Signature verification
iDenfy, a Lithuania-based RegTech pioneer in AI-powered KYC/AML solutions, has partnered with a prominent Czech-based crypto exchange platform, GlolinkOTC. iDenfy will be responsible for ensuring a smooth transition to a fully automated approach to compliance, helping GlolinkOTC build a seamless verification process with extra features like adverse media screening, PEPs and sanctions checks, as well as other compliance-related measures that help assess risks and ensure ongoing due diligence.&nb...
HID, a worldwide pioneer in trusted identity solutions, announces that its Signo™ Readers seamlessly integrate with the UK government’s GovPass standard, built on open standards for enhanced security and flexibility. GovPass GovPass, the most secure government pass to date according to the UK government’s website, leverages open standards to ensure interoperability across different suppliers. Leveraging the UK government’s standard for card encryption and HID’s p...
LuxTrust, a European specialist in trust services and digital identities, and Shanghai Genyan Network Technology, a pioneering provider of digital identity management, electronic signature and electronic seal solutions in China, announce their partnership and create a unique market offering. This new service - focused on data sovereignty - provides secure and compliant electronic signature solutions for businesses operating under the jurisdictions of the European Union and China. The result? Tr...
Thales, the pioneering global technology and security provider, announced Passwordless 360°, a new concept for passwordless authentication that offers Thales customers the broadest coverage of passwordless functions across multiple types of users and assurance levels. Passwordless 360° has the flexibility to let companies use the latest technologies like FIDO passkeys, while also making the most of previous investments they might have made in passwordless technologies. End users ar...
HID, a worldwide pioneer in trusted identity solutions, announces its 2024 State of the Security Industry Report, which gathered responses from 2,600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organisation sizes representing over 11 industries. The 2024 State of Security Report delves into the underlying concerns driving upcoming innovations and the technologies underpinning them, helping security pioneers proactively adapt to evolving challen...
In a groundbreaking collaboration, Partisia Blockchain and the University of Applied Sciences and Arts Western Switzerland (HES-SO Valais-Wallis) are poised to transform the management of digital identities for Swiss citizens. This partnership aims to develop a decentralised electronic identity system in harmony with the Swiss Federal Council’s unwavering commitment to data privacy and security. Redefining digital identity management This collaboration marks a significant leap toward re...
News
Transmit Security, a pioneering provider of customer identity and access management (CIAM) SaaS solutions, announces the appointment of Chris Curcio as Senior Director of Strategic Alliances and Partners for North America and Kaltrina Ademi as Director for Channel and Alliances in EMEA. Prior roles of Curcio Curcio has over 25 years of experience in various positions within the IT industry and joins Transmit after almost four years as GSI Alliances Director at Forgerock during which he grew the GSI business by over 200%. Curcio began his career as a Senior Software Engineer, building firmware for embedded processors automating IoT systems. He then moved to Oracle as an Identity Management/Security Sales Consultant and over his 12 years at the company, progressed to become a Sales Consulting Director, focusing on Digital Experience. Prior roles of Ademi Ademi has more than 10 years of experience in the Security and Digital Identity space Ademi has more than 10 years of experience in the Security and Digital Identity space. She joins us from PlainID, where she served as Head of Partnerships, building their initial Channel Model and pioneering the EMEA Channel Strategy for the past two years. Ademi also served as the Channel lead in Central Europe at Ping Identity for more than four years, where she was awarded as the highest-performing Channel Manager, based on Partner generated Revenue. Transmit’s solutions Curcio chose Transmit because of their long-term commitment to making a partner programme work and the possibilities of Transmit’s solutions within that partner programme. Curcio chose Transmit because of their long-term commitment to making a partner programme work He said, “I’ve been in the identity space for a long time - and Transmit’s technology is really interesting to me. Having the fraud and risk capabilities coupled with identity verification and a robust orchestration engine - puts us in a unique place. We have more entry points into customers than traditional CIAM vendors and can meet many needs of customers even if they have deployed a legacy CIAM vendor.” Digital identity and cybersecurity Ademi said, "The digital identity landscape is in a constant state of evolution, and Transmit Security's solutions offer a distinctive approach." “They prioritise not only enhancing user experiences but also effectively countering cyber threats and preventing identity theft. This unique approach facilitates the convergence of Digital Identity and Cybersecurity teams, bridging two previously separate domains that are inherently interconnected."
Identity and Access Management (IAM) specialist - ProofID has announced that it has acquired Identity Governance and Administration (IGA) integrator, Regatta Solutions Group. The acquisition unites the competencies of both organisations as integrators of Ping Identity and SailPoint solutions respectively while positioning the company as a provider of enterprise identity solutions and global identity managed services. The combined business is projected to generate more than $32 million in revenue in 2023. IAM solutions and MSP Based in Austin, Texas with 35 identity specialists, the company will initially trade as ‘Regatta, a ProofID company’ and will subsequently be fully integrated into ProofID, creating an IAM solutions and managed service provider (MSP) across Europe and North America. For customers of both companies, it provides an opportunity to work with one partner to manage Ping Identity and SailPoint solutions. Identity managed services ProofID will also add Austin, Texas to its existing US base in Colorado Springs from which to continue growth Following the acquisition, ProofID will grow and strengthen its partnership with SailPoint, broaden its existing IGA business, and expand its SailPoint practice into Europe as well as offering identity managed services to both Ping Identity and SailPoint customers. ProofID will also add Austin, Texas to its existing US base in Colorado Springs from which to continue growth in North America. Access to expertise and competencies “With the acquisition of Regatta, our customers have access to a much wider set of expertise and competencies whether managing identities within the enterprise or building personalised experiences for their customers,” explains Tom Eggleston, CEO, ProofID. He adds, “As a united force, we have the proven expertise and resources to integrate both Ping Identity and SailPoint solutions, deliver expert solutions, and provide managed services across both Europe and North America making ProofID a frontrunner across identity management disciplines.” SailPoint Admiral Delivery Partner ProofID has been Ping Identity’s Delivery Partner of the Year for the last five years and is an IAM-managed services franchise with over 60 global enterprise customers. In 2022 Maven Capital Partners invested $19 million in the business, and it has had a greater than 30% annual revenue growth rate for the last three years. Regatta is a SailPoint Admiral Delivery Partner, the highest accolade, and has achieved similar revenue growth. Enterprise identity security solutions This acquisition marks a significant milestone for Regatta, as it allows us to combine our respective knowledge" John Ciulla, CEO, and President of Regatta said, “We are incredibly excited to join forces with ProofID and embark on this transformative journey together." He adds, "This acquisition marks a significant milestone for Regatta, as it allows us to combine our respective knowledge and expertise across the enterprise identity security solutions from SailPoint and Ping Identity, elevating our offerings to new heights." Delivering managed services John Ciulla continues, “With our expanded global reach and the ability to offer both SailPoint and Ping Identity managed services, we are poised to deliver unparalleled value to our customers worldwide.” Following the acquisition of Regatta, ProofID will count Williams and Love’s, Avis, Tesco Bank, Nelnet, and Paymentus among its customers.
Vector Flow, the industry pioneer, and innovator of AI and data-driven physical security solutions, is demonstrating its powerful range of automation solutions at GSX 2023, September 11-13 in Dallas. PIAM automation product Most notably, Vector Flow is highlighting its Physical Identity Access Management (PIAM) automation product wherein organisations can autonomously manage individual identities over the entirety of their lifecycle under one platform. “With Vector Flow's PIAM application, organisations can unlock the full potential of their physical security infrastructure,” said Ajay Jain, Founder and CEO of Vector Flow. PIAM applications This powerful solution utilises available data from existing business systems to eliminate the manual management" “This powerful solution utilises available data from existing business systems to eliminate the manual management of thousands of identities, automating labour-intensive tasks such as on-and off-boarding, badging and credentialing, access provisioning, audits, and more." "This makes our platform ideal for enterprise operations looking to quickly and efficiently address security gaps while streamlining workforce management.” Physical Workforce Identity Suite Vector Flow’s Physical Workforce Identity Suite delivers the new science of PIAM automation, providing insight-rich applications for automating all aspects of an identity lifecycle as it relates to the physical security domain. Designed to deliver a one-credential, one-identity solution across the enterprise, this powerful solution leverages advanced Artificial Intelligence (AI) technology to automate all identity management tasks such as on/off-boarding of an Identity into physical security infrastructure, badging and credentialing, physical access management, access audits and compliance, etc. The AI-enabled software uses learning algorithms to quickly identify and address security gaps and also delivers recommendations for security improvements and user tasks. Workspace Occupancy application Workspace Occupancy application enables organisations to effectively track and forecast facility utilisation A new module recently added to the Physical Workforce Identity Suite is Vector Flow’s Workspace Occupancy application, which enables organisations to effectively track and forecast facility utilisation and occupancy by departments, business units, personnel types, peak occupancy, day of the week, and more. The application’s intuitive dashboard provides users with actionable insights that can be leveraged to identify popular and underutilised spaces and forecast future use of valuable space. Next-generation VMS Vector Flow’s Workforce Identity Suite also includes a Next-Generation Visitor Management System (VMS) For enterprises. It is a comprehensive solution with an easy-to-use application that provides organisations with the capability to manage visitors with provisions for touchless and secure check-in, watch list verifications, badge printing, health screenings, notifications, and more. SOC Automation Suite SOC Automation Suite acts as a security nerve centre, turning raw security data into insights and actions In addition to its Physical Workforce Identity Suite, Vector Flow is also demonstrating its other categories of solutions, Security Operations Centre (SOC) Automation and Physical Security Threat Intelligence, at GSX 2023. SOC Automation Suite acts as a security nerve centre, turning raw security data into insights and actions. The application drives actionable intelligence from a customer’s historical and daily physical security data. Three AI-driven modules The solution features three AI-driven modules: SOC Alarm Reduction Manager, SOC Governance Manager, and SOC Predictive Maintenance Manager. The modules tie physical security processes together and automate time-consuming, manual tasks effectively increasing the overall productivity of SOC operators/agents while maintaining compliance through data-generated reports and decreasing the downtime of connected devices and associated maintenance costs. Physical Security Threat Intelligence Physical Security Threat Intelligence comprises applications whereby the data is collected and processed from security logs, journals, and transaction data to understand who the threat actors are and what the compromised areas in the physical security infrastructure. Using advanced AI and Machine Learning algorithms, the solution uncovers security vulnerabilities and makes risk mitigation recommendations to identify and address operational and security gaps, deliver recommendations for improvements, and make hidden details of an enterprise’s physical security operational state visible.
Netwrix, a cybersecurity vendor that makes data security easy revealed additional findings for the education sector from its survey of 1,610 IT and security professionals from more than 100 countries. According to the survey, 69% of organisations in the education sector suffered a cyberattack within the last 12 months. Phishing, account compromise Phishing and user account compromise was the most common attack paths for these organisations, while phishing and malware (such as ransomware) topped the list for other verticals. What’s more, 3 out of 4 attacks (75%) in the education sector were associated with a compromised on-premises user or admin account, compared to 48% for other sectors. Security training Even if identity management is automated, it is a challenge to keep users trained in security best practices" “Organisations in the education sector handle a variety of accounts, staff, third-party contractors, educators, students, and alumni that have a high turnover rate. Even if identity management is automated, it is a challenge to keep users trained in security best practices because there is a continual supply of newcomers,” says Dmitry Sotnikov, VP of Product Management at Netwrix. “In addition, students may lack experience in spotting phishing emails or fake websites asking for their credentials. To address these challenges, it is essential to mandate security training within the first few weeks and repeat it regularly.” Automated detection and response solutions “To enable research and collaboration, educational institutions often provide a variety of shared devices and systems exposed to the internet creating a massive attack surface,” says Dirk Schrader, VP of Security Research at Netwrix. “To mitigate risk, it is crucial to enforce strong password policies that prevent the use of weak and compromised passwords, implement multifactor authentication (MFA), and adhere to the least privilege principle. In addition, automated detection and response solutions can help IT deal with account compromise and abuse in a controlled and efficient manner.”
Vector Flow, the digital transformation pioneer offering the next-generation AI-enabled physical security automation platform, is proud to announce the release of its suite of Aviation Identity Management solutions designed to enhance security and operational efficiency for airlines and airports. AI and ML-enabled platform The company’s AI and machine learning-enabled platform enables operators and their workers to collaborate to continuously ensure compliance and security. Each actor knows when and what they need to do, providing a platform for increasing security without increasing costs and burdens. Physical Security Automation Our suite of Physical Security Automation Solutions introduces a level of efficiency and sophistication" “At Vector Flow, we strongly believe that aviation security should not be compromised by cumbersome processes and outdated technology,” says Ajay Jain, Founder and CEO of Vector Flow. He adds, “Our suite of Physical Security Automation Solutions introduces a level of efficiency and sophistication unseen in legacy solutions, changing the way airports and airlines safeguard against insider threats and manage their staff.” Key benefits Key benefits offered by the Vector Flow Aviation Suite include: Rapid Deployment: Quick implementation and seamless integration with existing security infrastructure. Cloud and On-Premise. Perpetual Compliance: Designed around the security standards set forth by the aviation industry - 49 CFR Part 1542/1544 and beyond. Aviation Subject Matter Experts (SME): Dedicated SME team provides continuous support, personalised training, and expert guidance. Scalability: Highly adaptable and scalable to cater to the specific needs and size of any environment without compromising sustainability. Dashboard Driven: The platform’s easy-to-use, AI-infused interface boosts user satisfaction and reduces training time, benefiting all stakeholders. Vector Flow invites aviation security professionals to learn more about their modern solutions for the aviation sector at the upcoming AAAE Airport Credentialing & Access Control Conference 2023, taking place from August 22-23, 2023, in San Diego, California, USA.
AMAG Technology, an Allied Universal CompanyⓇ, has hired Pascal De Zitter as the new Vice President of Security & Information Management Solutions (SIMS). This is a newly created role designed to develop, implement and lead a new, soon-to-be-established solutions delivery team. Customer value In this pivotal role, the VP of SIMS will generate new opportunities for both Symmetry CONNECT Identity Management and Symmetry Control Room solutions. This strategic step is in line with AMAG’s overarching goal to drive more opportunities for channel partners and transform how it conducts business. The goal is to deliver exceptional value to customers and solidify its position as an industry pioneer. Tailored Symmetry solutions By aligning the sales and solutions delivery teams, we aim to provide a seamless customer experience" “I am confident that our new VP of SIMS will strengthen AMAG Technology’s ability to communicate and deliver tailored Symmetry solutions that address the unique needs of our customers,” said AMAG Technology President, David Sullivan. “By aligning the sales and solutions delivery teams, we aim to provide a seamless customer experience and foster long-term partnerships.” New responsibilities De Zitter will manage AMAG’s Application Engineering team, which is responsible for pre-sales support. He will also provide key consultation on translating an organisation’s overall business requirements into security system requirements. Work experience “I am excited to apply my Symmetry Control Room expertise and leadership skills and build a brand new team that will help transform AMAG’s business,” said AMAG Technology, VP of Security & Information Management Solutions, Pascal De Zitter. De Zitter transitioned to AMAG Technology from G4S, where he was a Solution Manager and Integration Manager for over 11 years. Before G4S, he held managerial roles at Stanley Security and GE Security.
Expert commentary
Identity management is an important element of both data security and physical security in an organisation. But all ID management solutions are not the same—especially when it comes to security. There are no uniform security standards for the industry, and many off-the-shelf systems fall short when it comes to data protection. To protect people, property, and data, make sure you select a system that maximises security at every stage. What is identity management? Identity management—also known as ID Management (IdM) or Identity and Access Management (AIM)—is a framework for managing digital identities and controlling who has access to what. It includes both policies laying out what types of access different people should have and technologies for enabling and enforcing those access controls. An identity management system makes it easy for IT to define access levels for individuals or groups within the organisation. Each user is assigned a unique identity within the system with specific user rights and restrictions These systems enable companies to increase security and productivity while reducing the costs and labour associated with security efforts. At the lowest level, identity management involves defining what a user is allowed to do on a network, with what devices, and under what circumstances. Each user is assigned a unique identity within the system with specific user rights and restrictions. Specific business system For example, what files, business systems, and programs is the user allowed to access? What are they allowed to do within a specific business system? What physical locations and resources are they allowed to access, and at what times? Access rights and restrictions may be role-based or individualised. An IdM system may provide the backend for a Single Sign-on (SSO) system that controls access to everything on the network with one user identification key. Many security products focus on mobile device management (MDM) systems that control access of devices to the corporate network. As more workers shift to remote and hybrid models, managing what devices are authorised to connect to the network, how users are authenticated when they log on to the device, the activities that can be performed by these devices while on the network, and the data and applications they have access to while offline is essential. Meeting the security challenge Ultimately, the ID management system is only as secure as the access system it connects to In an IdM solution, the user administration system that provisions the roles and rights within the system is linked to an access system that verifies the identity of the user. Ultimately, the ID management system is only as secure as the access system it connects to. Access systems include input screens for passwords or PINs, biometric input systems (such as fingerprint or facial recognition), or readers that connect to identification media (such as an ID badge or smartphone) via Radio-Frequency Identification (RFID), Bluetooth® Low Energy (BLE), or Near-Field Communication (NFC). Some systems may require multifactor identification. RFID and smartphone-enabled BLE and NFC access systems are highly popular for their combination of security, reliability, user convenience, and ease of administration. While there are many access systems available, there are no uniform standards for security—and many standard systems are not very secure. User administration system When evaluating security for an IdM and access system, there are two important aspects to consider. Data storage: How is data stored in the IdM system and on the local reader or input device? Are user identities, rights, and activity logs stored in an unencrypted table on a single server or device? Is a blockchain system used for data storage? Or something in between? Data transmission: How is data transmitted between the access system and the user administration system? Is data transmitted in encrypted form? Is the Advanced Encryption Standard (AES) used? Security starts with the creation of the user ID and identification medium Security starts with the creation of the user ID and identification medium. To protect business data and systems, organisations should look for an IdM solution that uses industry best practices for encrypted data storage and transmission. If using ID badges—as a majority of organisations still do—they also need to consider how and where those badges are produced. Industry best practices For example, our partner evolutionID offers a secure ID-Management system with extended security functions. In-house badge production enhances security by eliminating the need to send sensitive, personalised data to a third-party badge printer. It also streamlines the badge production process, so employees can get their badges right away without waiting. With the creation of the identification medium, individual security features such as biometric properties, user ID, and permissions can be programmed directly onto the transponder card using an RFID reader or distributed to relevant systems by interfaces. This system maximises security and gives organisations the tools they need to customise their security concept for their needs. On top, cost-saving self-service features such as image acquisition or badge management are available for every employee on any device.
Security beat
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Newer facial recognition systems are scalable and provide more accurate results, and the end-user selects the parameters of system performance to suit their own application needs. “We have developed algorithms that can be optimised in various compute environments, whether in a small chip inside an edge device or on a large server device,” says Ido Amidi, Oosto’s Vice President of Products and Business Development. “It all depends on client needs. We can do it all without giving up performance. There is no significant loss in performance across various platforms.” The system’s “containerised environment” operates efficiently in a customer’s IT architecture. Facial recognition implementation Oosto, formerly AnyVision, was founded in 2016 based on deep learning research into facial recognition. The focus has been on how to use face recognition to identify people in real-world scenarios. Products began coming to market in 2017, targeting verticals that involve a need to identify “bad actors” or very important people (VIPs). The implementation of the technology involves the software operating in an on-premise appliance or server The most common implementation of the technology currently involves the software operating in an on-premise appliance or server, with inputs coming from cameras at the edge and outputs going to a network video recorder or access control system. As concepts of the Internet of Things (IoT) trickle down into the security marketplace, edge-based deployments will become more common, supplying real-time actionable information, and avoiding a flood of unstructured video data. Ethical recognition Oosto helps users deploy, set up, and calibrate the system; then, it is managed by the customer based on their needs. Privacy features are built into the system, part of the company’s commitment to “ethical” facial recognition. The technology, in general, has changed a lot since early implementations a decade or so ago failed to perform as promised. Expanded capabilities are fueled by developments in deep learning. Privacy features Facial recognition can help end-users identify people of interest but is specifically designed not to violate anyone’s privacy. There are no databases or watch lists involved; the user typically compiles their selection of “bad actors” against which facial recognition algorithms can be compared. While Oosto provides a valuable tool, the end-user customer decides how to deploy that tool in their business, says Amidi. Oosto's “liveness detection” deploys algorithms to analyse images from video and/or 3-D cameras Liveness detection Recently, Oosto has adapted the approach to provide access control; too, including “liveness detection” that deploys algorithms to analyse images from video and/or 3-D cameras to ensure a presented face is not a printed image or mask. Their latest software release is a single platform aimed at recognising and providing insights into how people behave in physical spaces. New functionality includes the ability to detect unknown individuals entering restricted areas. Neural net algorithm Improved facial recognition functions well even for those wearing masks. A new neural net algorithm improves accuracy when identifying those wearing masks and the system can alert if a person is not wearing a mask (to aid compliance). Expanded video forensics features, designed to expedite investigations, include an ability to do in-depth searches on captured video related to body attributes, colour of clothing, etc. Recognition algorithms How well can Oosto recognise a face among 20 different people on a casino floor? It all depends on variables, such as the number of people, lighting, and angle of view, image quality, and even networking issues. Recognition algorithms are “trained” using data collected from real-world use cases; training takes place in the lab environment. The system can adapt to various lighting conditions, such as in a glass-enclosed lobby in the morning versus in the afternoon. As people enter an area, they may be looking down at their smartphones, for instance, which would mean some of their faces would not be in view. Such variables impact accuracy. Test requirements of a system apply to each specific customer and can be adjusted and tweaked as needed Customisable system Each customer must decide their parameters regarding how to best use the system, with the fewest acceptable number of false alerts, in real-time, and using existing infrastructure. Test requirements of a system apply to each specific customer and the system’s sensitivity and other operational factors can be adjusted and tweaked as needed, including at any time after a system has been installed. Meeting specified application “No customer is alike, so the needs of each customer’s system are unique,” says Amidi. For example, some situations might have a higher tolerance for false alarms, such as when there is an operator available who can make the final decision on whether a face matches. In other situations, such as when there is a missing child, false alerts are a bigger problem, and rapid response is especially of the essence. “What we give customers out of the box applies to any scenario, and customers can tweak the system with the click of a button to meet a specific application,” says Amidi. “We empower our customers to understand the pros and cons so they can react in real-time.” Identity management Oosto can help to enhance the customer experience by identifying important customers Oosto sells through systems integrators and has a partnership program with more than 150 integrators worldwide certified to manage and install systems. Oosto targets Fortune 500-size companies in financial services, gaming, and retail. The system helps to create a safe environment that is devoid of any “bad actors.” Alternatively, Oosto can help to enhance the customer experience by identifying important customers that warrant special treatment. The system also can provide an alert if any unauthorised person enters a restricted zone; that is, anyone who is not an employee, a registered visitor, or a contractor. Understanding technology In many parts of the world, facial recognition is widely accepted and used for applications such as payment and access control. Anxiety about technology, especially in the United States, is based on a lack of understanding. The public needs to “be better educated” on the subject, and Amidi expects the technology to become more socially accepted over time. “It’s a tool, and it needs to be supervised,” says Amidi. “From a technology perspective, we trust the accuracy. It just needs to be better explained.”
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximise convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organisations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimise the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Case studies
Orion Entrance Control, Inc wanted to remove friction and frustration for their integrators and end users with a single-source reader that could support any RFID technology and fit seamlessly into their turnstiles and other physical access control (PAC) products. The reader needed to be able to: Provide reliable and secure user identification and access control with excellent read range. Read all of the RFID card technologies their clients might be using. Have a compact form factor and sleek design for integration with their PAC products. Enable remote updates to support changing client requirements. Integrated access solutions Orion Entrance Control creates software, hardware, and infrastructure solutions for physical access control (PAC), occupant sensing, and visitor management. They develop access control software and manufacture high-end turnstiles, speed gates, swing gates, optical door alert systems, and other security solutions. Founded in 2009, they pride themselves on engineering and product excellence, with all of their products manufactured locally near their New Hampshire headquarters. They work with distribution partners and integrators to bring their access solutions to large commercial clients worldwide in education, healthcare, manufacturing, and other industries. One of Orion’s priorities is offering seamless, integrated access solutions that minimise friction for integrators and are simple and reliable for end users. They wanted an RFID reader that would support any RFID technology and be easily integrated into their turnstile products. Challenges faced by Orion Turnstiles and other components provided by Orion need to work within the access systems already in use Orion has 32 different turnstile products, from full-height mechanical turn gates to classic tripod turnstiles, to high-speed retractable barrier gates. An RFID reader embedded into the turnstile reads user credentials (e.g., an ID badge or mobile credential) and connects to the back-end software that verifies access authorisation levels. Both their US and international customers use various RFID transponder technologies. Turnstiles and other components provided by Orion need to work within the access systems already in use by their customers. Traditional credentialing system Traditionally, Orion would work with integrators to determine the credentialing system the customer needed and then order the corresponding readers. This created delays for installers as they waited for the right readers to arrive. It also created complexity in Orion’s supply chain, as they had to manage inventory from multiple reader manufacturers. When the pandemic disrupted supply chains for some of their suppliers, they knew they needed to look for another solution. Read-range challenges At the same time, RFID reader read range was becoming a critical issue for many clients. More sophisticated reader technology and encryption create read-range challenges for some readers, especially when embedded under glass within a turnstile. This creates frustration for end users and slows down entry queues. Need for a standardised reader solution Working with multiple reader manufacturers, each differently sized and shaped readers, created engineering challenges They also needed a standardised reader solution that would fit any of their turnstile products. The architectural community has pushed for smaller, more streamlined turnstiles, so embedded systems must be highly compact. Working with multiple reader manufacturers, each with differently sized and shaped readers, created engineering challenges for Orion and headaches for installers. All of this resulted in more work for integrators and more delays for buyers. Need for a frictionless access range "We were looking for a reliable reader that had a great read range, could accept everyone’s credentials, and would be ready to go when you fit it in the turnstile," said Jerry Waldron, Customer Care Manager, Orion Entrance Control. "It’s one more thing we can do to remove friction and provide better service to our customers." Orion's reader requirements Orion Entrance Control, Inc. wanted to remove friction and frustration for their integrators and end users with a single-source reader that could support any RFID technology and fit seamlessly into their turnstiles and other physical access control (PAC) products. The reader needed to be able to: Provide reliable and secure user identification and access control with an excellent read range. Read all of the RFID card technologies their clients might be using. Have a compact form factor and sleek design for integration with their PAC products. Enable remote updates to support changing client requirements. Solution: ELATEC TWN4 Palon family of readers The Palon Compact Panel Reader features robust panel housing suitable for indoor and outdoor use The ELATEC TWN4 Palon family of readers fits the bill. The versatile readers are designed for seamless integration into third-party products and devices. Palon supports advanced interfaces (including RS-232, RS-485, USB, and more) and is simple to mount and install. The Palon Compact Panel Reader features robust panel housing suitable for indoor and outdoor use and a classic design that fits seamlessly into Orion’s turnstiles. They also have the option of using the TWN Palon Compact M reader, which comes without housing. RFID and smartphone credentials The TWN4 Palon line supports 60+ transponder technologies, including both low- and high-frequency RFID and smartphone credentials via near-field communication (NFC) or Bluetooth® Low Energy (BLE). This gives Orion the flexibility to support virtually any existing transponder technology its clients use with a single reader. Customer experiences "One of our most important values is creating remarkable customer experiences," said Steve Caroselli, Chief Executive Officer and President, of Orion Entrance Control. "We want to provide more than they expect and deliver a product with exceptional quality. With ELATEC, we’ve found a partner that shares that core ethos." Read range and reliability Palon reader acts as a data converter to connect the barcode reader to the Weigand interface, simplifying cabling ELATEC’s readers provide excellent read range and reliability, reducing frustration for users and system managers. ELATEC was also able to help Orion integrate the Palon readers with a barcode reader to meet a customer’s requirements. In that instance, the Palon reader acts as a data converter to connect the barcode reader to the Weigand interface, simplifying cabling for the installer. The integrated system supports barcodes for visitors and RFID for employees for a unified access experience. Flexibility “ELATEC gives us the flexibility to serve all our clients and the confidence that we’re going to be able to deliver a product that just works," said Steve Johnston, Director of Sales and Marketing, Orion Entrance Control. "We know that when it shows up on-site, it’s going to be a good experience for the installer and the owner of the company.” Benefits for ELATEC readers A universal reader allows Orion to reduce friction for clients, installers and distribution partners, and their people. Orion can support all their customers with the same RFID reader, simplifying sales, supply chains, inventory management, installation, and support. The sales team no longer must confirm in advance which transponder technology the end customer needs, the TWN4 Palon supports them all. And the engineering team can eliminate the headaches inherent in trying to fit readers with different form factors into their products. Single-part number solution ELATEC’s readers support fast, contactless reconfiguration after installation via a configuration card A single-part number solution reduces the time it takes to get the right system into the hands of installers and end customers. It also provides flexibility for the future. ELATEC’s readers support fast, contactless reconfiguration after installation via a configuration card or remote update. That means that it’s easy to update the readers for clients who add a new transponder technology, integrate mobile credentials into an existing system, or upgrade their security standards. Their turnstile and door access solutions are ready for the future. Seamless access experience Orion also appreciates the service and support they get from ELATEC. ELATEC has a production capacity in the U.S., which eases Orion’s supply chain worries. With ELATEC’s support, they can offer their customers a truly integrated PAC solution that provides a seamless access experience.
Exabeam, the pioneer in Next-gen SIEM and XDR announced that it has been chosen by Deloitte to help operationalise Managed Extended Detection and Response (MXDR) by Deloitte in an expansion of the existing Exabeam-Deloitte alliance. MXDR by Deloitte is a suite of managed security services and solutions for cyber threat detection and response that aims to help organisations address growing threat complexity, simplify cybersecurity total cost of ownership, and achieve meaningful and measurable cyber resiliency outcomes. Cybersecurity and automation “Exabeam is hands-down the leading user behaviour analytics solution focused on the security market. Our cybersecurity and automation capabilities will help Deloitte clients quickly and more effectively detect, investigate, and respond to the increasingly dangerous approaches of global adversaries,” said Exabeam President Ralph Pisani. “We look forward to helping Deloitte clients as they leverage our open API environment and strengthen their security programs via tailored use of MXDR by Deloitte.” User behaviour analytics solution Exabeam’s security-focused user behaviour analytics and automation capabilities will be integrated into MXDR Exabeam’s security-focused user behaviour analytics and automation capabilities will be integrated into MXDR by Deloitte to provide military-grade insider threat and incident response capabilities. Exabeam modernises today’s security operations centres (SOCs) by automating the entire threat detection, investigation, and response (TDIR) workflow for security teams, greatly accelerating the time it takes to conduct deep investigations and resolve security incidents across their organisations. Threat and incident response “We asked Exabeam to be part of MXDR by Deloitte because we want our clients to be confident that they can more quickly detect and remediate anomalous — possibly adversarial — activity permeating their networks,” said Curt Aubley, MXDR by Deloitte leader and a Deloitte Risk & Financial Advisory managing director, Deloitte & Touche LLP. “We’re passionate about helping Deloitte clients drive better business and cybersecurity outcomes to help future-proof their evolving security strategies.” Zero Trust identity management systems Evolution of existing services and solutions by Deloitte with technologies including XDR, AI, and automation Evolution of existing services and solutions by Deloitte with more advanced technologies including extended detection and response (XDR), artificial intelligence (AI), and automation, MXDR by Deloitte is delivered 24x7x365 by security operations centres both in the U.S. and globally using FedRAMP-authorised and commercially-available capabilities. Suite modules provide advanced and proactive analytics to perform more in-depth detection combined with the continuous response, including prevention, detection, and remediation for endpoints; cloud security workloads; Zero Trust identity management systems; insider threat, proactive hunting, intelligence, attack surface, and vulnerability management; and unified log and analytics management. Network security In 2021, Exabeam was named one of the world's fastest-growing technology companies in Deloitte’s Technology Fast 500, was featured in Inc.’s first annual Best-Led Companies list and 2021 Forbes Cloud 100, and won the 2021 CISO Choice Award in Network Security. Also, for the third consecutive time, Exabeam is a pioneer in the Gartner MQ for Security Information and Event Management (SIEM) and was recently recognised as a Customers’ Choice in the 2021 Gartner Peer Insights ‘Voice of the Customer’ in the SIEM category for its Exabeam Fusion product line.
IDEMIA I&S North America, the identity security and authentication solutions provider, announced the first-of-its-kind travel platform, ID2Travel is launching in North America. ID2Travel is the only interoperable traveller identity platform covering the entire passenger facilitation ecosystem, already proven by IDEMIA and partners around the globe. Identity management and biometric identification Based on identity management and biometric identification, ID2Travel is a passenger facilitation solution that improves the traveller experience to deliver efficient, secure, and frictionless travel. The platform is interoperable and can be deployed as part of the airport, airline, port, or any travel-based infrastructure, or through IDEMIA’s patented and National Institute of Standards and Technology (NIST)-rated biometric capture solutions. The passenger experience from check-in and across every touchpoint in the travel experience uses identity proofing that leverages mobile enrollment with secured digital credentials on the traveller’s mobile device, biometric devices, and technology back-end services. Frictionless passenger experience ID2Travel offering in North America improves passenger flow and maintain a touchless experience" "ID2Travel is transforming the entire travel experience. Prior to COVID, Americans took approximately 2.3 billion trips, over a one-year period, and this makes the need for the passenger experience to be even more frictionless and seamless as we return to pre-pandemic travel patterns." "With that experience and privacy in mind, the timing couldn’t be more ideal to launch our ID2Travel offering in North America to improve passenger flow and maintain a touchless experience, while balancing interoperability throughout the broader travel ecosystem," said Lisa Sullivan, Senior Vice President, Travel and Transport, IDEMIA I&S North America. Personal identity information Passengers can enroll using a mobile device from home by scanning a state ID or passport, and then taking a selfie to do a 1:1 match. Once submitted for enrollment, travelers will be able to use biometrics to securely and simply move through the airport to their gate and beyond in their travel experience. The IDEMIA solution also allows passengers to opt-out and remove their enrollment at any time and all data is immediately removed from the system, empowering the traveller to take full control of their personal identity information (PII). IDEMIA is the only company that has successfully delivered a complete biometric enrollment to gate frictionless passenger facilitation solution (Fast and Seamless Travel at Changi by IDEMIA, Aéroport Paris Orly, a biometric journey from check-in to boarding, Iceland’s Comprehensive Entry/Exit System with IDEMIA).
SAFR from RealNetworks, Inc., the premier facial recognition platform for live video, has been selected as the facial recognition technology provider to support the Japanese government’s evolution from paper documents to digital “My Number” ID cards with face-based authentication infrastructure. Part of a larger digital transformation, My Number cards represent a new digital identification system designed to streamline and expand access to government services for Japanese citizens and residents. My Number card reader The solution will be rolled out to hundreds of thousands of hospitals, clinics, and pharmacies over the next two to three years. The My Number Card Reader provides online confirmation that supports My Number insurance cards together with facial recognition authentication supplied by SAFR. Certified system integrator Nextware, developed the card reader integration using SAFR’s lightweight and highly accurate facial recognition algorithm. SAFR was chosen because of its speed, precision, and extremely low bias about skin tones, age, and gender. SAFR enables face recognition with little variation in authentication accuracy based on its deep learning" Accurate online authentication “In developing a card reader with face recognition to be used for online authentication, we needed the best facial recognition system available,” commented Mr. Takayoshi Toyoda, President, and CEO of Nextware Co., Ltd. "SAFR enables high-precision face recognition with little variation in authentication accuracy across gender, age, and race-based on its deep learning of about 10 million images. The availability of a device-embedded development kit enabled rapid development of the product.” Identity management in the healthcare system The initial rollout of My Number cards provides access to Japan’s universal healthcare system by allowing citizens to confirm their identity and medical information with specialised card readers and facial recognition features. As part of the new initiative, residents will no longer require multiple ID cards to access different government services. My Number cards contain an IC chip that stores a digital photo of the user. The My Number Card Reader reads the photo information and authenticates the user utilizing SAFR facial recognition even if the user is wearing a mask. The initiative significantly reduce resources and costs associated with the administration of healthcare information Reduces cost and errors The new initiative is expected to significantly reduce resources and costs associated with the administration of healthcare information while increasing convenience and access for all citizens and residents. The new digital system will also enable health providers to access accurate historical medical data reducing treatment time and avoiding costly errors. Digital transformation “We are happy to announce that SAFR facial recognition technology has been chosen for this important digital transformation project by the Japanese government,” said Noriaki Takamura, VP, APAC, SAFR. “Many Facial Recognition companies were considered, but SAFR’s excellent performance, high speed, small technology footprint and focus on privacy made it the ideal choice for this application.”
The Empresa Malagueña de Transportes (EMT) manages a fleet of 242 vehicles, distributed across 47 lines in a city of almost 570 thousand people in the south of Spain. They also have a customer service office in the city centre. EMT monitors the entire transportation system from a single command centre run by a 4-inspector team. The team leverages the city’s network of approximately 80 traffic cameras as well as proprietary cameras installed in strategic places and inside the vehicles themselves. EMT needed to be able to monitor the inside of the vehicles in real time, and switch quickly between feeds throughout the transportation network. Different display technologies Drivers can activate an alarm that automatically ensures the feed from that vehicle is monitored in the command centre, enabling the surveillance team to assess and prevent potential threats to public safety by making mission-critical decisions at the push of a button. EMT needed a solution that was flexible with the ability to pull in multiple sources of content EMT needed a solution that was flexible with the ability to pull in multiple sources of content from the many different feeds throughout their network and quickly switch among them. They also needed something that was simple to use, that their team of inspectors could quickly learn to operate. Finally, it had to be cost effective. After careful review of different display technologies—including specialised hardware solutions for video walls, as well as digital signage—the team at EMT learned about Userful’s Visual Networking Platform solution. Right away, they appreciated the simplicity and flexibility of the solution. Video wall space “The support for real-time interactive content, seeing how simple it was to manage and the ability to easily switch content sources between displays, was what really convinced me that Userful was the solution we were looking for,” said EMT Systems Engineer, Jose Manuel Fernandez. Userful fit EMT’s needs perfectly because it’s able to handle a virtually unlimited number of inputs and it easily scales the number of outputs it can offer. This is unique in the video wall space and is a result of Userful’s innovative architecture. Userful leverages the network to deliver content from the PC onto the video wall(s). With Userful, a single PC can support a video wall of up to 100+ displays. Each display has a simple, cost-effective zero client device on the back that connects to the PC through the local area network (LAN). External content sources The integration for virtual machines in the system made the solution even better for us" Userful software turns that PC into an appliance that is easily managed through a browser. Using the browser-based interface, customers can easily pull content from almost any available source including network sources in real time. The solution can display everything from video to a full-screen browser to a desktop and even a series of virtual desktops (multiple independent desktop sessions running on the same PC). According to Fernandez, “The integration for virtual machines in the system made the solution even better for us.” In the command centre, Userful deployed a 3x3 video wall with nine 55” LG commercial displays, all running from a single Intel Core i7 PC with 32 GB of RAM, which is securely located away from the wall itself in a locked room, with a controlled environment—helping to prolong the PC’s lifespan. EMT added HDMI capture cards to pull in external content sources to display on the video wall in real time. Public regarding fares After deploying the control room system, the EMT deployed a 2x2 video wall at the customer service office in downtown Malaga, which is managed and operated remotely from the main office, and displays information to the public regarding fares, schedules and additional information. Through their different functions, these deployments offer refreshed internal and external visualisation and the flexibility to display content and notifications in real time. The EMT deployed a 2x2 video wall at the customer service office in downtown Malaga The solution was functional out of the box and the easy configuration enabled a smooth transition, with minimal downtime. Throughout the engagement, EMT has been very happy with the quality of technical support—any questions they had during installation were promptly answered via phone or text, with subsequent follow-ups to ensure the highest performance of the system. Supporting additional displays The EMT has achieved their goal of refreshing both the command centre and customer service office with better visualisation, more simultaneous cameras on display and the flexibility to show desktop content and online notifications in real time, effectively optimising internal and external communication. With Userful, the EMT can expand their command centre as their fleet grows. When they need to add more displays, they simply add more zero clients onto the network and the PC they’ve already deployed will support the additional displays. Now they can continue to grow without needing to undergo a big expansion project.
Vision-Box, a world pioneer in biometrics seamless travel, automated border control, and digital identity solutions has announced the launch of a Frontex awarded trial to implement an innovative pilot project at two land borders in Bulgaria, in the context of the EU Entry/Exit System (EES). The EES is a landmark framework set to replace traditional border controls of Third-Country Nationals with interoperable digital data processing and automated biometric data collection in 2022. The Frontex pilot, which went live in June 2021 in Bulgaria in collaboration with the Ministry of Interior and the Border Police will be for coaches, cars, and pedestrians at the entry of Kapitan Andreevo BCP from Turkey for phase 1, and exit at Kalotina BCP to Serbia for phase 2. Impact on border crossing points The implementation of the EES will influence the flow of travellers and the technology deployed at the border to collect the required data, to cope with the variety of sites and related complexities. This effect will possibly be more important at the EU land border crossings, which are more constrained environments as compared with airports and ports, as many travellers arrive in their vehicles. Therefore, the introduction of EES will have a significant impact on travellers’ flow at those border crossing points (BCP). Self-Service Enrolment System Self-Service Enrolment System executes real-time intensive queries into the Bulgarian national border control systems The purpose of the pilot project is to deliver a Self-Service Enrolment System to enable travellers to perform a self-service collection of travel document data, biometric data, and other information (e.g., questionnaire on entry conditions). It also executes real-time intensive queries into the Bulgarian national border control systems, in combination with an EU EES backend simulator. After the enrollment, travellers are invited to go to an open corridor and be identified on the move to directly cross the border, or to be redirected to the manual control booth to be verified by a border guard with last generation Coppernic handheld technology. EES Frontex pilot The secured linkage and encrypted communications with the national and EU border control systems, performing border checks on all travellers and EES registration/verification on third-country nationals, are jointly performed by Vision-Box and the respective border agencies. The EES Frontex pilot applies to short-stay visa and visa-exempt third-country nationals as well as EU citizens entering or leaving the European Union. Eliminates manual data collection and verification The pilot ecosystem (enrolment kiosks, biometric corridor, handheld tablets) is powered by Vision-Box’s award-winning Orchestra™ Identity & Border Management Platform. Orchestra™ removes the time-consuming task of manual data collection and verification, meaning that travellers do not need to physically interact with touchpoints or manually exchange travel documents and biometrics at counters. Touchless process The whole process leverages identity and biometrics tokenisation to digitise the operation in a touchless manner. This also reduces long queuing at checkpoints and curtails crowding at clearance hotspots, allowing travellers to navigate the border a lot quicker and safely with biometric recognition technology. Facial recognition & fingerprint sensors Facial recognition biometrics offers the highest level of convenience for traveller identity proofing Facial recognition biometrics offers the highest level of convenience for traveller identity proofing, in compliance with the EU regulations, combined with touchless fingerprint sensors for combined verification against the EU EES biometric backend systems. The solution drives significant improvements over the traditional manual and touch-based identification procedures in terms of hygiene, accuracy, and privacy protections. EU GDPR compliant The powerful Orchestra™ Service Platform is compliant with EU GDPR through its unique Privacy-by-Design certification. It operates under user-centric business rules and is the kernel of the advanced management of Identity proofing and flow monitoring of traveller processes at the border. The platform’s powerful capability allows it to process the full extent of national border passenger volume, thanks to its future-proof scalable design and resilient architecture. Maintaining the pilot For this pilot delivery, Vision-Box has hired the services of PwC Luxembourg, to help sustain the definition of the use cases, their testing, and overall pilot reporting. In addition, Bulgarian system integrator - Global Sat, is supporting Vision-Box in the deployment of the solution on the ground and its maintenance during the overall 6 months’ operation of the two pilot phases at the two different land borders. Exploring Frontex pilot Speaking about the pilot project, Jeff Lennon, Vice President Strategic Sales & Global Partnerships at Vision-Box, said: “We are thrilled to run this Frontex pilot for exploring the future of EES in Bulgaria and Europe, in partnership with the Ministry of Interior and the Border Police as long-time customers, PwC and Global Sat.” Maximises process efficiency “This innovative undertaking will allow all of us to stress-test ground-breaking technology in a very challenging environment, yet at a small scale. It will also help us establish the foundations for expanding the technology at the national level for any type of land border environment, minimising the footprint of the solution at stake while maximising the process efficiency for the border guards and the travellers.” “This is also a great opportunity for understanding the flow of border-crossings at two of the largest EU land border sites, to effectively expand our solutions in the EU context for Smart Borders as we are already doing in Finland since 2019 among other EES projects with additional member states.” Collaborative testing with EES Frontex and Bulgarian's authorities collaborate in testing the European EES at two critical land border control points" Serge Hanssens, Partner at PwC for Smart Borders said: “Frontex and Bulgarian's authorities collaborate in testing the European Entry-Exit System (EES) at two critical land border control points in Europe.” “This is a unique opportunity and milestone to try out these new processes in real conditions. PwC Luxembourg is so pleased to be part of the adventure supporting Frontex and Bulgarian's authorities to make the EES deployment a success; securing the entry and exit to the European Schengen Area of all third-country nationals." Automated border control Tsvetan Mutafchiev, Executive Director at Global Sat said: “We at Global Sat are excited to be part of this very innovative PoC project. EU land border crossings create several new challenges for automated border control due to the specifics introduced by different types of vehicles used by passengers.” System integration “We do believe that the pilot project will successfully prove the concept of the Vision Box‘s platform and will also provide valuable feedback from Bulgarian border police officers. The implementation of self-service enrolment systems, when applied in full scale at the EU's external borders, will facilitate efforts against illegal migration and will contribute to the security of European countries with a full commitment to personal data protection.” “The Global Sat team is proud to be at the forefront of this endeavour. With our experience as a system integrator, we will continue to contribute to its success.” Safe and efficient travel Vision-Box’s technology is proving crucial in guaranteeing safe and efficient travel processes With the industry expected to resume travel as restrictions begin to ease, Vision-Box’s technology is proving crucial in guaranteeing safe and efficient travel processes. Over the past months, Vision-Box has also inaugurated Automated Border Control eGates at Malta International Airport in collaboration with the Malta Police Force, implemented an integrated Biometric experience for Emirates Airline at Terminal 3 of Dubai International Airport, and secured a regional strategic partnership with AirAsia Group, to implement industry-leading, identity management technology across its network of 152 airports.
Round table discussion
Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than done, and mobile credentialing, for all its advantages, also has limitations, which further innovation continues to address. Wider acceptance comes next, driven by use cases in various vertical markets. We asked this week’s Expert Panel Roundtable: What are the latest developments in mobile access control?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download