Lenel-ActivIdentity Joint Solution
Lenel-ActivIdentity Joint Solution

Lenel has partnered with ActivIdentity to jointly market a solution for physical access to facilities and logical access to networks.  The joint solution offers many benefits, including increased security and lower total cost of operation.  In addition, the Lenel-ActivIdentity solution will be a primary component for a corporation’s efforts to achieve compliance with regulations such as Sarbanes-Oxley and HSPD-12. The ActivIdentity Enterprise Access Card consolidates employee logical credentials onto a single, secure smart card.  This provides a photo ID as well as a security device that enables secure Windows and network login, PC 'locking', secure remote access (VPN), secure email with digital signatures, and single sign-on to enterprise and desktop applications.The Lenel OnGuard® ID CredentialCenter™ application consolidates employee physical credentials, biometrics, and demographic information onto a single secure smart card, captures photo ID and prints the card.  The Lenel OnGuard security platform offers seamlessly integrated access control, alarm monitoring, identity management, digital video, intrusion detection, asset management, card production, and visitor management.The joint solution integrates the issuance and administration of cards and credentials for both physical and logical domains, and combines a photo ID, smart card and proximity card onto a single, easy to use device.  With the importance of physical and logical security, the integration of the Lenel and ActivIdentity products allows complete life cycle management of the credential.See the ActivIdentity Architecture diagram

Add to Compare
TDSi’s EXgarde V.4 Access Control Software Reflects The Increasing Need For Advanced Integration
TDSi’s EXgarde V.4 Access Control Software Reflects The Increasing Need For Advanced Integration

In the past the Access Control industry was a relatively straightforward one. Vendors supplied access control systems to installers who in turn organized and fitted solutions which were primarily concerned with securing doorways and controlling the flow of people traffic to restricted parts of the premises. But like most parts of the security industry, the Access Control sector has evolved and the industry is looking to expand their offering to add more value for money than ever before. For some this would have been unthinkable even a few years ago, but now successful companies have to think outside the traditional boundaries to meet the constantly evolving expectations of the market. Integration is a word that is mentioned time and time again in relation to Access Control – and with good reason! The IP revolution has become just as central to this sector as the rest of the security and wider technology world and has shaped the expectations of customers. Far from being a novelty, any system that doesn’t integrate with other IP systems at some level is now considered unusual. The move towards integration means that mutually communicative systems are essential, with the likes of Microsoft Active Directory becoming a central hub to all kinds of company systems from security to Human Resources and Facilities Management systems. As an extension to this, there are also demands for solutions that can still incorporate older legacy systems, which in all likelihood would never have been designed with this kind of integration in mind. For example, a company that has a large installation of analog CCTV cameras (which may well still have a high degree of their effective lifecycle remaining) is unlikely to want to tear them all out in favour of more modern IP megapixel cameras, just for the sake of having new ones. Modern integrated systems can deal with these integration issues, but it is something that installers need to be sympathetic to, offering solutions that will save their customers wasting budget and will offer tailor-made, highly relevant solutions. The modern business world is largely responsible for driving the need for integration. Security and the ability to monitor and prove it are high priorities, but so is doing it effectively on tighter budgets. Rather than seeing it as a potential stumbling block, the Access Control industry needs to see the opportunities to offer customers a sizable and crucial part of the wider security offering. Schools are a good example of the need to integrate all the security systems to protect potentially vulnerable users. Modern educational establishments usually use a dedicated Schools Information Management Systems (SIMS) which gives a single point of administration and reference. With this at the heart of the establishment, the opportunities and benefits from creating a two way communication between the SIMS and the access control systems is obvious. For an installer there may be a temptation to sell the school a simple, standalone access system (particularly when budgets are under such close scrutiny), that offers lower upfront costs with a simpler installation process - yet there is a superb opportunity to offer a hard working solution that may cost more up front, but will really make good use of existing systems, offering far bigger rewards and helping to future-proof itself for considerably longer. The concept of thinking outside the box can apply on many levels. Access Control is closely linked to security and yet an integrated system can be as much a part of the management of the wider buildings’ control systems. If a people counter system can be used to ensure perimeter security access isn’t breached, then why not use it to control heating and ventilation? Closely controlling these systems minimizes the waste of resources whilst ensuring users still get the services they need. Another area that is ripe for the help of Access Control as a value-add is Health and Safety. Being able to monitor the number of people who enter a controlled area also means a close eye can be kept on occupancy. Not only can this control the access of unauthorized people, it also monitors if a lone worker is present in a potentially hazardous area for example, alerting other members of the team that there may be a risk to their safety. Linked to this, it can also be an integral part of compliance, logging when staff are present in a hospital or a prison for example, integrating directly with the employment management system to provide highly accurate and secure information. The humble MIFARE card is another industry standard that can actually offer users a great degree of flexibility and empowerment beyond its Access Control role. The secure identity information held on the card can easily be accompanied by additional authentication details which are just as safe. Businesses or organizations that require a number of different secure functions (such as a university campus for example – which may offer library, gym membership and EPOS systems for retail) can use a MIFARE card as a single confirmation token. The appeal for our customers is that it reduces cost by utilising existing system investments to provide new services, whilst being relatively simple to implement. These examples of ‘Thinking outside the box’ could just be the tip of the iceberg as new technologies are waiting to grab the market. Near Field Communications are rapidly coming into focus as a security tool, building upon the popularity of smartphones and mobile devices on which they are deployed. This is an exciting technology as it utilizes a ubiquitous everyday device to offer secure and convenient authentication which as mentioned above, can have a myriad of different uses well beyond the traditional access control arena. Biometric authentication is another area that is coming on in leaps and bounds. Being able to use a fingerprint, retina scan, facial recognition, sub dermal scan or even the analysis of the circulatory system, frees users from having to carry a token and yet offers even tighter levels of security. These levels of security will make it even easier to integrate different systems and the idea of limiting the potential of access control will seem like an anarchistic relic of a bygone age.  

Add to Compare
IData SoHo - The New Stand-alone Iris Recognition Platform From LG Iris
IData SoHo - The New Stand-alone Iris Recognition Platform From LG Iris

LG Iris Technology has been the key developer and driver of the commercialisation of iris recognition technology.  LG IrisAccess, now in its third generation, is the world's leading deployed iris recognition platform.  LG's biometric solutions, enabling non-contact and highly accurate identification by the iris of the eye, deliver security, convenience, privacy and productivity to millions around the world.  The LG IrisAccess platform identifies more people in more places than all other iris recognition products combined.LG IrisAccess 4000 solution is versatile and flexible providing easy integration and expansion.  Enrolment and recognition are also easier than ever.  An intuitive user interface, with visual and audible prompts, enables users to be quickly enrolled and identified.  Dual iris capture and a power, auto-tilt mechanism increases speed and convenience by adjusting for height with one simple touch.Combining LG's IrisAccess 4000 and the new iData SoHo software solution from LG's suite of identity access control applications provides a simple, flexible and robust solution for any environment.Features include:Enrolment: iData SoHo provides the system administrator with a flexible interface to enrol individuals in the database with a simple user interface.Setup: iData SoHo provides a simple configuration solution, as the system has the ability to configure itself via DHCP.  Alternatively, the system provides the option to set static IP addresses. An administrator can also control a relay to activate a door strike, or reset permissions.  Wiegand formats up to 128 bits are supported.Reporting: iData SoHo is designed to identify individuals as their biometric is presented.  All transactions are stored in the system log and can be accessed by the system administrator for download, review and printing.

Add to Compare
Cognitec Awarded Contract By German Federal Criminal Police Office
Cognitec Awarded Contract By German Federal Criminal Police Office

Cognitec Systems, the leading provider of face recognition technology and systems, announced that the company had been awarded a contract to provide software and services to the German Federal Criminal Police Office (Bundeskriminalamt - BKA) after winning a pan-European tender.On the basis of photographs and video material, Cognitec's face recognition software will support the research and identification of unknown suspects.  This kind of procedure will mainly be used when identification attempts using fingerprint or DNA have failed or are unsuitable.  Research in a central, digital photo archive to identify a criminal will help in cases where only a photograph of an unknown suspected person exists. The Federal Criminal Police Office will use Cognitec's software and respectively such type of research in a number of occasions, such as the tracing down of persons who, in the cause of the investigation, appear suspicious by using fake personal documents or payment cards or, for instance being involved in bank robberies.  It will also be used for the identification of missing and helpless persons.Alfredo Herrera, Managing Director of Cognitec Systems GmbH said: "We are delighted that Cognitec was chosen for this important project by the Federal Criminal Police Office and that we are given the chance to provide them with our latest facial recognition technology.  Cognitec is convinced that our system works on the highest level when it comes to speed and reliability and will turn out to be an indispensable tool for the daily work of the Federal Criminal Police Office."

Add to Compare

Browse Access Control Softwares

Access control software - Expert commentary

Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)
Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.

How AI Is Revolutionizing Fraud Detection
How AI Is Revolutionizing Fraud Detection

The Annual Fraud Indicator estimates that fraud costs the United Kingdom approximately £190 billion every year. The private sector is hit the hardest and loses around £140 billion a year, while the public sector loses more than £40 billion, and individuals lose roughly £7 billion. The effects of fraud can be devastating on both individuals and organizations. Companies can suffer irreversible damage to reputation and be forced to close, and individuals can experience significant personal losses. Everyone should be aware of the risks and take steps to protect themselves against fraudulent activity. Fraud detection technology Fraud detection technology has advanced rapidly, over the years and made it easier for security professionals to detect and prevent fraud. Here are some of the key ways that Artificial Intelligence (AI) is revolutionising fraud detection - with insight from Tessema Tesfachew, the Head of Product at Avora. An anomaly can be described as a behavior that deviates from the expected An anomaly can be described as a behavior that deviates from the expected. According to Tessema Tesfachew, “Autonomous monitoring and anomaly detection specifically, have made detecting fraudulent activity faster and more accurate. Machines can monitor data 24/7 as it comes in, build patterns of behavior that take into account seasonality and shifting trends, and identify events that don’t fit the norm.” For example, banks can use AI software to gain an overview of a customer’s spending habits online. Having this level of insight allows an anomaly detection system to determine whether a transaction is normal or not. Suspicious transactions can be flagged for further investigation and verified by the customer. If the transaction is not fraudulent, then the information can be put into the anomaly detection system to learn more about the customer’s spending behavior online. Accurate root cause analysis Root cause analysis goes one step further than anomaly detection, by allowing security professionals to pinpoint what caused the anomaly. Tessema explains how an example of this would be if a system detects that the rate of fraudulent transactions has increased. Root cause analysis would pinpoint the specific ATM or point of sale, where this increase is occurring. Swift action can then be taken to prevent fraudulent activity at that location in the future. Fewer false positives As mentioned, false positives can occur if a fraud detection system identifies behavior that goes against the norm, for instance, if a customer makes a transaction in a new location. In many cases, customers are required to complete identity verification to prove that a transaction is not fraudulent. Digital customer identity verification can help brands build a strong and reputable image. That said, forcing users to complete identify certifications regularly can cause frustration and harm the customer experience. AI anomaly detection AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data AI anomaly detection is far more accurate and results in fewer false positives. Increasing the accuracy of anomaly detection helps companies improve customer relationships and build a strong reputation. This will have a positive impact on brand image and sales revenue. AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data. Machines are more efficient than even the most skilled fraud analysts and make fewer errors. This is why AI fraud detection software is the preferred option in larger organizations. Importance of fraud analysts However, fraud analysts still play an important role in fraud prevention. Using a combination of human intervention and AI is usually the most effective approach when it comes to fraud detection. According to pymnts.com, innovative organizations now use a variety of AI and supervised and unsupervised machine learning to identify and protect against fraud. AI systems can complete time-consuming and repetitive tasks, such as data collection and analysis. This means that fraud analysts can focus their time and attention on critical tasks that require human intervention, e.g. monitoring risk scores. AI can automate processes and enhance the quality of the fraud analysts’ work. Conclusion In to Tessema Tesfachew’s opinion, “Fraud detection has become vastly more efficient and effective with the introduction of Artificial Intelligence (AI). Previously, methods for detecting fraudulent activities were still data-rich, but relied more on human intervention and expert bias, and were thus, more time consuming and prone to error.” AI technology, particular anomaly detection, has streamlined fraud detection and created a more efficient, and accurate system for detecting and preventing fraud. Covid-19 has increased the number of online transactions, which creates more opportunities for fraudulent activity. However, it also allows businesses to gain more information on their customers and enhance the capabilities of AI security software. It is more important than ever for organizations to utilize AI technology in fraud detection strategies.

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Related white papers

Delivering a Smart, Secure and Healthy Workplace with Cloud

Facing the Ever-evolving Hacker Head-on

Four Areas to Consider in Frictionless Access Control