this option is available to you, it’s highly recommended that you set it up. This simple additional step will help to prevent cybercriminals from trying to use your user credentials and access your profile. It’s also a great way to protect yourself from potential data breaches. Regularly update your devices Set a reminder to check the manufacturer’s website every month or so to confirm there are new updates ready Just like your smartphone or computer, your smart home security devices should be updated regularly. These new updates provide improvements to the usability of your equipment, better protection against hackers, and new hardware updates that help the equipment run smoother. Some devices will alert you when an update is available, and others won’t. Set a reminder to check the manufacturer’s website every month or so to confirm there are new updates ready. You should also pair your mobile app to your security devices and adjust the settings to turn on automatic software updates so you never miss anything. This is the best way to ensure you have all of the latest hardware upgrades and security patches. Keeping the home and family safe Use these important tips if you’re just beginning the process of installing a home security system. With the right equipment and proper protections in place, you can keep your home and family safe. Remember to install the most essential equipment, use unique passwords, and take steps to ensure that your new software and equipment are as secure as possible for peace of mind.
The growing mobile ownership rate, the emergence of more user-friendly banking apps, the tech-native younger generation, and, of late, the pandemic-induced shift to online, all create a fertile ground for mobile banking. Unfortunately, the acceleration of banking app adoption today goes hand in hand with the increase of targeted security threats. In 2022, a month wouldn’t go by without a headline-making mobile banking attack or incident that resulted in stolen funds and sensitive personal information from thousands of users. Security as an afterthought Nevertheless, a fair share of BFSI companies persists to treat security as an afterthought during and after mobile banking app development. The 2021 State of Mobile Banking App Security report shows that 82% of enterprise executives consider mobile channels important. However, 39% of respondents did not run any vulnerability analysis or penetration tests on their mobile solutions. Five-step guide Neglecting a banking app’s security is a dead-end track that leads to severe financial repercussions In the turbulent threat landscape of today, neglecting your banking application’s security is a dead-end track that leads only to severe financial and reputational repercussions. Being banking software developers with a long-standing experience in cybersecurity, we devised a five-step guide to help financial institutions build shell-proof mobile banking apps, maintain them this way, and safeguard customers from mobile security troubles. #1: Test security throughout SDLC and beyond The safety of mobile banking is a subject of many regional and industrial standards, so companies traditionally design the security architecture of their apps around these guidelines and call it a day. While regulatory compliance is vital, financial institutions often mistakenly bank on it alone and perform security-related activities late in the SDLC. As a result, there is a good chance pre-release quality assurance (QA) can discover deeply ingrained security flaws that will require fundamental corrections. What’s even worse, if the QA fails to do so, the app will be released with inherent vulnerabilities. Threat modeling Engineers should not only implement security controls into the source code but also review it for bugs and flaws The best way to make an app safe by design is to integrate security testing into the development lifecycle. At the start of the project, the team needs to explore relevant external and internal threats and, drawing on the analysis, specify security requirements for the application alongside functional and performance ones. At the design stage, it’s a great practice to perform threat modeling, as it allows developers to understand which elements of the app require protection most and what security controls will fit the purpose. Also, during the application development, engineers should not only implement security controls into the source code but also review it for bugs and flaws at each iteration. Thus, all vulnerabilities are rooted out immediately, before the app goes to production. #2: Implement a strong authentication layer Access control is the foundation of security, and mobile banking is no exception. By equipping an app with a proper authentication mechanism, banks ensure that only the customer is allowed to view and manage their personal funds, while third parties, malicious and not, are kept out, thus eliminating the risk of unauthorised access. Despite remaining a predominant user authentication method, passwords have long been showing their insufficiency in the modern threat landscape. Two-factor or biometric authentication Relying on physiological human characteristics to identify a person is highly accurate and spoof-proof Two-factor authentication, on the other hand, has many uses in the financial industry, and app user verification is one of them. Requiring two separate forms of identification, commonly a password and a single-use code sent via SMS, push notification, or email is still a much stronger secure option than passwords. Biometric identification is an authentication technology that gained traction only recently, but its efficiency propelled its adoption as a verification method in mobile apps across industries, with finance leading the way. Relying on physiological human characteristics, such as fingerprints, facial features, voice, or iris to identify a person, the technology is highly accurate and spoof-proof. #3: Encrypt user data and communications Financial institutions are no strangers to encryption. Most banks today leverage the virtually unbreakable 256-bit advanced encryption standard (AES) or equivalent methods to make customers’ personal and payment information inaccessible to unauthorised parties. Needless to say, a mobile banking app should incorporate similarly robust encryption mechanisms to protect user data. It can be the customary AES, but it can also be another encryption technology that fits the app’s specifics better. Transport Layer Security protocol It’s necessary to bake in specialised encryption mechanisms for securing app-to-device communication It is also important to secure the traffic between the app and the server, and the Transport Layer Security protocol (TLS) fits the bill here. Things can get more challenging if you plan on integrating your mobile app with wireless BLE and IoT technologies for proximity-based marketing, in-branch experience personalisation, and wayfinding. In this case, it’s necessary to bake in specialised encryption mechanisms for securing app-to-device communication and ward off man-in-the-middle attacks. # 4: Integrate in-app protection In recent years, due to the growth of malware targeting applications, bank customers were increasingly plagued with malicious software of all stripes. Of course, these days, there is strict oversight over financial cybercrime, and specialised law enforcement together with private-sector IT specialists usually take prompt measures to disarm emerging malware. Nevertheless, considering the steadily growing adoption of mobile banking, malicious software targeted at new apps will continue surfacing monthly while the existing scripts will be upgraded to circumvent dedicated safeguards. In-app protection By relying on in-app protection, banks can efficiently shield their app from emerging attacks To be a step ahead of the attackers, financial institutions need to embrace a more comprehensive approach and consider bolstering source-code security controls with robust in-app protection features. Designed by cybersecurity tech companies, in-app protection is a set of tools that can be easily integrated into an application. These solutions typically include mechanisms for security monitoring and malware detection, network connection manipulation, and external tampering that vendors update on a regular basis. Thus, by relying on in-app protection, banks can efficiently shield their app from emerging attacks. #5: Raise customers’ security awareness Regrettably, after the release, your mobile banking app’s security is not completely in your hands. Users' poor choices can easily obliterate all the efforts towards building and maintaining the solution impregnable. Some can turn off biometric authentication if they see no point in it, while others can click on a phishing link because it is sent from a domain looking just like yours. Hence, it’s not enough to deliver a highly protected mobile banking solution, you should also teach users how to render their app experience safe. Security education Banks need to educate their customers about the benefits and dangers of trusting third parties with app credentials First and foremost, banks need to educate their customers about good mobile banking security habits, from the importance of strong passwords and the benefits of two-factor or biometric authentication to the dangers of trusting third parties with app credentials and using public networks when conducting financial operations. However, banks should present this information in a detailed but engaging way, for example through short posts or animated videos, otherwise, there are a high chance customers will not bother to pay heed to it. Stay alert to stay secure Over the recent years, mobile banking has burgeoned, but with this growth came a whole new set of threats, exploiting apps’ inherent vulnerabilities, loose security controls, and customer unawareness, with the burden of warding them off falling on their owners. The battle for mobile banking security is ongoing, and to win it, banks need to respect security basics while also remaining open and flexible regarding emerging security tech.
Fingerprint biometrics is hugely relevant in the current landscape. Even amidst other newer developments, fingerprint authentication provides convenience and affordability. There are talks rife about how the coronavirus pandemic has changed the outlook towards fingerprint biometrics. What is currently the most used authentication technology is being speculated to be unsafe, when compared to other touchless biometrics and that its usage in the future would decrease significantly. However, the advancements being made in this sphere indicate a totally opposite view. Key takeaways The utility of fingerprint biometrics, The advancements being made in fingerprint authentication tech, and The future relevance of fingerprint biometrics. Fingerprint biometrics and its use in authentication Out of all the biometric identifiers, fingerprints have been in use the longest, probably from around the 1800s When biometric authentication had started getting attention, at the beginning of the millennium, it broke the barriers of people’s beliefs that such technology only existed in sci-fi movies. A world of opportunities had opened up for tech developers and manufacturers, and everyone wanted a piece of that cake. Out of all the biometric identifiers, fingerprints have been in use the longest, probably from around the 1800s. Newer biometrics, such as facial & iris recognition and retinal scans, were only possible once technological advances made devices that could process these identifiers. High security fingerprint recognition devices Any technological advancement depends on the development of all the sub-systems it operates with. Therefore, developing fingerprint authentication wouldn’t have been possible, without having faster fingerprint processors, thinner and more compact sensors, and more accurate and efficient firmware and algorithms. Today’s fingerprint recognition devices are more secure than their previous generations, which is why they are still widely used for authentication. As the situations and utility factors become more complex, this technology will surely continue to improve. Ongoing developments in fingerprint technology Normally, a fingerprint is obtained by scanning the surface of the skin. The efficiency of the scanner plays an important role here, where if the fingerprint isn’t clear (the finger is dusty, soiled, has cracks, is damaged), it won’t be scanned correctly and hence, won’t be authenticated. Many manufacturers have tried to neutralise this, by developing powerful scanners and processors that aren’t affected by such factors. These subsystems will also be able to prevent false authentication to a greater degree now. Dubbed Frame Grabber, fingerprint biometric system Called the Dubbed Frame Grabber, this new system can identify fingerprints that have been significantly damaged In more recent developments, a new subsurface fingerprint biometric system has been invented that can reportedly identify individuals from skin layers around 200−400 µm deep under the finger surface. Called the Dubbed Frame Grabber, this new system can identify fingerprints that have been significantly damaged, like having been burnt or have become unrecognisable due to injuries. BitFlow, a digital camera link and CoaXPress frame grabber manufacturer announced the development of this technology in 2015 and it has now reached the testing phase. The developers are keen on launching this frame grabber soon and looking at the already widespread use of fingerprint technology, it is assumed to be priced at a reasonable cost. Improved anti-fingerprint spoofing Fingerprint spoofing is basically duping a fingerprint scanner into authenticating an artificial fingerprint created by an imposter. The imposter who has access to the actual user’s fingerprint creates a fake biometric identifier, using various materials, such as paper, modeling clay, glue, etc. The earlier generation fingerprint devices couldn’t easily identify between the two, thus resulting in a higher rate of spoofing. As discussed earlier, fingerprint sensors have evolved and employ methods, such as static analysis, dynamic analysis, and AI-enhanced recognition that consider various biometric identification parameters, including sweat pores, skin flexibility, blood flow detection, etc., to distinguish a live human fingerprint from a fake model and thus, reduce the chances of fingerprint spoofing. Advancements in forensic applications There’s a new method that helps crime investigators, which is based on Matrix-Assisted Laser Desorption Ionisation Mass Spectrometry Imaging (MALDI-MSI). It can detect human blood and DNA signatures from fingerprints that are stored in the cloud storage of the forensic department. According to one of the researchers of this method, it is already in use by crime scene investigators. It is soon due for application by the police department as well and would help in quickly identifying people, saving precious time. Touchless fingerprint recognition Most of the scanners now use LEDs that keep power consumption essentially low Considering how skin contact with anything is deemed potentially dangerous due to COVID-19, a Europe-based market renowned firm in security and identity solutions has reportedly been in the process of developing a touchless fingerprint recognition system that would allow users to gain access by simply waving their fingers or hands in front of the scanner, rather than going for precise finger contact. If successful, this will be a much safer, sophisticated, and practical way of analysing fingerprint biometrics. Overall, improved hardware and software, and more efficient algorithms have drastically reduced the processing time of fingerprint identification and verification. Authentication systems are better prepared to recognise and adjust to user behaviour, and environment conditions. Most of the scanners now use LEDs that keep power consumption essentially low, as a result, improving efficiency and maintenance. Fingerprint biometrics part of routine lives of people People use fingerprint biometrics in their routine life to unlock a phone or the door to the office, verify identities, gain access to restricted/exclusive areas, etc. Biometric technology is ruling the world. in terms of affordability, scalability, and convenience. Of course, other technologies are being developed rapidly and all biometric authentication methods have their own pros and cons. However, the ease of use that fingerprint authentication has provided to people will be hard to replace. With the aforementioned developments expected to hit the market in the near future, the speculations about fingerprint authentication becoming redundant will eventually die down, welcoming a new era for this biometric identifier.
Security beat
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrols in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
Case studies
For years, the Civil Police of the State of São Paulo, Brazil’s largest state police force faced significant challenges with criminal bookings and identification, including: A Fragmented Identity System - Each of Brazil’s 27 states has its own siloed programme that does not interconnect. This not only hinders statewide criminal booking but also undermines the community’s confidence in the criminal justice system. Identity Fraud With Multiple IDs - Imagine having 43 identities. This was the case for one unlawful Brazilian. The prevalence of identity fraud is extremely high across the country. If a person wants to hide their identity, it’s common for them to simply move to another state and set up a new profile. Manual Ink-and-Paper Fingerprinting Techniques - Many law enforcement departments across Brazil administered manual fingerprinting techniques, resulting in inaccuracies and low matching rates. Slow, Inefficient Criminal Booking Processes - Inefficiency was another setback for justice. It took numerous steps to confirm one’s identity and, on average, a whole workweek to get matching results returned. Biometric National ID Compliance - The civil police must modernise systems to comply with the Brazilian government’s mandates for all citizens to tie biometrics to their IDs. The Civil Police of the State of São Paulo needed a more reliable and efficient solution to break down identification silos and put the agency on the path toward a unified, national system rooted in the power of biometrics. HID's solution The HID ten-print scanner is designed to quickly capture flat and rolled fingerprints for background checks Working through HID’s partner, Golden Distribuidora, one of Brazil’s largest distributors of IT products, the Civil Police of the State of São Paulo selected a comprehensive biometrics-based identification system called BioKit, featuring HID’s ten-print scanner. The HID ten-print scanner is designed to quickly capture flat and rolled fingerprints for background checks and identity validation programmes. It is also certified for FBI Appendix F (FAP 60) and offers an economical approach to fingerprint acquisition without sacrificing image quality. Automated Biometric Identification System The criminal booking process at São Paulo civil police stations is simplified and can be accomplished in minutes not days. First, agents use HID’s ten-print scanner to capture fingerprints and determine if the individual has a biometric file on record. The fingerprint images are compared against the state-run Automated Biometric Identification System (ABIS). If there is a match, the civil police move forward with their investigation. If there is no match, the officer then creates a new biographic/biometric profile for the individual in question and enrolls them into the ABIS. HID ten-print scanner HID ten-print scanners deliver superior performance and reliability at a competitive price point. Key advantages include: High-Quality Tenprint Capture - The scanner is FBI Appendix F (FAP 60) certified and can quickly capture high-resolution rolled and flat fingerprints. Ease of Use - User-friendly pictographs and LED indicators simplify the process for operators. Automatic Capture - Patented “Auto-Capture” offers fast and error-free image capture. Difficult Fingerprint Capability - An optional silicone membrane improves image quality for dry or damaged skin ensuring consistent results. ABIS Integration - The scanner seamlessly integrates with Brazil’s Automated Biometric Identification System (ABIS) to enable quick and accurate background checks. Results delivered Using the BioKit system, featuring the HID ten-print scanner significantly streamlines the criminal booking Using the BioKit system, featuring the HID ten-print scanner significantly streamlines the criminal booking process and improves matching accuracy for the State of São Paulo Civil Police. “Working with criminals can be difficult and dangerous, and the HID ten-print scanners help us identify and book criminals quickly and simply,” said Dr. Luiz Ortiz, Chief Delegate, Civil Police of the State of São Paulo. Easy to use Dr. Luiz Ortiz adds, “The HID ten-print scanner is easy to use and provides clear direction through pictographs, which is a big differentiator from other offerings.” To date, the BioKit system with HID’s print scanners is deployed in 500 civil police stations throughout São Paulo. This system has transformed criminal booking and identification processes, resulting in an increase in solved criminal cases and a steep reduction in identity fraud. HID fingerprint technology “What used to take 4 to 5 days is now done in minutes using the BioKit system and HID fingerprint technology,” said Dr. Ortiz. Dr. Ortiz adds, “Our agents can accurately identify or onboard suspects, and each new biometric enrollment into the centralised ABIS contributes to strengthening our country’s overall identity system and ability to bring about justice faster and smarter.” Biometric enrollment and verification “Each individual the Civil Police of the State of São Paulo onboards ties to a single set of fingerprints that verifies their true identity,” said Danilo Fernandes, Business Development Manager at Golden Distribuidora. Danilo Fernandes adds, “Utilising biometric enrollment and verification, our nation has the potential to streamline millions of records, while preventing countless cases of fraud. This establishes a fierce force to fight fraud here in Brazil.” A simple, fast, and trusted experience Additional use cases for the BioKit + HID ten-print scanner, beyond criminal bookings, include border control, background checks, correctional centres, courtrooms, voter registration, and national ID programmes. The team at Golden Distribuidora expects to continue distributing these biometric systems throughout the country to support Brazil in combating fraud and making biometric enrollment and identification a simple, fast, and trusted experience for all citizens and stakeholders.
Established in 1997, Dubai-based BMA International operates fashion retail in the Middle East and Asia across the Kingdom of Saudi Arabia (KSA), United Arab Emirates (UAE), Bahrain, Oman, Kuwait and Qatar with more than 250 stores offering two major brands — Redtag and twenty4. BMA’s steady growth is a testament to its focus on building trust with its shoppers, employees, suppliers and stakeholders to create a company that is people-centric, ambitious and results-oriented. Challenge Fraud is a common problem in the retail sector, particularly within large chains with hundreds of locations and tens of thousands of employees. BMA’s retail stores were no exception. Following an internal audit, security of point-of-sale (POS) terminals in retail outlets were identified as a serious concern, particularly the misuse of floor supervisors’ credentials to access terminals and modify or cancel transactions. The problem persisted even after BMA switched from passwords to a smart card-based authentication system The problem persisted even after BMA switched from passwords to a smart card-based authentication system. The most common issues involved supervisors leaving smart cards with cashiers to use in their absence and failing to return the cards when separation from an employer occurs — a frequent occurrence as many of BMA’s retail employees are expatriates who often return to their home countries. Fraudulent use of the smart card was also a common problem. Once a sale was completed and the customer had left the store with their purchased items, the smart card could be used to improperly access the system so the cashier could void the transaction and pocket the “refund,” resulting in both monetary and inventory losses. Biometric-based system “BMA’s internal auditors were concerned with the lack of control over the cards and the potential for fraudulent transactions due to their mishandling. They observed clear gaps in security and authentication practices that led directly to fraud and revenue leakage, resulting in the Internal Audit Committee recommending to the BMA Board of Directors that action be taken to plug the security holes by tightening the authentication process,” said Nainan M. Kurian, CEO of Technowave International LLC. The decision was made to transition authentication to a biometric-based system that would provide the required security at a competitive price that aligned with the aesthetics of the retail stores. The system also needed to be compatible with the Oracle Retail Xstore Office Cloud Service, which BMA International was adopting across its brands. Solution A fingerprint reader from HID is ideal for use by multiple people in a shared environment BMA International and its technology partner, Technowave International LLC, determined that the HID DigitalPersona® 4500 Fingerprint Reader met all their requirements — a decision supported by recommendations from other retailers that had deployed the product, and by the fact that competitive solutions were incompatible with Oracle Retail Xstore, a crucial requirement. A USB peripheral with a compact design to conserve space, this fingerprint reader from HID is ideal for use by multiple people in a shared environment. Its professional, modern design looks elegant in retail settings while offering superior authentication control via biometric functionality that uses optical scanning technology to achieve excellent image quality and reliability. HID DigitalPersona 4500 Fingerprint Reader With this easy-to-use technology, floor supervisors simply place their finger on the reader window, which rapidly captures and encrypts the fingerprint image, and then provides a red flash as a visual cue indicating that it was properly captured. That image is sent to the DigitalPersona FingerJetTM biometric engine for verification, and once the user has been authenticated, access to the POS terminal is granted. “Deploying the HID DigitalPersona 4500 Fingerprint Reader was simple and caused no disruption to retail operations. It paved the way for significant reduction in the malpractice that had been occurring with the smart card system,” said Kurian. Result Since deploying more than 1,100 HID fingerprint readers in retail outlets across KSA, UAE, Oman, Bahrain, Kuwait and Qatar, BMA has eliminated nearly all POS fraud and abuse. The system has also driven tangible improvements in the attendance and punctuality of floor supervisors, who must now be physically present in the store for authentication to take place. The HID authentication system is also capable of multiple types of authentications — providing flexibility that is appreciated by users who work at multiple locations. “Because the HID DigitalPersona 4500 Fingerprint Reader requires proof of presence for authentication, there is greater accountability among supervisors which resulted in immediate cessation of POS fraud and stopped both revenue and inventory leakage. The exceptional support provided by HID Global has also allowed BMA to take full advantage of the system’s functionality and flexibility,” said Kurian.
Biometrics company, Fingerprint Cards AB (Fingerprints™), has upgraded the physical access security of its Gothenburg HQ. S-Key biometric access cards from Freevolt Technologies Limited, which embed Fingerprints’ own T2 sensors, have been implemented across the entire Gothenburg site. The updated authentication system further strengthens Fingerprints’ workplace security and enables role-based access control, whilst ensuring a convenient and easy-to-use experience. Role-based access control Fingerprints’ Gothenburg HQ has security gates to enter and exit the building, and restricted areas for hardware and software R&D. By replacing access keyfobs with biometrics access cards, site-wide security has been enhanced and role-based access control has been enabled to better control access to sensitive areas of the site. By replacing traditional security methods based on something they know/have with something they are, multi-factor authentication has been enabled while maintaining convenience for employees. Fingerprints’ latest ‘T2’ sensors Solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs Caroline Krüger, CHRO of Fingerprints comments: “The workplace has evolved significantly in recent years. At Fingerprints, we offer hybrid working whilst still ensuring our workforce has 24/7 access to HQ. Amidst this dynamic working environment, it is essential our team feels the workplace is accessible and safe. This requires a flexible, secure and convenient access control solution.” Fingerprints has implemented Freevolt’s flagship biometric access card solution, S-Key. The solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs. The card incorporates Fingerprints’ latest ‘T2’ sensors which deliver optimised image quality, processing speed and power efficiency. Traditional security methods Adam Philpott, CEO of Fingerprints comments: “To meet today’s security challenges we must move away from traditional security methods. And, as a biometrics company, it is important that we lead the way in ensuring robust, frictionless security in our own operations." "There is an opportunity here too; what can we learn, what innovations will we identify by using these systems day to day? I look forward to continuing our strong and innovative collaboration with Freevolt technologies.” Energy harvesting technology Gonzalo de Gisbert, Head of Product & Business Development at Freevolt Technologies, adds: “Fingerprints are pioneers in biometrics, with sensors in billions of products, so they know what makes a good biometric solution. We’re therefore thrilled that Fingerprints has chosen S-Key to strengthen security at their global headquarters, in Gothenburg." "Our pioneering radio frequency energy harvesting technology combined with Fingerprints’ ‘T2’ sensors, known as FPC 1323, enables S-Key to be completely battery-less, lasting for many years. Roll-out was seamless, with everyone set up in less than 1 hour. That’s simple, safe, and secure biometrics, powered by Freevolt.”
Situated in Vadodara, Gujarat, India, this venerable university stands as one of the oldest in the country, tracing its roots back to 1881. Honouring a forward-thinking ruler, it has evolved into a prominent public institution that provides a diverse array of academic programmes spanning arts, sciences, engineering, and management. Dedicated to delivering top-notch education and cultivating a culture of research and innovation, the university features a sprawling campus and holds a distinguished position for its commitment to excellence in the realm of Indian education. Project overview Confronted with a significant hurdle in the form of a competitor's attendance tracking system for its teaching staff, the university embarked on a quest for a more precise and streamlined method to record daily attendance across its various campuses. The primary goal was to establish a centralised platform dedicated to attendance management, focusing on improving employee access to attendance records and facilitating efficient leave request management. A key consideration was the necessity for a tailored provision to accommodate professors frequently moving A key consideration was the necessity for a tailored provision to accommodate professors frequently moving across campuses for lecture commitments. This case study explores the university's journey in pursuit of a robust attendance management solution catering to 3000 users, addressing specific challenges and optimising operational efficiency. University challenges The university encountered significant challenges in ensuring the smooth operation of its Attendance Management System, including: Inefficiency in the Existing Attendance Management Solution: The university grappled with issues stemming from an ineffective competitor's attendance management system, adding complexity rather than facilitating streamlined operations. This inefficiency extended to the complexities of managing attendance across diverse faculties, further complicating university-level payroll processing. Inconsistencies in Daily Attendance Recording for Teaching Staff: A crucial necessity for the university was the seamless daily recording of professors' attendance. The imperative for a well-organised system became evident to ensure accurate tracking and efficient payroll management. Lack of Proper Attendance Management Across Multiple Campuses: With campuses spread across different locations, the university faced the pressing need to centralise attendance data. This centralisation was crucial for the effective management of attendance records across all campus locations. Delayed Data Transmission from Devices: The existing solution encountered difficulties as punch data from devices experienced delays in reaching the system promptly. This lag resulted in complications, necessitating manual synchronization efforts to rectify the issue. Employee Accessibility Issues for Attendance Data and Leave Management: Staff members encountered limitations in accessing their attendance data through the current system. Furthermore, the absence of support for submitting leave requests contributed to inefficient leave management practices, prompting a demand for more effective solutions. Faced with these operational challenges, the university embarked on a quest for innovative solutions to improve its attendance management processes' overall efficiency and effectiveness. Matrix's solution To address the critical issues faced by the client, Matrix successfully implemented a comprehensive solution that effectively resolved the organisational challenges they were encountering. Matrix executed its Attendance Management System to achieve: Deployment of a Comprehensive Attendance Management System: Matrix effectively implemented an enterprise-grade Time-Attendance Solution, successfully tackling the client's organisational hurdles in attendance management. This solution streamlined the entire attendance process, simplifying complexities across various campuses. Seamless Attendance Recording for Teaching Staff: Matrix introduced biometric devices across different faculties, enabling effortless attendance logging for teaching staff. The widespread availability of devices ensured accurate tracking and efficient payroll management. Centralised Attendance Management Across Multiple Campuses: Matrix established a centralised solution for attendance management, consolidating data from various campuses. This centralised approach facilitated effective control and oversight of attendance across diverse locations. Automated Data Transmission from Devices: Matrix Time-Attendance terminals were equipped with automated data push technology. This feature ensured timely and automated data transfer from devices to the server, eliminating the need for manual synchronisation and enhancing operational efficiency. User-Friendly Employee Self-Service Portal: Matrix provided a comprehensive solution, including an Employee Self-Service portal. This portal enabled users to access attendance data on their devices and submit leave requests. With its hierarchy-based approval system, Matrix streamlined the leave management process. Improved efficiency The innovative solutions offered by Matrix not only resolved the client's challenges but also significantly enhanced attendance operations, promoting improved efficiency throughout the organisation. This case study highlights Matrix's capability to tailor solutions to meet unique client needs, ultimately optimising business processes. Results acheived Matrix successfully streamlined the entire process, introducing clarity in payroll processing and simplifying attendance Matrix's deployment of its Enterprise-grade Time-Attendance Solution brought about a remarkable transformation in the operations of the historic university based in Vadodara. Confronting challenges posed by an inefficient attendance management system, Matrix successfully streamlined the entire process, introducing clarity in payroll processing and simplifying attendance tracking across diverse faculties. The use of Matrix biometric devices facilitated seamless attendance marking for teaching staff, contributing to efficient payroll management. Centralised attendance management The implementation of a centralised attendance management system across multiple campuses significantly improved control and efficiency in handling attendance data. Matrix addressed delays in data transmission by deploying terminals equipped with automated data push technology, eliminating the need for manual synchronisation. Employee Self-Service Portal Matrix's provision of a hierarchy-based approval system streamlined the client’s leave management requirements Furthermore, the implementation included a user-friendly Employee Self-Service Portal, allowing staff to effortlessly view attendance data and submit leave requests. Matrix's provision of a hierarchy-based approval system streamlined the client’s leave management requirements. These tailored solutions markedly enhanced operational efficiency, resulting in a more streamlined, accurate, and transparent organisational operation. Matrix's success in optimising attendance processes underscores its commitment to delivering innovative solutions tailored to the unique requirements of its clients. Products offered COSEC VEGA FOT: Fingerprint and RFID card-based Time-Attendance Terminal COSEC CENTRA PLT: Platform-based User Licence COSEC CENTRA TAM: User Licence for Time-Attendance Management COSEC CENTRA ESS: User Licence for Employee Self-Service Management
On the occasion of INTERPOL’s 91st General Assembly – and 100th anniversary – the world’s largest international police organisation announces the launch of its enhanced BioHUB, powered by IDEMIA’s newest Multibiometric Identification System (MBIS). Multibiometric Identification System This latest version, MBIS 5, integrates new generation algorithms, which provide a higher matching accuracy rate with a shorter response time and a more user-friendly interface. The first phase of its deployment to enhance the identification of potential Persons of Interest (POIs) for police investigations has already been operational since October 2023. The second phase, which will be rolled out over the next two years, will extend this tool to border control points. The system will then be able to perform up to 1 million forensic searches per day, including fingerprints, palm prints and portraits, making it the top performing automated biometric identification system on the market. Cutting-edge technology to help law enforcement IDEMIA still leads the biometric tech race covering iris, fingerprint and face recognition IDEMIA’s commitment to excellence is reflected in its consistently top-ranked identity and security technologies. IDEMIA still leads the biometric tech race covering iris, fingerprint and face recognition. NIST’s (National Institute of Standards and Technology) latest test results underscore IDEMIA’s outstanding expertise and solutions combining efficiency, accuracy and equity. INTERPOL, creating a safer world INTERPOL currently has 196 member countries and enables law enforcement agencies from around the world to work together to make the world a safer place. INTERPOL’s high-tech infrastructure of technical and operational support helps meet the growing challenge of combating crime in the 21st century. Facial recognition is an important and rapidly evolving technology that has opened up many new opportunities to identify individuals and solve crimes. In 2016, INTERPOL opted for IDEMIA’s advanced facial recognition capabilities to create the INTERPOL Face Recognition System (IFRS). INTERPOL Face Recognition System (IFRS) The IFRS contains face images from more than 170 countries, and since its launch, thousands of terrorists, criminals, fugitives, POIs, and missing persons have been identified. In 2019, INTERPOL renewed its contract with IDEMIA to upgrade the current system and transform it into a Multibiometric Identification System (MBIS). IDEMIA and INTERPOL first began their collaboration in 1999, when IDEMIA delivered the original Automated Fingerprint Identification System (AFIS). Automated Fingerprint Identification System (AFIS) AFIS was designed to make cooperation easier between police forces from member countries The Automated Fingerprint Identification System (AFIS) was designed to make cooperation easier between police forces from member countries, by giving them access to global police tools and services, namely forensics, fingerprint evidence and the exchange of forensic data to support international investigations. Through AFIS, authorised users in member countries can view, submit, and cross-check these records using INTERPOL’s secure global police communications network. IDEMIA and INTERPOL share enhanced partnership Cyril Gout, INTERPOL’s Director of Operational Support and Analysis, said “In the same way that criminals use ever more innovative and sophisticated ways to avoid detection, law enforcement must also leverage the latest advances in technology, especially in biometric security, to better combat all forms of transnational crime. INTERPOL’s enhanced partnership with IDEMIA will further help our member countries better protect their borders and communities.” Matt Cole, Group Executive Vice President, Public Security and Identity at IDEMIA, said “IDEMIA is proud to be collaborating with INTERPOL again and to continue making the world a safer place for all. This project reinforces our longstanding partnership with INTERPOL, which has been going strong for over 20 years.” INTERPOL receives delivery of the new MBIS Matt Cole adds, “With the delivery of the new MBIS, developed thanks to our strong dedication to R&D, INTERPOL will have access to cutting-edge fingerprint, palm print and face identification technologies, enabling it and member countries to identify persons of interest faster than ever before.” He continues, “We look forward to many more years of supporting INTERPOL to ensure the safety of potentially billions of citizens around the world.”
Continental Tyres ranks among the top 5 automotive suppliers worldwide. With their expertise in mobility, transport, and processing, they keep development as a foreword to bettering the world. Since bringing in the first tread pattern tyre in the world, they strive for automotive safety for the last 140 years. Need for access control system The major challenge that the factory faced was that without an access control system, the entire asset and materials were unsecured and easily accessible to all employees without any restriction. This is especially concerning as securing a shutter and its accompanying door needed to be managed simultaneously. Moreover, with the shutter being imported from Germany, Many OEMs were finding it tough to integrate it alongside other access control solutions. An all-out solution Matrix took up the mantle to solve their troubles once and for all with an all-out solution to manage their security concerns for the door as well as the shutter. This solution involved the installation of COSEC VEGA FAX, for providing authorisation to a prescribed set of employees. Furthermore, to maintain proper and consolidated access logs, Matrix helped the management to keep a real-time track at their required endpoint. Management control With the intervention of Matrix, this factory unit of Continental Tyres could easily secure its premises as well as assets. This, in combination with, the timely logs of those who accessed gives the management proper control over the rights to entry. This also helps in getting a real-time update on people accessing the area as required by the client. Products offered COSEC VEGA FAX: Fingerprint and Card-based Door Controller with Touchscreen, IP65, Wi-Fi, and 3G/4G Connectivity Option. COSEC CENTRA PLATFORM: Platform Licence for COSEC CENTR. COSEC CENTRA PLT10: 10 Platform Users Licence for COSEC CENTRA. COSEC CENTRA ACM10: 10 Access Control Users Licence for COSEC CENTRA.
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Products
Videos
Fingerprint scanner: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download