Ajay Jain

Ajay Jain
President and CEO, Quantum Secure, IncAjay Jain is the President and CEO of Quantum Secure, Inc, part of HID Global. where he is responsible for setting the company’s vision and strategy along with managing the daily operations. He holds an MBA from Santa Clara University, an MS in Computer and Information Science from Clarkson University with advanced courses from Stanford University.
Articles by Ajay Jain
2015 was a notable year for Quantum Secure, culminating with the company becoming part of HID Global. Growth was seen in several sectors for us, led by the adoption of our SAFE software solutions in the finance and aviation markets, among others. For the industry in general as it relates to Quantum Secure, predictive security became a more prevalent theme as organizations were tasked with not only providing more data but making sense of the data for use in improving security operations. Another transformation was seen with physical security teams who have recognized the need to show they are more a service center than a cost center. Identify Patterns And Trends To Anticipate Incidents As a pioneer in software solutions for managing identities, access compliance and provisioning access within physical security infrastructure, Quantum Secure was in a unique position to address these trends. Our software allows management to look at identities from both a physical and a logical perspective, how they interact across the organization, and what steps/measures can be put in place to mitigate any potential threats or areas of risk. Going forward, gathering data and data analysis will continue as a notable trend, enabling intelligent decision-making supported by science. In fact, organizations have only just begun to understand the importance of their data and how it can be used to create better outcomes. Information gathered from multiple data sources, systems and devices across a disparate security infrastructure can be processed and automated, and this analysis helps to identify statistical patterns and trends that can point to predictors for future incidents, enabling organizations to identify potential threats or business opportunities. Security Teams Take On Prominent Organizational Role Also going forward security will continue as a critical component in the organization. Physical security teams are taking on a more relevant business role within the organization. Solutions such as our SAFE Software Suite for PIAM (Physical Identity and Access Management) provide these professionals with tools which can help reduce costs, reduce insider threat and enhance compliance. The technology has the potential to transform security departments into proactive enterprise resources. See the full coverage of 2015/2016 Review and Forecast articles here
Automation is another hallmark of PIAM solutions, which can perform a wide variety of processes that are prone to error if performed manually Security departments in organizations face a number of threats from both internal and external sources, thus forcing security personnel to remain vigilant and aware of the growing number and scope of new and emerging risks. The most powerful weapon in this seemingly endless battle is data. Every organization has it – probably more than it can realistically handle – but many lack the tools or knowledge to wield it effectively. Common sense would suggest that every security and operational decision should be based on insights gleaned from historical data correlated with real-time information. However, the traditional approach to security has not functioned that way. Today’s alarm-based processes are primarily reactive in nature, enabling response to issues or events when they are happening or after they have occurred. Unfortunately, by that time any impact on an organization’s business, people, assets and/or reputation has already been felt. Integrating Critical Security Operations Systems In recent years, the security industry has made significant progress integrating a wide variety of systems to establish more robust security platforms. However, there has been little progress integrating critical operations systems such as HR, visitor management and others. As a result, many security breaches have occurred in environments where there was actually enough relevant data to warn of a potential risk beforehand. But with that data stored in non-integrated systems with no way to extrapolate actionable intelligence, risks can go undetected until it is too late. Predictive analysis requires analysing data over a longer timeframe – months or even years – to accurately uncover subtle, often unexpected relationships and factors an organization may not have been able to discover Simply collecting and organizing the vast amounts of security- and incident-related data is a major challenge. For many businesses, there is simply too much data to utilize it effectively; without a comprehensive approach and analysis, security processes begin to break down, leading to potential opportunities to thwart or mitigate a negative being missed. Science Of Predictive Analysis The solution to this dilemma can be found in the emerging science of predictive analysis, which focuses on analyzing the large quantities of metadata generated by disparate systems and devices across a network to identify statistical patterns and trends that provide correlation between elements. Using risk profiles based on predetermined policies and parameters, this analysis identifies predictors, also known as indicators of compromise (IOCs), which might include changes in access or behavioral patterns such as an individual entering a facility at unusual hours or locations or attempting to access unauthorized areas. This requires analyzing data over a longer timeframe – months or even years – to accurately uncover subtle, often unexpected relationships and factors an organization may not have been able to discover without a predictive system. PIAM – An Effective Security Tool This capability is a hallmark of the newest automated physical identity and access management (PIAM) solutions, which can extract the most relevant information from large amounts of data and use it to deliver actionable intelligence. As more security and non-security devices are connected to networks, PIAM systems make it easier to integrate these disparate sources to deliver a cost-effective alternative for managing various aspects of security and organizational operations that would otherwise be divided across different people, departments and systems. With advances in software and processing power, PIAM solutions make it possible to minimize or even prevent a potentially negative event, making PIAM a powerful and effective tool for improving overall security. Using IOCs, PIAM solutions flag potential threats and alert security staff, increasing the likelihood of averting or containing incidents before they result in a loss. For example, insider threat has become an increasing concern, and in some instances can be devastating. But insider threat can also be as simple as a frustrated sales rep downloading his or her contacts before leaving a company. The psychology behind these threats makes it difficult to understand and predict potential problems. This is where the combination of big data and science comes in, providing security with actionable intelligence that enables organizations to identify potential threats in real time to apply better measures and transform security from a reactive process into a more proactive and effective process. However, the intelligence PIAM solutions generate is only as good as the available data. So the more data that can be analyzed the better. For this science to deliver the most accurate and actionable intelligence, organizations must ensure their PIAM solution offers a broad range of integrations with disparate systems to provide the data required to identify predictors of potential threats, inefficiencies and other concerns. PIAM solutions deliver the actionable intelligence organizations need to transform security from a reactive to a proactive process Benefits Of PIAM While PIAM solutions excel at identifying and alerting security staff of the likelihood of possible threats, the same predictive analysis has operational applications as well. The potentially significant business benefits these solutions are capable of delivering include increased efficiency and agility, better business alignment and improved reliability in the form of better resource management, improved productivity, optimal staffing levels and higher service levels. Each of these factors raises the business value and ROI delivered by PIAM software beyond its basic – but critically important – mission of risk mitigation and prevention of incidents. Automation is another hallmark of PIAM solutions, which can perform a wide variety of processes that would be time-consuming and prone to error if performed manually, including on- and off-boarding identities, supporting regulatory compliance, conducting audits and generating reports. This further contributes to improving operational efficiencies and reducing costs. Transforming Security From A Reactive To A Proactive Process Identifying potential threats in real time allows organizations to take proactive measures to guard against incidents or breaches that may be likely to occur, and the science of predictive analysis makes this a reality. By collecting and analyzing the mountains of data generated by the growing number of networked systems and devices, PIAM solutions deliver the actionable intelligence organizations need to transform security from a reactive to a proactive process. From a business standpoint, predictive analysis can also utilize the same data to simultaneously generate intelligence management can utilize to simplify, streamline and improve formerly inefficient and error-prone business processes. Given the complex underlying science and technologies that can improve security, reduce risk, streamline and enhance operations, and enable informed business decisions, PIAM solutions clearly demonstrate the important role of science in the security world. Save
Big Data is a challenge that emerging technologies are working to address Quantum Secure 2014/2015 Review and Forecast: As demonstrated by end users’ continued desire to identify and implement technologies that provide the greatest level of protection for people, property and assets, it’s clear that security will always be a necessity. Today, customers demand strong, demonstrable ROI from those technologies and expect solutions to align with their overall business goals. For example, the C suite and the Board of Directors require metrics that show which policy works or doesn’t, which policies need refinement, or whether a solution to automate those processes is the best choice. Among the biggest pain points organizations face are compliance and concerns about threats from not just external forces, but from insiders as well. Three Top Security Industry Trends In 2015 Will Be: Predictive Intelligence. Organizations increasingly desire proactive, relevant information and predictive intelligence to help them understand, anticipate and prevent threats. Big Data. Collecting, analyzing and managing the massive quantities of data generated by intelligent systems to increase responsiveness is a challenge that emerging technologies are working to address. The Enterprise of Things. As more smart physical control devices are added to the network, the quantity of data will grow, along with the opportunity to increase security, at least for those managed at an enterprise level. In 2014, Quantum Secure saw tremendous growth across a number of sectors, including aviation, government, finance, petrochemical, energy, high-tech and healthcare. To address end user demands, we continue to form strategic and technology partnerships to create best-in-class solutions. This is part of a growing trend of vendors coming together to provide the means for customers to solve real problems, rather than selling them research-driven technology residing in ineffective siloed systems. Winners in the security industry will be those who apply business intelligence to the data they are gathering and have policies in place to not only determine trends, but to also take action. Those who look to workflow automation and predictive analytics to understand what is happening in their organization will also be winners. Conversely, losers will be those who continue to work in the fog of disconnected systems and rely on manual reporting and auditing processes. In 2015, there is simply no reason to continue these antiquated processes given all the available technologies. See the full coverage of 2014/2015 Review and Forecast articles here
Centralized PIAM provides necessary security and operational reinforcement Similar to schools, airports and other semi-public facilities, hospitals and other healthcare facilities are grappling with the new reality that dictates stronger and more enforceable access restrictions. In these new circumstances, the need for security must be balanced with the individual’s need to easily move about the hospital by allowing medical staff, visitors or contract workers to go about their business with relative ease. In this article, Ajay Jain, President and CEO of Quantum Secure, points out that intelligent and purpose-built software can provide a solution to address these concerns and can add depth to the hospital’s overall administrative safety and security operation. One software solution gaining traction among healthcare facilities is automated physical identity and access management (PIAM) software that, integrated with IT, ensures immediate updated physical access privileges for each identity, with policy-based on/off boarding that utilizes existing privilege levels. More specifically, the software provides four fundamentals of hospital security and IT needs; namely safety, control, compliance and peace of mind. Safety Hospitals never close their doors and at any time any individual can easily enter the building. In this open door environment, security officers are often the first line of defense for maintaining a safe and secure environment by managing situations and preventing incidents. However, officers cannot be everywhere and see everything. Without a more sophisticated access control system, it can be difficult to be certain that every individual is authorized to be where they are. Centralized PIAM can provide the necessary security and operational reinforcement by providing a means to create an identity in the hospital’s IT system for every individual on the premises. Visitors to the facility can be vetted by VMOs (visitor management operators) via display of a friends and family list, and once on-site, visitors can be tracked if needed. Control PIAM software, integrated with IT, ensures immediate updated physical access privileges for each identity Having the procedures in place to ensure everyone has an identity in the IT system is the first objective of PIAM software. Controlling the process with pre-defined rules and workflows that match the hospital’s operational requirements takes the solution to the next level. When integrated with the hospital’s LDAP (Lightweight Directory Access Protocol) files or other data files, the software allows the central management of a multitude of identities including patients, doctors, nurses, visiting doctors, vendors, contractors and so on. With a single point of control, errors are less likely to occur and management of the information can be more precise. It’s a totally automated system that connects existing systems, automates key processes and workflows to optimize security operations. For instance, visitors can be restricted to only areas where the patient they are visiting is located and hospital security management has the ability to track visitors as well as record all visitor activity. Access can be granted for specific types (i.e. family, guardian, contractor, etc.) and lengths of visits (overnight, multi-day, etc.), and the information remains in the system for return visitors or contract workers. In all cases, access cards and badges are automatically disabled by the system after visiting hours or when access permission has expired. Compliance Adherence to rules and regulations established by government agencies is not only mandatory, it also meets best practices with regard to hospital safety. Compliance with regulatory mandates is an important element of risk management and software can enable these initiatives to be automated in real time. Existing off-the-shelf software can enable hospital management to perform important identity and access control functions in the context of meeting regulatory requirements, with adherence to specific regulatory guidelines built into the software. Daily, weekly and monthly operational reports can be automatically generated to provide security practitioners with information to optimize staff, budget and other resources. Overall, the software ties together various disparate physical security and other systems and centralises their control. PIAM software provides four fundamentals of hospital security and IT needs; namely safety, control, compliance and peace of mind As an example, HL7 refers to specific standards for the exchange, integration, sharing and retrieval of electronic health information. When PIAM software is integrated with a patient’s electronic health record (EHR), the combined information provides a more holistic view for the medical professional. All information pertaining to patient identity, such as visitors, dietary restrictions, medical attendees and so on, are tied together under policy-based workflows. Peace of Mind Real-time awareness of identities and location in the hospital environment is invaluable information during a crisis situation. PIAM software provides security with instantaneous visibility into the location of identities and this can save valuable time in an emergency. Visibility of security and security practices can also be a significant deterrent for criminal activity. From access control to watch lists to compliance and more, PIAM software enhances risk management operations by ensuring that security and convenience are equally maintained. From a management point of view, as facilities grow in size due to additions or acquisitions and personnel increase, the system can grow along with the expansion. Further, integrating the PIAM system with operational systems can reduce costs by eliminating duplicate work efforts across multiple systems; these cost reductions are sustainable and repeatable year over year. Software systems can streamline time-consuming and inefficient processes in the hospital environment, from issuing ID badges to managing databases to assigning access privileges across multiple physical access control systems. Addressing hospital challenges regarding physical identity and access management helps to mitigate risk and ensure the safety of patients, staff and visitors.
Ideal COTS solutions take cost, customization and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronized and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascertain total ongoing control of their physical access levels across multiple security systems. PIAM software is a ready-made solution to upgrade and enhance physical security strategies; to remain compliant with requirements mandated by various regulations, or to integrate and maintain alignment with security policies during and after a corporate consolidation. The decision to build or buy a PIAM software solution should be based on the 3Cs of cost, convenience and customization. With the growing recognition of the importance of PIAM comes a need for each user to decide whether the software should be developed internally, or whether it should be purchased as a commercial off-the-shelf (COTS) solution. The appeal of building an in-house custom application is often founded on the belief that company processes, business challenges and unique needs are better understood within the organization and that the solution can be developed more accurately and less expensively this way. Conversely, many identity management issues and requirements are similar in nature and it may save time, and potentially money, to purchase a COTS package developed by a more specialized software developer. Understanding the differences between the build or buy approach can yield significant benefits. There are three key areas that should be considered when making the choice between an in-house developed solution and a COTS package − cost, customization and convenience. Cost of the software Unlike an in-house developed software program, costs for COTS solutions can be negotiated and determined up front. Any additions or custom development can be quantified prior to the start of the project and a schedule for incremental upgrades or changes can be identified for budgeting purposes. In addition, COTS solutions usually provide a better ROI over the long term based on more robust features, greater reliability and ability to scale at a lower cost than an in-house solution. PIAM software is a ready-made solution to upgrade and enhance physical security strategies When considering an in-house developed solution, costs must include the time-intensive process of developing the outline/application, assigning personnel and determining charge-back costs for development, testing and support. Because of the nature and complexity of the PIAM application, the development must take into consideration workflow that integrates a variety of business system processes, as well as the integration between existing hardware and/or software systems. For example, when one set of privileges changes, whether physical or logical, that alteration must trigger automatic, complementary revisions in other sets. With regards to the development team, assignment of personnel is dependent upon the technology resource pool and their experience with this platform. The team may also have to be expanded to include personnel with expertise in specific business processes. Given these pros and cons, recent trends indicate that organizations are more frequently turning to external professional resources that offer application-targeted solutions built on best practices and with a proven track record. Customizing the Software Solution In many organizations and vertical industries, state and federal regulatory compliance is the impetus for instituting an identity management program – whether it is Sarbanes-Oxley, CFATS, NERC/FERC, HIPAA or one of many others. Government agencies perhaps face the greatest need for compliance including FIPS 201/HSPD-12 credentialing requirements and TSA regulations for airports. Custom solutions that are in compliance with access control requirements mandated by any of the various agencies or regulations are more readily available from vendors who understand the requirements both from the business/regulation side and from the technical side. The work is done and built into the application and in most instances the software program will meet the customer’s requirements out of the box. Organizations are more frequently turning to external professional resources that offer application-targeted solutions built on best practices and with a proven track record Convenience Operation and use of PIAM software must easily and readily include the capability to manage all types of identities including permanent and temporary employees, contractors, service providers and vendors. It should be an easy and straightforward process to manage details of a physical identity, such as biographic and biometric information as well as results of security checks and historical usage. In addition to aggregating access level information from various systems, PIAM software should encompass details such as risk level, area owner, multiple approvers and prerequisites for access. The system must also provide audit trails of all transactions. These features and other proven system amenities make implementation and use of COTS software more convenient than a home-grown solution. The ideal COTS solution will take cost, customization and convenience into account. It should fully integrate data from disparate physical security and IT and operational systems, automate manual security processes around contractors and reduce both costs and risks. The host of applications provided to automate physical security system functions must include physical identity management, role-based access, self-service administration, identity/event correlation and reporting. Control should be provided through a single Web-based interface that is easy to manage and use. A properly designed and engineered COTS solution for physical access and identity management will be your most cost effective solution.
For many companies, the current state of their access control infrastructure is best described as being fractured For many companies, the current state of their access control infrastructure is best described as being fractured. Multiple disparate physical and logical access control systems and cumbersome manual processes are all too common. Standardizing one system throughout a company might address part of the problem, but replacing multiple systems may require large amounts of capital. A long-term access control issue for any company how to manage its identities. It is important to ensure that individuals only have permission to enter authorized areas, both for the sake of security and compliance. With large numbers of employees, geographically distributed campuses and ever-changing authority levels, keeping permissions current is an important issue to address. Sophisticated identity management software can enable a single identity to be created for each individual across any organization. Integrating physical security systems with logical security systems creates software which can ensure synchronized and policy-based on-/off-boarding of identities. Identity management challenges and opportunities Although effectively managing identity can be a challenge, it also provides many opportunities for any organization. These include enabling human resource and LDAP-format databases to connect instantly with physical access control systems and to receive real-time reports across any number of physical access control systems. It is also possible to manage badge/credentialing systems more efficiently and to track visitors and third-party contractors and link them to an internal identity. Other new opportunities include the ability to correlate identities with alarms and events and to grant access based on a risk profile of an identity or location. Access can also be granted based on training or other special requirements. ...effectively managing identity can be a challenge, but it also provides many opportunities for any organization All types of identities can be managed with advanced software, including permanent and temporary employees, contractors, service providers and vendors. Users can manage details of a physical identity, such as biographic and biometric information, the results of security checks and historical usage. Software also enables various access levels to be assigned to an identity across multiple physical access control systems and can specify details such as time of scheduled access. An urgent termination feature can allow authorized personnel to immediately deny physical access. In addition to aggregating access level information from various systems, the administrator can manage details such as risk level, area owner, multiple approvers and prerequisites for access, such as training. The system can also provide audit trails of all transactions.From a risk perspective, automated identity management systems enable organizations to lower liability and maximize protection of assets. Furthermore, systems promote standardization within a security organization and implementation of best practices.Cost is another important benefit. A unified, software-based approach to identity management reduces the need for labor-intensive and repetitive processes. Regulatory compliance needs incentivize effective identity management Keeping permissions current is an important issue to address A proliferation of regulatory requirements provides an additional incentive to manage identities more effectively. End-user companies are subject to a growing number of regulations that require verification of identities and access to facilities and information. For example, all corporate entities are subject to Sarbanes-Oxley compliance, which requires management of user identities and access to information while ensuring its integrity. Vertical markets have their own specific regulations, such as the CFATS, anti-terrorism requirements of the petrochemical industry, Gramm-Leach-Bliley which protects information in the finance arena, HIPAA privacy rules for healthcare and NERC/FERC security regulations in the energy sector. Governments face compliance with FIPS 201/HSPD-12 credentialing requirements and airports are regulated by TSA. Banking companies seek to comply with Basel II requirements that include risk management and pharmaceutical companies are regulated by the Drug Enforcement Administration. Centralized identity management systems allow managers to easily monitor regulatory infractions and proactively enforce security policies and rules.Software systems enable compliance initiatives to be automated in real time to create a transparent, traceable and repeatable global process to manage governance and compliance. To comply with regulations takes strict governance of security controls across both physical and IT infrastructures and management of risk on a holistic level.
News mentions
Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software Quantum Secure, part of HID Global, a provider of secure identity solutions, continues to grow its roster of end users for its SAFE platform. 2016 growth was seen in the application of all SAFE core technologies and was additionally fueled by further expansion of the SAFE offerings including SAFE Tenant Manager, SAFE Sports and Events and SAFE Predictive Risk Analytics Updates. By industry, exceptional growth was seen in government, aviation, finance, utilities and high-tech markets. The company’s platform now manages 7.5 million identities worldwide, maintaining Quantum Secure’s position as the world’s largest Physical Identity and Access Management (PIAM) software vendor. Forefront Of Managed Physical Security “The ongoing strong results we see reflect our commitment to continued improvements and enhancements to the SAFE software suite and keep us in the forefront of managed physical security solutions,” said Ajay Jain, President and CEO, Quantum Secure. “More than ever, across a wide range of vertical market applications, SAFE is the solution of choice to automate processes that offer real-time insight for identifying potential risks and create a safer and more secure environment.” Key enhancements to SAFE that have helped maintain growth momentum include: SAFE Tenant Manager SAFE Tenant Manager provides a self-service interface for organizations that have multiple third-party vendors, contractors or tenants sharing a facility or multiple buildings. This allows administrators to submit new company and contractor information for more independent management of facility and access-related requests. Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software Tenants can request physical access and new badges, invite visitors as well as book freight elevators in a faster, more efficient way using the advanced user experience delivered by SAFE. This decentralization allows for smoother tenant management operations and allows the parent organization to maintain control centrally with the appropriate visibility and approvals in place. SAFE Sports And Events Quantum Secure’s SAFE Sports and Events Access Manager enables secure and rapid entry to stadiums or other venues providing a high-quality, high-security customer experience for temporary or limited-engagement events. This mobile-app solution removes the need to rely on clipboards and lists to manage contractors, vendors, volunteers and thousands of other non-ticket holders who need temporary access to venues. The solution also integrates with IT systems and multiple handheld devices for swift, accurate real-time validation and immediate onboarding and provisioning for a variety of identity types based on each identity’s appropriate access permissions. Additionally, the solution records identity access logs to track key operational and security metrics and streamline compliance processes. SAFE Predictive Risk Analytics Updates SAFE Risk Analytics aggregates and correlates data from multiple external systems to generate cross application reports and provides interactive, point-and-click views of key physical security and other integrated security risks. Additional 2016 Quantum Secure SAFE Highlights Certified for use by Lenel for OnGuard and with AMAG Technology’s Symmetry New customers in a number of industries: airports, high-tech, finance, automotive, sports and events, as well as government, and oil and gas customers. Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software. Featuring an intuitive interface and advanced reporting capabilities, SAFE 5.0 delivers critical information in a single view, providing organizations with actionable intelligence to make better decisions regarding security and operations. SAFE 5.0’s powerful dashboards can be viewed from virtually any device, streamlining and simplifying initiation and auditing of access-related requests.
Upgrades to the SAFE portfolio include increased PIAM functions, platform support, agent and peripheral framework, and VIM capabilities Quantum Secure, part of HID Global, a provider of secure identity solutions, is building momentum towards making 2016 the best year ever. The company’s SAFE platform now manages 7 million identities worldwide, up from 5.5 million at the beginning of 2016, making Quantum Secure the world’s largest Physical Identity and Access Management (PIAM) software vendor. The increase is from new customers in the social media, Fortune 100, financial, government and real estate vertical markets. Simplifying Physical Identity & Access Management According to Ajay Jain, President and CEO, Quantum Secure, the company’s ongoing success can be attributed to continued improvements and enhancements to their SAFE software suite that address today’s need for managed physical security. The innovative SAFE solution focuses on automating and simplifying physical identity and access management to identify potential risks and obtain actionable intelligence. Mr. Jain said, “Our SAFE software brings a whole new slate of tools that can deliver qualitative insight to help organizations create a more sustainable, safe and secure environment. The same data can also contribute to productivity improvements and maximized cost savings throughout the organization. Together, these advantages are helping drive our business forward.” Key Technology Enhancements Predictive Analytics: A stronger emphasis on reporting to further understand behavioural anomalies to help detect and mitigate insider threats. New reports and dashboards include suspicious behaviour, erratic movement, exploration, and unusual timing. Facility Analytics: The software now combines utilisation plans from HR and real estate systems with real-time access data to provide information on how facilities are actually used. Visitor Kiosk: Improving the customer experience is a critical component of the latest upgrades to the Visitor Kiosk. Visitors may now check-in using passbook or wallet invites. Additional functionality for security teams includes workflow support for Outlook-generated meetings; and draft mode for saving meeting information. SAFE Agent for HID Mobile Access: The SAFE Agent for HID Mobile Access simplifies identity and credential management by enabling SAFE users to provision and manage mobile credentials. "Our SAFE software brings awhole new slate of tools thatcan deliver qualitative insightto help organizations create amore sustainable, safe andsecure environment" Continued Improvements To SAFE Capabilities In addition to these important enhancements, other upgrades to the SAFE portfolio include increased PIAM functions, platform support, agent and peripheral framework, and VIM capabilities, all of which are geared to improve security effectiveness. Most recently, the SAFE Visitor Management Self-Service kiosk was implemented to allow visitors to check themselves in using a mobile device rather than having to wait at a reception desk. “Technology exists to add value to an organization either by increasing revenue or decreasing costs,” added Mr. Jain. “Our continued attention to improving SAFE’s capabilities will help to ensure the value of both.” Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software. Featuring an intuitive interface and advanced reporting capabilities, SAFE 5.0 delivers critical information in a single view, providing organizations with actionable intelligence to make better decisions regarding security and operations. SAFE 5.0’s powerful dashboards can be viewed from virtually any device, streamlining and simplifying initiation and auditing of access-related requests. Save
Campbell will continue to drive growth and momentum of Quantum secure's PIAM solution Quantum Secure, a provider of enterprise software to manage and streamline security identities, compliance and analytics across disparate physical security systems, has promoted Don Campbell to Vice President, Product. Campbell had served as the Company’s Director of Product Management since 2014, playing a key role in driving the momentum of Quantum Secure’s Physical Security and Access Management (PIAM) software. Track Record Of Success “Don has been integral to building awareness of the value of PIAM within the industry and driving Quantum Secure’s rapid growth over the last two years,” said Ajay Jain, Quantum Secure’s President and CEO. “In his new role, Don will leverage his experience and track record of success to continue his work in expanding the widespread acceptance of our SAFE Predictive Security Software.” Prior to joining Quantum Secure in 2014, Campbell pioneered some of the first PSIM products to arrive on the Market, first at VistaScape, sold to Siemens in 2006, and later at VidSys where he was Vice President of Product Management. He began his career as an officer in the U.S. Marine Corps, where he led a 13-member team whose responsibilities included managing a 35-building network. Campbell earned a B.S. in Electrical Engineering from Duke University and is one of three inventors of a patented method for surveillance system peering. Quantum Secure Growth The biggest development for the company in 2015 was its acquisition by HID Global, a provider of secure identity solutions Campbell’s promotion follows Quantum Secure’s earlier announcement that 2015 was the best year in the company’s history, spurred by the introduction of new technologies, record sales levels, strong partnerships and significant growth in a number of key vertical markets. The biggest development for the company in 2015 was its acquisition by HID Global, a provider of secure identity solutions. With its SAFE software managing more than 5.5 million identities worldwide, Quantum Secure is now the largest PIAM software vendor in the world. “As a market leader and creator in the PIAM space, Quantum Secure is ideally positioned for continued growth, and for more than two years I have enjoyed being part of the overall value proposition of addressing corporate physical security risk and compliance initiatives,” Campbell said. “As Vice President, Product, I look forward to continuing to help drive growth of our SAFE software suite’s ability to provide tangible results and ROI for customers by effectively managing the lifecycle of physical identities and compliance across security infrastructure.”
Quantum Secure, a leading provider of enterprise-grade physical identity and access management (PIAM) solutions, has re-certified their SAFE Software version 4.9 with AMAG Technology’s Symmetry v8.0.2 Access Control Software and future v8.x versions. The integration allows for cardholder synchronization between SAFE Software and Symmetry software. Seamless Integration Between SAFE And Symmetry “Quantum Secure’s continued ability to create advanced technology solutions makes them ideal partners and enables a seamless integration between SAFE and Symmetry,” said Dave Ella, Vice President of Product Marketing, AMAG Technology. “We’re pleased to update this certification with Quantum Secure.” The integration includes features such as the ability for both SAFE and Symmetry to synchronize cardholders, create access code add-ons and delete additions, receive automatic active and inactive cardholder updates, and an intuitive configuration that drives an excellent user experience. “This integration between SAFE’s PIAM platform and AMAG’s Symmetry’s access control system increases the ability to provide customers with an excellent solution for their identity management needs,” said Ajay Jain, CEO, Quantum Secure. “One of our top priorities is to continue to support our partner certifications.”
Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software Quantum Secure, part of HID Global, a worldwide leader in secure identity solutions, is addressing prevalent identity and visitor management trends here at ISC West. Centered around the industry-leading SAFE Security Software, the exhibit features innovative solutions for visitor management along with mobile/IoT applications, analytics and enhancing the user experience. Easier And Faster Visitor Management “While we continue to focus on identifying potential risk and deriving actionable intelligence, we are placing greater value on the customer’s experience, both from the viewpoint of the visitor and of the organization utilizing our software,” said Ajay Jain, President and CEO, Quantum Secure. “SAFE 5.0 makes visitor management faster and easier while providing organizations with the assurance that established policies and procedures are being maintained.” With the SAFE Visitor Management Self-Service kiosk, visitors can now quickly check themselves in rather than having to wait at a reception desk. Mobile Self-Service is now the default option, with a tablet-friendly design that is highly flexible and customisable. Considerable attention has been paid to making the interface convenient to use, attractive to view, and easy to scale. The new user interface makes it simple to initiate, track and audit access-related requests with advanced reporting capabilities to deliver data to other departments such as compliance, legal and HR. Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software. Featuring an intuitive interface and advanced reporting capabilities, SAFE 5.0 delivers critical information in a single view, providing organizations with actionable intelligence to make better decisions regarding security and operations. SAFE 5.0’s powerful dashboards can be viewed from virtually any device, streamlining and simplifying initiation and auditing of access-related requests.
Quantum Secure saw remarkable growth in its customer base in 2015 A number of factors, including high-quality new products, a customer-centric approach to security, new customers and updates to its SAFE software suite, combined to make 2015 a very good year for Quantum Secure, now part of HID Global, a worldwide leader in secure identity solutions. “2015 was the best year in our company’s history, spurred by the introduction of new technologies, record sales levels, strong partnerships and significant growth within a number of key vertical markets,” said Ajay Jain, Quantum Secure’s CEO. “Our SAFE software now manages more than 5.5 million identities globally, making Quantum the largest PIAM software vendor in the world.” HID Acquisition Without question, the biggest development for Quantum Secure in 2015 was the company’s acquisition by HID Global in March. In acquiring Quantum Secure, HID took a significant step in enhancing its ability to create, use and manage secure identities from physical security to logical security domain. The combination of HID’s best-in-class technologies and global reach with Quantum Secure’s software suite helps end users – especially those in heavily-regulated industries such as finance, aviation and healthcare – streamline identity management, mitigate risk and ensure compliance. Customer Acquisitions Quantum Secure saw remarkable growth in its customer base in 2015, with more than 5.5 million identities managed by SAFE globally. This growth has been spurred by large numbers of new customers in the aviation, finance, government, high-tech, critical infrastructure markets, and a handful of Fortune 500 companies. Notable customer acquisitions in 2015 include Dallas-Fort Worth Airport, Orlando International Airport, Richmond International Airport, Portsmouth International Airport, Bank of America, Capitol One, Credit Suisse, Shell, Florida Power and Light, Twitter, and Salesforce. SAFE Version 4.9 Reflecting the company’s commitment to delivering solutions with a customer-centric approach to security, Quantum Secure provided significant enhancements to the latest version of its SAFE Predictive Security Software. Among the many updates found in version 4.9 are: Improved user interfaces designed to speed processing of visitors and provide self-service options to enhance customer convenience. New predictive reports and dashboards for identifying behavior anomalies to further strengthen SAFE’s predictive analytics and reporting ability. SAFE Monitoring Agent, which tracks system performance and reports potentially critical issues and is used for detecting and/or monitoring system- or data-related issues and notifying appropriate individuals about critical errors that could impact the ability for SAFE to operate at optimal levels. Predictive Security In acquiring Quantum Secure, HID took a significant step in enhancing its ability to create, use and manage secure identities from physical security to logical security domain In the last year, Quantum Secure has taken a leading role in promoting and providing predictive analysis capabilities within the security industry. Introduced at ISC West 2015, the software “connects the dots” by analyzing data from a variety of security and non-security systems to generate actionable intelligence. With a clear understanding of security operations and risks, organizations can initiate preventive action to potentially thwart incidents before they can occur – moving security toward a proactive rather than reactive function. To further support analysis, the software includes automated, actionable responses which can help reduce costs, reduce insider threat and enhance compliance. Contractor Management To ease the traditionally challenging task of effectively managing contractor identities, Quantum Secure’s Contractor Management Portal enables facility administrators to streamline the physical access and provisioning activities of their contractors. The portal allows administrators to provide a self-service website for contractors. The portal also tracks approvals with the contractor’s customer for specific area access requests. This ensures faster access provisioning of identities enabling rapid changes in the access levels, and managing badging requirements in a cost-effective manner. Partnerships Quantum Secure has continually sought to build relationships with leading security providers. In 2015 the company formed a partnership with Siemens Industry, Inc. Building Technologies Division. As an authorized value-added reseller of Quantum Secure’s SAFE software suite, Siemens is able to provide its global customer base with a high-performance enterprise-level physical security management solution that connects disparate security, IT and operational systems and reduces costs and risks by automating manual security processes. “We’re looking forward to carrying this momentum into the next year and beyond,” said Mr. Jain. We’re already working hard to ensure that 2016 will supplant 2015 as our best year ever.”
SAFE transforms a security departmentfrom a reactive entity into a proactivestrategic partner Quantum Secure, part of HID Global, a worldwide leader in secure identity solutions, is launching a comprehensive new universal user experience and adding new functionality to its industry-leading SAFE Predictive Security Software. These significant enhancements, announced today at ASIS 2015, demonstrate new benchmarks for SAFE’s robust predictive analysis and visitor management capabilities, and expand the potential applications for the company’s PIAM solutions (Physical Identity and Access Management). “With its ability to ‘connect the dots’ between identities and security systems to identify potential risk and derive actionable intelligence, predictive analysis transforms the security department from a reactive entity into a proactive strategic partner that plays an integral role in an organization’s business and growth,” said Ajay Jain, President and CEO, Quantum Secure. “With these new enhancements, the SAFE software has stronger predictive analysis capabilities than ever before. At the same time, the new user interfaces for staff and visitors deliver a higher level of clarity, utility and efficiency that makes it easier than ever to deploy such a feature-rich system.” New User Interfaces The most visible updates to SAFE are the new user interfaces that are designed to speed up the processing of visitors and provide new “self-service” options in line with current business trends. The new functionality leverages current secure networking technology and is compatible with kiosks and visitor stations, as well as other computers already in use, and includes: Streamlined services for internal departmental users, with easy processes for inviting visitors, requesting access to restricted areas, and managing access to such areas. New services for security end users allowing them to easily find and request the access that they need. New services for security partners letting them quickly approve access to their areas. Improved services for internal audits and maintenance that show the essential decision-making information in context. For example, current policy is used to automatically pre-sort access permissions into ‘retain’ and ‘remove’ groups for efficient decisions and action. A single universal screen to support visitor check-in that lets managers quickly know who is waiting in the lobby, who is in the building, and who has departed. Kiosk functionality that updates the system status, alerts hosts that visitors have arrived, and keeps busy lobbies running smoothly. New predictive reports and dashboards for identifying behavior anomalies have been added to further strengthen SAFE’s predictive analytics and reporting ability, including: Access Violations: Uses visually intuitive heat maps to provide a comprehensive view of multi-dimensional relationships between identities, their associated access rights and access violations. Behavioral Anomalies: Helps determine the trajectory of the identity as they traverse a facility to perform in-depth investigation if a breach is discovered. Access Forensics: Captures detailed logs of all aspects of an identity to help narrow down the list of suspects in the case of events reported in different areas at different times Package Management And Monitoring Agent SAFE’s visitor management capabilities have also been enhanced with Package Management, which allows packages to be securely tracked and delivered to recipients within a facility; enhanced customer convenience using SAFE visitor kiosks; support for soundex match criteria for improved security while conducting visitor background checks; support for QR code generation and email embedding; and the ability for hosts to include other personnel and contractors while creating visitor invitations. Another new feature of note is the SAFE Monitoring Agent, which tracks system performance and reports potentially critical issues. Developed as an independent and secure component, SAFE Monitoring Agent is used for detecting and/or monitoring system- or data-related issues and notifying appropriate individuals about critical errors that could impact the ability for SAFE to operate at optimal levels. The updated platform also offers bulk update capabilities, which allow personnel to update access area and zone properties in bulk, as well as suspension profiles that remove access levels of personnel when certain conditions are met. Users can also utilize a new feature to merge two identity records into a single entity for reconciliation purposes.
Quantum Secure today announced the release of the SAFE for Telecom software suite, a physical identity and access management (PIAM) solution designed to streamline the lifecycle of physical identities and automate related processes to protect telecom data centers and other high-risk premises from unauthorized access. SAFE for Telecom also provides strong predictive analysis using data collected from multiple disparate systems to generate actionable intelligence that allows telecom end users to take proactive steps and potentially prevent security risks before they can occur. Predictive Analysis SAFE for Telecom collects and analyses data from access control, video surveillance, human resources and other disparate security and non-security systems. The software then applies operational- and risk-based analytics to this data to provide a clear understanding of security operations and risks. Through this predictive analysis, SAFE for Telecom identifies indicators of compromise (IOCs) that could signify that an incident or security risk may be about to occur. Using the actionable intelligence gleaned from this analysis, telecom end users can take proactive steps and potentially prevent an incident or event from happening. SAFE Asset Manager SAFE for Telecom also enforces access- and physical security-related compliance with government and other regulations and standards, and provides the capability to demonstrate compliance using a single automated policy and reporting infrastructure. To further streamline visitor and identity management, SAFE for Telecom allows contractors and vendors to self-manage physical access through designated authorized signatories. Another key component of SAFE for Telecom is SAFE Asset Manager, which provides central management, issuance and audit of one or more physical security assets, including metal keys and tokens that have been provisioned to identities that are managed within the SAFE suite. “Telecom facilities are home to a number of critical and highly valuable assets, and given the sensitive nature of many of these locations, telecom companies need to be able to recognize potential threats as soon as possible. These factors underscore the crucial need for strong physical access and identity management,” said Ajay Jain, President and CEO, Quantum Secure. “SAFE for Telecom addresses both of these needs by creating a holistic, auditable environment that provides actionable intelligence to enable telecom companies to take a more proactive approach to security rather than reacting to events after the fact.”
The installation of Quantum Secure techin the lab provides students with a clearunderstanding of PIAM and its applications Quantum Secure, part of HID Global, a worldwide leader in secure identity solutions, has announced their sponsorship of the Identity, Credentialing and Access Management (ICAM) Laboratory at Washington D.C.’s Capitol Technology University. As an industry technology partner to the school’s Critical Infrastructures and Cyber Protection Center (CICPC), Quantum Secure’s pioneering predictive analysis solutions and physical identity and access management (PIAM) SAFE solutions are installed throughout the lab for learning and research purposes as well as being a core segment of the lab curriculum. Hands-On Experience And Outreach Program “The value of having a clear understanding of PIAM and how it relates to security operations and risks is incalculable in any size or type of environment and our SAFE product line is designed to deliver that insight,” said Ajay Jain, President and CEO, Quantum Secure. “We are thrilled to be a part of this learning/teaching opportunity to meet the technical and managerial needs of the nation’s homeland security workforce.” The ICAM Lab offers intensive hands-on experience to develop the academic knowledge and professional skills that will enable students to advance their employment opportunities within the field of Physical Security, Information Assurance, Business and Acquisition Management. Courses for accreditation are offered at both the undergraduate and graduate degree levels and students working in the ICAM Lab will complete all core curricular graduation requirements. Courses for BICSI (Building Industry Consulting Service International) and ESA (Electronic Security Industry Association) accreditation are also offered. The ICAM Lab also serves as a demonstration and career awareness outreach program for high school and middle school students and offers internships for students from the Charles Herbert Flowers High School to conduct research activities. New Benchmarks In PIAM Solutions The establishment of the ICAM Lab follows the tenets of the Federal Identity, Credentialing and Access Management construct as well as industry adopted identity and access management (IAM) standards and guidelines. With its SAFE Predictive Security Software, the latest addition to its SAFE Security Intelligence Portfolio, Quantum Secure continues to set new benchmarks in predictive analysis solutions and PIAM solutions. The SAFE product line analyses identity and security data and applies both operational and risk-based analytics to provide a clear understanding of security operations and risks. To further support analysis, SAFE Predictive Security includes automated, actionable responses which can help reduce costs, reduce insider threat and enhance compliance. Quantum Secure’s SAFE Security Intelligence Portfolio provides web-based solutions that detail an executive-level, graphical dashboard view of a global physical security infrastructure. In addition to SAFE Predictive Security, the portfolio also includes SAFE Security Reporter 5.0, which provides real-time monitoring and event correlation of physical security activities and a custom report creation wizard.
This newest addition to Quantum Secure’s product line analyses identity and security data from systems Quantum Secure, part of HID Global, a worldwide leader in secure identity solutions, recently announced it continues to establish new benchmarks in PIAM (physical identity and access management) solutions with the introduction of SAFE Predictive Security Software here at ISC West. This newest addition to Quantum Secure’s product line analyzes identity and security data from systems and applies both operational and risk-based analytics to provide a clear understanding of security operations and risks. To further support analysis, SAFE Predictive Security Software includes automated, actionable responses which can help reduce costs, reduce insider threat and enhance compliance. SAFE Predictive Security Software to identify risk “SAFE Predictive Security Software is designed to transform security departments into a proactive enterprise resource by identifying potential risk within an organization and maximizing efficiencies specifically related to that risk,” said Ajay Jain, President and CEO, Quantum Secure. “It connects the dots about identities and security systems to make data actionable to initiate preventive action and thwart potential incidents.” Mr. Jain adds that predictive analysis can also identify and forecast which policies are effectively enforced and which are ineffective within the existing security system. As such, SAFE Predictive Security Software comprises two subsets including SAFE Risk Analytics and SAFE Operational Analytics, each for specific security or business stakeholders. SAFE Risk Analytics is a web-based dashboard set that provides interactive views of risk-related Indicators of Compromise* (IOC) across the enterprise. Dashboard sets include Insider Threat, Alarm Analytics, and Risk Summary Dashboards. SAFE Operational Analytics is also a web-based dashboard that provides actionable insights into day-to-day operations including Facility Operations Analytics, Identity and Badge Analytics and Visitor Analytics. Quantum Secure CTO comments “The Security & IT industry is in a period of rapid evolution towards predictive, scalable and identity-centric solutions,” said Vik Ghai, CTO, Quantum Secure. “Quantum Secure is ideally positioned at the center of this evolution to bring complex predictive capabilities in simple actionable dashboards for end users. By incorporating predictive results into day to day operations, security directors will be able to identify hidden patterns, revealing risks or opportunities for staff, system or operational improvements” SAFE Predictive Security Software joins Quantum Secure’s SAFE Security Intelligence Portfolio. The Security Intelligence Portfolio provides web-based solutions that detail an executive-level, graphical dashboard view of a global physical security infrastructure. In addition to SAFE Predictive Security, the portfolio also includes SAFE Security Reporter 5.0 which provides real-time monitoring and event correlation of physical security activities and a custom report creation wizard.
Kiosk is built on the company’s advanced SAFE physical security policy platform Quantum Secure, part of HID Global, a worldwide leader in secure identity solutions, announces its new SAFE Visitor Kiosk, on display at ISC West, proves that organizations do not have to sacrifice security for convenience and speed when implementing a kiosk-based physical identity and access management system. The SAFE Visitor Kiosk, which is built on the company’s advanced SAFE physical security policy platform, ensures the integrity of an organization’s policies and procedures by managing the entire lifecycle of pre-registered and unregistered visitors. Fast & easy visitor management “From bank transactions and parking lot payments to information booths, people are accustomed to the convenience that kiosks provide,” said Ajay Jain, President and CEO, Quantum Secure. “Our SAFE Visitor Kiosk makes visitor management fast and easy while providing organizations with the assurance that established policies and procedures are being maintained.” Easy to use and cost-effective Ideal for use in reception areas and unmanned lobbies, the SAFE Visitor Kiosk’s easy-to-use interface with comprehensive on-board support takes visitors only minutes to check-in without the need for assistance from any personnel. It generates custom badges for visitors and employees who may need a temporary badge to enter the facility. The SAFE Visitor Kiosk can be readily integrated with a wide variety of peripherals for verifying and reading documents, signing NDAs (non-disclosure agreement) and capturing photos. Quantum Secure’s SAFE Visitor Kiosk provides a cost-effective solution for lobby-based visitor management operations, and because the SAFE Visitor Kiosk is highly automated, there is a reduced risk of error compared to manual sign-ins.
SAFE for Aviation enables collaborative approach to insider threat and ultimately passenger safety In a nation’s busy airports, security and passenger safety is of paramount importance. Theft, smuggling, passenger safety, and terrorism all threaten the highly inter-dependent balance between airports, airlines, and the myriad aviation service providers. There have been numerous reports of badge-related security issues and breaches; lost badges and former badge holders who were not officially off-boarded and still had access, among other issues. Manage Worker’s Physical Identities & Access As the aviation industry continues to build the modern infrastructure to support their growing needs, forward looking airports are leveraging SAFE for Aviation to provide security infrastructure to manage and govern access to secure sections of airports by employees and contractors who may not go through the same level of screening that passengers do. SAFE for Aviation enables a collaborative approach to insider threat and ultimately passenger safety and allows all parties across an airport (federal government, air carriers, tenants, vendors and airport) to perform their role in protecting that airport using an intelligent, cost-effective solution. SAFE ensures that each airport identity has been properly authenticated per TSA requirements. SAFE also ensures, in real-time, that if there are any changes in the identity record (for example, termination, failed re-vetting and background check, anomalous facility access patterns, changes in status, etc) it will immediately reflect in the worker’s physical access profile and will alert authorities immediately. An Explicit Return On Investment The SAFE for Aviation solution provides an explicit return on investment, saving airport personnel up to 35% of their time by eliminating manual tasks, with up to an 80% reduction in time by helping to eliminate errors and corrections. SAFE also reduces ID badge expenses by as much as 50% along with the ability to efficiently track and bill for material and operational costs which can result in recouping as much as 100% of credentialing costs. Even more significant savings are realised by delivering a proven risk mitigation solution for insider security events and breaches, which can potentially result in saving millions of dollars. Increase Security And Customer Service The SAFE for Aviation solution provides an explicit return on investment, saving airport personnel up to 35% of their time by eliminating manual tasks, with up to an 80% reduction in time by helping to eliminate errors and corrections. “Airports have gained a solid understanding of the ongoing challenges they face regarding secure workforce access needs and the intelligent solutions available to meet these needs. This increased awareness has led many airports to make security a top priority,” said Ajay Jain, Quantum Secure’s President and CEO. “A growing number of airports are choosing the best-in-breed SAFE for Aviation to aid with modernisation. Not only does SAFE provide advanced security, compliance and customer service capabilities, it also delivers deeper levels of integration with security and non-security related systems already in the airport eco-system.” Category X Airports Implemented The SAFE Solution Among the Category X airports that have implemented the solution are San Francisco International Airport, Seattle-Tacoma International Airport, Toronto Pearson International Airport, Phoenix Sky Harbor International Airport and Boston’s Logan Airport. In addition, the São Paulo-Guarulhos Airport in Brazil deployed SAFE for Aviation to prepare for a spike in travellers during the World Cup, as well as the predicted surge of passengers for the upcoming 2016 Summer Olympics. Category X airports are airports considered the most vulnerable targets for terrorism; typically high-volume, international airports in popular areas.
HID Global’s broad reach and Quantum Secure’s software suite will help customers mitigate risk and ensure compliance HID Global, a worldwide leader in secure identity solutions, recently announced that it has acquired Quantum Secure, a leading provider of software solutions for managing identities, access compliance and provisioning access within physical security infrastructure. With this acquisition, HID Global will enhance its ability to deliver an end-to-end identity management solution. SAFE Software Suite - Integrated Physical Security Policy Platform Quantum Secure’s SAFE software suite provides a single, fully interoperable and integrated physical security policy platform to manage secure identities, compliance and operational analytics across multiple sites and systems. Using this platform, customers are able to reduce operational costs and the risk profile of the organization as well as foster compliance with regulations across disparate security infrastructure. “With the acquisition of Quantum Secure, HID Global is taking a significant step in addressing customer needs in managing identity, risk and compliance. The company has been at the forefront in delivering a versatile management tool for all organizations, especially those in highly-regulated industries such as finance and healthcare with demanding compliance requirements,” said Denis Hébert, HID Global President and CEO. “Going forward, the combination of Quantum Secure’s SAFE software suite with HID’s product portfolio will deliver ever better and more comprehensive solutions for our customers.” “The growing need for compliance and risk management for a diverse set of identities will have to be satisfied by intelligent, predictive data analysis and related process automation in a global security environment. By bringing together HID Global’s best-in-class technologies, its global reach and Quantum Secure’s software suite, this acquisition will help customers mitigate risk and ensure compliance,” said Ajay Jain, Quantum Secure’s CEO. Quantum Secure, founded in 2004, is headquartered in San Jose, California.
Quantum Secure's SAFE for Secure Cloud solves complex PIAM challenges for SMBs Quantum Secure’s new SAFE for Secure Cloud, featured here at ASIS 2014, provides SMB users with a highly sophisticated and cost-effective PIAM (Physical Identity Access Management) solution that can increase security across multiple business operations. As a web-based solution for automating physical identity and access management processes, SAFE for Secure Cloud provides users with a powerful and cost-effective means to deploy and manage architecture. SAFE for Secure Cloud also provides resellers with a new business development opportunity by using the Software as a Service (SaaS) business model. “SAFE for Secure Cloud leverages Quantum Secure’s sophisticated software to help drive increased physical and cyber security for SMBs,” said Ajay Jain, President and CEO, Quantum Secure. “As an alternate to on-premise and/or home-grown systems, this purpose-driven software provides a functionally rich, easy to implement and administer PIAM solution.” SAFE for Secure Cloud solves complex PIAM challenges for SMBs with the ability to: on-board and off-board personnel; establish and implement role-based physical access assignments across single or multiple systems; support regulatory governance and compliance; and conduct audits and generate reports. In addition SAFE for Secure Cloud securely integrates with human resources, contractor management, training, physical access control systems and other systems throughout the organization. Small and mid-sized companies can be up and running with SAFE for Secure Cloud rapidly without the added costs associated with specialized personnel and system administrators, and without dedicated software and servers. In addition to providing a new solution for SMBs to improve physical and cyber security, SAFE for Secure Cloud ultimate lower costs.
Quantum Secure is breaking new ground in physical identity and access management that goes beyond traditional models Quantum Secure, the world’s leading provider of enterprise software to fully integrate physical identity and access management (PIAM) across multiple systems, is demonstrating the company’s latest advancements for enterprise and SMB users here at ASIS 2014. “As SAFE continues to further evolve with higher levels of intelligence and integration, Quantum Secure is breaking new ground in physical identity and access management space that goes well beyond traditional models,” said Ajay Jain, President and CEO, Quantum Secure. “As the role of the enterprise expands to encompass the physical security, identity and access management along with cyber access environments, SAFE’s powerful processing capabilities provide the unique ability to transcend real-time security by defining Indicators of Compromise (IOC) to flag potential threats. We call this Predictive Intelligence (PI) – the new benchmark for enterprise level security.” Quantum Secure continues to refine SAFE’s capabilities to automatically capture and correlate extensive volumes of data from present and historic events for detailed analysis of IOCs based on user-defined policies. This enables SAFE to detect early indications of abnormal behavior across all physical identity systems to help identify and contain potential security incidents before they result in losses. Featured solutions being demonstrated in Quantum Secure’s ASIS 2014 exhibit include: SAFE for Secure Cloud solves complex PIAM challenges for SMBs without the added costs associated with specialized personnel, system administrators, and dedicated high cost computing environments. It extends the PIAM as a SaaS model enabling complex collaboration amongst various identity types (e.g., employees, visitors, contractors and third-party vendors, suppliers, etc.) to manage native and federated physical accesses based upon distributed policies and rules. SAFE for Secure Cloud is full featured and fully secured just like the SAFE on-premise software offering, including automated logging of user access activities for audit and compliance. SAFE for Finance is a Financial Services & Banking vertical domain rendering of SAFE Software Suite specifically tailored for this market with industry workflows, policies and rules built in out of the box, including the support for regulatory governance, audit and compliance such as SOX, BASEL II and GLBA; and allow area owners to electronically manage all processes. Quantum has several customers in this vertical market and is primed to go deeper into this domain next year. "Quantum Secure continues to have a great 2014 fiscal year marked by extraordinary company growth and improved safety and security of our customers and their employees" SAFE for Mobile Solutions offers customer-centric apps on iOS and Android based devices for new employee and contractor on-boarding, visitor registration, access changes and approvals or access audits, lost or stolen badge reporting, access requests and more. Apps focusing specifically on the security department include functionality for visitor management, mobile badging, NDA signatures, alarm and identity metrics, searching and verifying personnel, and more. Additional infrastructural systems improvements now available with SAFE Version 4.8 include: multi-language support to aid customers’ global operations; priority message processing based upon a defined set of conditions (for example, urgent terminations) on a priority basis; parallel and concurrent processing of transactions to PACS for faster and more effective data handling; and a Self-Health Monitoring agent for critical SAFE related interfaces and operations, for immediate notification of any delays or service failures. Entering Q4, Quantum Secure is on pace to have another record year with several new Fortune 500 customers, federal government agencies, large and mid-scale airports, financial services and banking customers, healthcare facilities, and myriad high technology organizations. “Quantum Secure continues to have a great 2014 fiscal year marked by extraordinary company growth and improved safety and security of our customers and their employees,” said Jain. “Our channel partnerships continue to drive expansion into global markets, including here in the United States, Sweden, Brazil and Latin America, the Middle East, India and Africa.”
The new software centralizes all company and identity information across systems and departments into one policy Quantum Secure continues to expand its offering of specialised application modules for the company’s industry leading SAFE physical identity and access management (PIAM) software solution with the introduction of SAFE for Finance here at ASIS 2014. The sophisticated software centralises all company and identity information across systems and departments into one policy and privilege based view. The automated features in SAFE for Finance result in minimized risk, superior compliance and reporting and reduced operating costs. “Physical identity and access management is a cornerstone of any financial institution’s security plan,” said Ajay Jain, President and CEO, Quantum Secure. “SAFE for Finance addresses the highly stringent compliance and security needs of the financial market while allowing integration of disparate systems for end-to-end management, advanced visitor management functionality, and executive level reporting and analytics.” SAFE for Finance is a policy based enterprise solution that effectively manages the entire lifecycle of physical identities and related processes such as on/off boarding, physical access management, and access reviews while providing a completely audit-ready environment for compliance and standards requirements. For instance, its built-in reporting wizards allow the use of pre-configured and ad hoc reports to help reduce audit failures and maintain compliance with SOX, BASEL II and GLBA to name a few. Other SAFE for Finance features include the ability to: establish and implement role based physical access assignments across single or multiple systems; support regulatory governance and compliance standards such as BASEL II and GLBA; and allow area owners to electronically manage all processes. SAFE for Finance securely integrates with human resources, contractor management, and training and physical access control systems. In addition, by analysing alarms, badge usage data and other identity-related data sources, SAFE for Finance provides information related to facility utilization, usage/non-usage of access and any anomalous and/or suspicious behavior.
The SIP program allows practitioners to more easily identify trusted, capable solutions for unique environments Quantum Secure, the leading provider of enterprise software to streamline physical identity and access management across multiple sites and systems, has been selected as a Solution Innovation Partner by the Security Executive Council (SEC), a research and advisory services firm specializing in risk mitigation. “Being selected as a Solution Innovation Partner is an honor and a testament to the strength of our SAFE physical identity and management software solution to mitigate risk for organizations,” said Ajay Jain, President and CEO of Quantum Secure. As part of SEC’s Security 2020 initiative, the Solution Innovation Partner (SIP) program is an informed diligence process that provides end users with a degree of confidence as they choose security product and service providers. Selected companies are evaluated for their risk mitigation proficiency, return on investment capabilities and trustworthiness. The program allows practitioners to more easily identify trusted, capable solutions for unique environments. The SEC offers trusted experience, knowledge-based options, program decision assurance and targeted information to risk mitigation leaders to ensure their security initiatives are strategic, on target and cost-effective. The resources, tools and initiatives they develop are constantly evolving to provide maximum value. The SEC has experience in all realms of the security function, including physical, information and compliance. The SIP initiative is run by SEC subject matter experts, who average 30 years of professional experience. Currently, there are more than 100 of these experts in the SEC’s network who work on projects for Tier 1 Security Stakeholders and other clients. SEC subject matter experts include emeritus faculty (former CSOs who previously managed enterprise-wide security for Fortune 500 companies), recognized industry leaders and professional staff with security and research experience. Quantum Secure is also offering a free webinar featuring the SEC’s Dean Correia, reviewing the state of the union for physical security professionals along with effective risk mitigation strategies that maximize ROI.
Quantum Secure announces the launch of SAFE for Secure Cloud, broadly increasing the accessibility of their premium physical identity and access management (PIAM) solution. As an alternative to on-premise deployment, SAFE for Secure Cloud leverages Quantum Secure’s sophisticated software which is presently in use at over 100 high profile private and public sites globally. The new cloud offering provides SMB users with a highly sophisticated and cost-effective PIAM solution that can increase security across multiple business operations, while providing resellers catering to the SMB market with new business development opportunities. “SAFE for Secure Cloud vastly extends our business model to include SMBs and the professional security resellers who service this tremendous market,” said Ajay Jain, President and CEO, Quantum Secure. “By deploying SAFE as a ready-to-use web-based solution, SMBs can dramatically increase physical and cyber security while reducing overall costs.” SAFE for Secure Cloud solves complex PIAM challenges for SMBs including the ability to: on-board and off-board personnel; establish and implement role-based physical access assignments across single or multiple systems; support regulatory governance and compliance; conduct audits and generate reports. In addition SAFE for Secure Cloud securely integrates with human resources, contractor management, training and physical access control systems. Small and mid-sized companies can be up and running with SAFE for Secure Cloud rapidly without the added costs associated with specialized personnel and system administrators, and dedicated software and servers. In addition to providing a new solution for SMBs to improve physical and cyber security, SAFE for Secure Cloud ultimately lowers costs. SAFE for Secure Cloud provides professional security resellers with new business opportunities in the SMB market by providing an exclusive and proprietary solution offering that can generate a new stream of recurring monthly revenues.