Invixium, a globally renowned manufacturer of innovative touchless biometric solutions, is opening its new Middle East headquarters in Dubai, United Arab Emirates that will serve the Middle East, Turkey, North Africa and Pakistan regions. The new MENA headquarters has been established to best respond to the growing interest in Invixium's health-focused, temperature-based workforce management and access control biometric solutions that are in high demand as businesses reopen during COVID-19 pand...
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, an...
ISC West, in collaboration with premier sponsor, the Security Industry Association (SIA), has announced breaking news and guidance regarding ISC West 2021 event. The international security event was originally slated to be held March 23-26, 2021, but after extensive internal and external consultation and monitoring of the ongoing COVID-19 virus pandemic situation, they have made the decision to reschedule ISC West 2021. Rescheduled ISC West 2021 event The ISC West 2021 security event now will...
After a year of extensive research and investment, Sargent & Greenleaf (S&G) introduces a bold new look to reflect a powerful commitment to product innovation and customer experience. This dynamic transformation embodies the company’s energetic and passionate focus to a future-forward vision of products and services, as well as a commitment to its customers’ security and success. Developing high-security solutions S&G will concentrate on enhancing the customer experien...
Last year saw vehicle thefts rise by a staggering 50% in the UK, and again by a further 20% so far this year, which is regarded to be the highest level in four years. With cases worsening during lockdown, motorists are now being warned that they face a greater risk of vehicle theft now that the nation is making fewer trips in their vehicles and spending more time at home. Countering the rise in vehicle thefts The cost of a lost or damaged vehicle can quickly mount up for any business owner, no...
Codebase Technologies has introduced a brand-new digital FinTech offering, Digibanc Digital Roshan, to empower conventional and Islamic banks in Pakistan to manage seamless, consistent, and engaging customer journeys across multiple customer touch-points and drive their digital transformations. Digibanc Digital Roshan solutions The comprehensive digital solution, Digibanc Digital Roshan aims to help banks to support overseas Pakistani customers to open their Roshan Digital Accounts effortlessl...
Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secure areas of U.S. maritime facilities and vessels. Secured identity authentication The MozaicID app uses the iCAM M300’s detachable FBI-certified Sherlock fingerprint sensor from Integrated Biometrics to authenticate workers’ identities by comparing a live fingerprint to a stored template embedded in the credential. The application will also check the trust status of the presented credential. The iCAM M300 also enables mobile enrollment of workers with its embedded camera simultaneously capturing both iris and facial modes for contactless identity authentication. Authorities statement Mohammed Murad, vice president of global sales and business development, Iris ID, said compatibility with the MozaicID app adds to the versatility of the iCAM M300. “Iris ID and MozaicID have combined best of breed technologies to create an accurate and more secure means of identifying maritime employees wherever their jobs take them,” he said. “The iCAM M300 provides an unparalleled intuitive user interface, which makes the process easier for the user and operator.” Jim Parroco, chief executive officer of MozaicID said “MozaicID is dedicated to providing effective, relevant, and user-friendly security solutions. We institute intuitive and innovative technology in our software with proven results. The product offering, we have with Iris ID provides an excellent security solution in response to a specific need.” Features and benefits Supports other contact or contactless Personnel Identity Verification (PIV) smartcards such as Common Access Cards (CAC) used by military, civilian, and vendor employees in controlled government spaces Commercial Identity Verification (CIV), used by commercial organizations to meet federal government access control standards Comes equipped with software development kits (SDK’s) ready to deploy a wide variety of Android-based identity application Organizations requiring remote identity verification, such as the U.S. Customs and Border Patrol and law enforcement departments, use the water- and dust-resistant iCAM M300 Provides magstripe and contactless card support, as well as an MRZ reader to verify ePassports Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE
PACE Security, a Southern California-based security integration and systems design firm, has announced that it has added the Alcatraz Rock autonomous access control platform to its solutions portfolio. “We are excited to have PACE embrace the Alcatraz Rock and its ability to deliver access control via facial authentication,” said Alcatraz Chief Revenue Officer, Tina D’Agostin. Alcatraz Rock added to portfolio Tina adds, “PACE has already successfully delivered autonomous access control solutions to its clients with the Rock platform, including an installation they have already done for the Martin Luther King, Jr., Community Hospital in Los Angeles.” Based in Southern California, PACE Security has been delivering innovative approaches to security integration for 25 years. PACE provides complete solutions from engineering to the implementation and installation of equipment and complete customer training for seamless integration of access control, closed circuit television, and security. Two-factor authentication Adding the Alcatraz Rock to access control projects allows delivering customers a ‘level 10’ in access control security PACE Security Owner and President, Raymond (Ray) Downs said, “Adding the Alcatraz Rock to access control projects allows them to deliver customers a ‘level 10’ in access control security. Because the Rock can be used in a two-factor authentication where individuals badge in and also have to use facial authentication along with the badge that is as secure as you can get.” He adds, “It can’t be compromised if someone loses an ID badge or if it falls into the wrong hands. They also like the fact that they are not technology restricted by the Alcatraz Rock, since it works with any access control platform. The Alcatraz Rock integrates easily into nearly all access control platforms and can be used on any element at any system at any time. It’s an impressive product and we have a lot of enthusiasm about it.” Touchless and secure physical access control Alcatraz Rock offers a touchless and secure physical access control platform that works with any access control system. It replaces or augments badging as a credential with facial recognition, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. The Rock uses passive 3D sensing, machine learning for increased security, and accurate tailgating detection, while intelligently enrolling employees as they are badging in, eliminating the headaches associated with traditional onboarding. A newly added feature provides a mask detection mode, the Mask Enforcer, to help businesses comply with post-COVID-19 government-mandated facemasks.
ADT Commercial continues its strategic M&A strategy, expanding its nationwide geographic footprint and deepening its capabilities to serve mid-market, national, and large-scale commercial customers in New York and New Jersey with the announcement it has purchased Deterrent Technologies, Inc., based out of Ocean, NJ. About Deterrent Technologies Established in 1982 by David and Carol Hersh, Deterrent Technologies, Inc. has been a pioneer in designing, installing, and servicing comprehensive physical security and life safety systems for complex commercial environments all along the East Coast. Over the last 40 years, Deterrent Technologies has finetuned its expertise to serve customers across a wide range of industries, including global pharmaceutical firms, healthcare providers, financial institutions, legal businesses, insurance companies, educational, government, and multi-family facilities. Authorities comment “We’re thrilled to welcome Deterrent Technologies to the ADT Commercial organization and deepen our bench strength as experienced commercial security providers." "Deterrent’s customer-first philosophy perfectly aligns with our focus on customer service excellence, and we’re looking forward to the success their expertise will bring to the Northeast region,” said Dan Bresingham, Executive Vice President, ADT. “Deterrent Technologies is very excited to become a part of ADT Commercial. Our philosophy for over 40 years has been geared towards total customer satisfaction, a philosophy that ADT Commercial shares." "ADT Commercial’s national footprint will allow us to better serve our clients’ growing needs, and lastly, our dedicated team of loyal and hardworking employees will have the benefit of security, growth and the ability to continue serving our customer base,” said David Hersh, President, Deterrent Technologies.
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced its new partnership with DVS Ltd., a security solutions distributor in the United Kingdom. Suprema – DVS partnership DVS is a well-established distributor of video surveillance products in the UK. By becoming DVS’s first dedicated access control and biometric partner, Suprema aims to expand its customer base, providing UK customers with comprehensive security solutions inclusive of security video cameras. DVS will benefit from being able to supply Suprema’s wide range of products that encompasses controllers, biometric security devices, card readers as well as mobile credential solutions and time and attendance software. Biometric access control solutions expert Suprema expects the partnership to create true customer value, bringing better service to advanced security solutions" “Suprema is very excited to work in partnership with DVS Ltd. They have an outstanding reputation in the security industry for being innovators both in marketing and technical delivery. Suprema expects the partnership to create true customer value, bringing better service to those that need advanced security solutions,” said Jamie McMillen, the Managing Director of Suprema Systems UK Ltd. “DVS is equally excited to partner with Suprema, an industry-renowned biometric access control solution manufacturer. Suprema products are well-respected in the industry as highly-reliable, feature-reach and well-integrated into various VMS solutions,” said David Davies, the Chief Technical Officer of DVS Ltd. Fusion face recognition technology David adds, “This partnership will bring the best of both worlds, allowing our customer base to access Suprema products and our technical design and support expertise. DVS is truly excited to bring brands like Suprema to market.” Celebrating its 20th anniversary this year, Suprema continues to grow in the market, meeting the needs for contactless access control in the new normal. Suprema’s biometric products, such as the recently released FaceStation F2 with innovative fusion face recognition technology and skin temperature screening are well-received, as well as its other solutions like the access control and time attendance software, BioStar 2 and mobile credential solution, Suprema Mobile Access.
ASSA ABLOY Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, leads the way with its range of high-performance timber doors for the public, commercial & high-end residential market. Fire door quality Fire Door Safety Week reported 60% of local authorities experienced delays in their fire door programs, leaving safety to chance and impacting over 16,500 fire doors recently. With local authorities still playing catch-up from these delays, it is vitally important for building managers to ensure their fire doors are safe, compliant, and up to standard. High-quality doorset solution ASSA ABLOY Door Group offers complete doorset solutions from one trusted single point of contact managing the whole process from specification to maintenance. The SMARTec range of high-performance timber doors has been developed to offer a complete doorset solution of high quality, high performing doors and frames, complete with all ironmongery solutions. With Q-mark and FSC (Forest Stewardship Council) certifications across all commercial timber fire doors, architects, specifiers, and contractors can rest assured that doorsets from ASSA ABLOY Door Group are both fire resistant and responsibly sourced as well as containing outstanding security and sound reduction properties. Security values are a top priority Brian Sofley, Managing Director at ASSA ABLOY Door Group, comments “Here at Door Group, we pride ourselves on delivering responsible and compliant doorsets to ensure maximum safety and performance in any suitable setting.” “We want to assure building managers that their security values are our top priority. With the capability to deliver an entire doorset solution from start to finish – we offer a full service from initial specification and manufacture, to onsite installation, after sales inspections and maintenance of our doors.” “The high performance SMARTec range aims to help set the industry standard for timber doors, encouraging stakeholders to prioritize safety and sustainability.”
Industry professionals working on projects in Overtur can now directly export punches collected using the Overtur™ Punch List tool to projects in Procore. Allegion US, a security products and solutions provider announced the integration between Overtur™, a provider of collaboration environment for door hardware and openings, and Procore, a provider of construction management software. With this new integration, contractors and construction professionals working on projects using Overtur as a collaboration platform can directly export punches collected using Overtur and the Punch List tool to a Procore project. Functions of Overtur “As Procore is widely recognized as a leading construction management platform, we are excited about the integration with Overtur and the addition to the Procore App Marketplace. Upon adding the Overtur integration app, users can expect to increase project efficiency by leveraging the system-specific Overtur Punch tool to capture door and hardware information during a walk-through. Once the punches are synchronized to the cloud, a customer can then directly populate a Procore project with the captured punches becoming punch list items,” said Shawn Foster, Overtur content strategist. The Overtur Punch List tool facilitates the seamless creation of a punch list for openings and hardware directly from a job site on a mobile device. After downloading plans and hardware information, a user can accept or flag an opening or the door hardware when comparing it to contract requirements, as well as add site notes, take photos, attach existing photos or add a voice memo. Once the punch list form is complete, Overtur synchronizes the entered data and routes it back to the project for collaboration, reporting, and administration. Benefits of integration Overtur customers who also use Procore can now further benefit from this technology firepower. Once openings are punched and synchronized to the Overtur project, customers can directly connect those punch list items to their Procore projects. Overtur punches are exported directly into the Procore Punch List, enabling users to review, collaborate on, and resolve punch list items using the context of rich project information available in Procore. Exporting these project details simply requires a click of the Procore export button in Overtur and a selection of the specific project. Without the need to use intermediate file formats such as CSV, customers save more time and reduce the potential for oversights in data transfer. Punch list app Overtur simplifies the specification, design, construction, and management of openings through improved communication, collaboration, and efficiency. The Punch List app is available in the Apple and Google Play stores by searching for Overtur and can be used on phones or tablets with either iOS or Android operating systems.
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
Fingerprint identification had once been the most widespread biometric technology around the world. However, many argue that this technology has quite a lot of shortcomings. For instance, even expensive fingerprint reading scanners have a hard time identifying dirty or wet fingers, plus, some people's fingerprints are unreadable. Furthermore, being vulnerable to the temperature and precipitation, such scanners consequently cannot be used outdoors. Plus, fingerprint reading scanners do not meet today’s demand for contactless biometric technology. According to a new comprehensive report 'Global Contactless Biometrics Technology Market 2020-2026', "the Global Contactless Biometrics Technology Market size is expected to reach $18.6 billion by 2026, rising at a market growth of 19.1% CAGR during the forecast period. The development and acceptance of contactless biometric technologies have been driven by demand for faster and easier authentication processes and boosted by demand generated by the COVID-19 pandemic." Thus, it is contactless biometric recognition technologies that meet the latest requirements. Too expensive? Until quite recently, face recognition technology was too expensive and poorly scalable. Nevertheless, a lot of factors have changed in recent years. To start with, facial biometric technologies have become more accessible for a large audience. Being affordable, reliable, and easy to use, facial recognition systems provide a high level of security. Furthermore, the facial recognition system allows you to instantly notify about facial identification cases.The market of biometric technology is continuously growing It is also important to emphasize that the system itself automatically updates biometric data. Photos in biometric profiles can be updated directly from the video stream. The data is stored in long-term storage and does not take up much memory. The reasons mentioned above provide all business fields with a competitive advantage. Since the market of biometric technology is continuously growing, contactless identification will be highly demanded in the long run. Impact of COVID-19 Plus, the contactless facial recognition system is especially relevant today due to the COVID-19 pandemic. Now wearing a mask is required almost in all public places. That is why those systems aimed at people's safety monitoring had to promptly develop their solutions according to the new requirements. Developers of facial biometric solutions have encountered an issue of face detection in masks. It was essential to adapt the software to such changes, more specifically update the face recognition algorithm. It may be illustrated by the case of RecFaces company. RecFaces developers have updated the facial biometric algorithm to ensure the most accurate recognition of people in masks that cover almost 50% of a person's face. Nonetheless, if the company forbids entering its territory without a mask, the system sends notifications (push or SMS notifications) to control people coming through the checkpoint with and without masks. The algorithm update has boosted face recognition accuracy and speed. Global transformation As a matter of fact, facial recognition algorithm has evolved around the world. According to the tests conducted by the National Institute of Standards and Technology (NIST), the top face identification algorithm of 2020 has an error rate of 0.08% compared to 4.1% for the best algorithm in 2014. Such improvements will reduce risks linked to misidentification, and expand the advantages that can come from proper use in the long run.Al and deep learning are key elements of the latest-generation algorithms According to the National Institute of Standards and Technology report recognition errors were caused mainly by image quality variations like pose, illumination and expression. In 2018 the software was at least 20 times more accurate than it was in 2014 and in 2019 finding “close to perfect” performance by high-performing algorithms. Such improvement has resulted from the integration or replacement of previous approaches with those based on deep convolutional neural networks, operating even with poor quality images. Artificial Intelligence (Al) and, more specifically, deep learning are key elements of the latest-generation algorithms. Facial recognition is reaching that of automated fingerprint comparison, which has been considered as the gold standard for identification for a long time. Therefore, there is no doubt that innovation drives the development of solutions, and biometric technologies also move with the times. The shift from fingerprints to facial recognition is a vivid example of such evolution!
In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers very much belong to the ecosystem wherein personal or user identification data is transmitted either to a host system such as a PC or to an endpoint such as a Human Machine Interface (HMI). A passive RFID transponder, soft credential such as a mobile phone app using BLE/NFC or smart cards and other contact-based credentials all can carry sensitive data or personal information. In the case of smart card or contact-based credentials, the storage of personal information such as name, address or date of birth is more prevalent compared to contactless credential where an identification number may be used. Security as a concept RFID media may directly lead to a compromise in your intended application’s security In general, security as a concept is always related to the entire system that includes RFID media (contact/contactless credentials), RFID reader, the host system and any database or cloud server. While accounting for security across a system is needed it is more important to consider the application or use case that is in question. One should carefully evaluate the consequences of any security breaches and if there is any sensitive information being exchanged from the RFID media to the host. As an example, the simple choice of RFID media may directly lead to a compromise in your intended application’s security. There are numerous references on security vulnerabilities related to Low Frequency (125KHz) contactless transponder types. The references focus on using interceptors to access unprotected static card information. The adversaries may then clone this credential that may be used for triggering action such as granting access to a facility or unlocking a computer. Some references also highlight vulnerabilities in the Wiegand interface about intercepting the data signals to capture card value. Therefore, some older RFID transponders and communication interfaces that may be based on the aforementioned technology or have been subject to vulnerability hacks are now considered fundamentally compromised. As mentioned previously, the overall security depends on every component of the system that includes the RFID reader. This article will mainly focus on some of the basic security considerations that need to be accounted for when choosing an RFID reader but also whether or not your application requires these abilities. Some of the key security considerations are as follows: Does your application require encryption capabilities? If so, does the reader have the capability to execute cryptographic algorithms? In every application where RFID technologies are involved, there is a need to first assess whether encryption is required and if so, determine the exact channel where this needs to be enforced. It could be that the host interface requires the exchange of encrypted data or the air interface needs to transfer protected data. Once the requirements are established, one may then evaluate the strength of this security. Furthermore, many types of contactless transponders can store data within their memory segments and encrypt or lock these segments with cryptographic keys. An apt card reader is one that can not only decrypt the memory segments and access the data but also provides an easy means for the end-user to carry out this operation. In many instances, the end-users have their own customized cryptographic keys for their credentials and are unwilling to share these keys with the card reader provider. Therefore, having the capability to load custom keys by someone other than the card reader manufacturer becomes essential. This can be facilitated in multiple ways, such as implementing high-level APIs and allowing the user to write applications for the card reader, or it could be enabling the customer with agraphical user interface to enter keys used to access data sectors. Many types of contactless transponders can store data within their memory segments Do you require encrypted data exchange? If so, where and can the card reader support this? In a typical scenario, the card reader behaves as a medium to facilitate data collection and transfer between the contactless or contact-based transponder and the host system. The host system can either be an endpoint that locally validates the credential presented to it or it can be a microcontroller that sends data over the network to the cloud or a database for validation and authentication. As mentioned previously, assessing whether the need for encryption is between the RFID media and the reader or from the reader to the host is important. If the former, the appropriate credentials are required. Depending on this factor you may then consider choosing an appropriate RFID reader. There are use cases wherein personal information such as name, address, date of birth or biometric data can be stored within the credential, eg: smart cards or passports as credentials. Therefore, encrypting the exchange of such data both between the credential and the reader as well as the reader and the host becomes critical. Moreover, encryption algorithm engines such as AES, DES, 3DES, or the capability to implement custom algorithms, need to be present on the card reader as this enables ease of integration. In cases where smartcards or contact-based credentials are used, the host system typically drives the communication in its entirety. So, the card reader must also have: Software capabilities such as Personal Computer Smart Card (PCSC) or Chip Card Interface Device (CCID) mode of communication. The availability of drivers to facilitate communication with the host also enables easy software integration. Hardware support for communication standards such as ISO7816 and the presence of Secure Access Modules(SAM) slots and other contact-based interfaces. Does your application require MUTUAL authentication with Secure Access Modules (SAM) and RFID media? If so, does the reader support This? A Secure Access Module is a type of smart card that follows a contact-based communication standard to interact with a card reader. These modules ensure the protection of security keys as well as facilitate cryptographic operations. Typically, SAMs are used to generate application keys based on a specific master key or to generate session keys. They also enable secure messaging between the RFID media, the reader and the host system. Many contactless credentials hold memory segments/applications that are encrypted with cryptographic keys. These keys are often stored in SAMs and supplied to card reader manufacturers. This not only ensures the security of the keys but adds a step in the authentication process. The card reader in this case should first perform authentication operations with the SAM and then carry out a series of cryptographic and bit manipulation operations between the contactless card and the SAM. This can be further secured by adding a key diversification step. The card reader must be able to support such a scenario both in the hardware as well as in the software. Many end-users require the card reader to natively support such a scenario and have the ability to provide high-level API’s to help in their implementation. In addition to this, high-security applications demand the transfer of data in an encrypted format. One can ensure end-to-end encryption/security with the help of SAMs. In such an architecture, the reader facilitates mutual authentication with the RFID media and the SAM, thus transferring protected data over a Radio-Link and also ensuring the security of encryption keys. The reader can also transfer data encrypted by the SAM to the host system maintaining a high level of security across the system. Appropriate precautions are to be put in place to improve the overall security Note that the safety of distributing SAMs as well as administering the installation process within the reader should be treated as a separate issue and tackled accordingly. There is also an issue of the readers being stolen or the SAM modules being dismounted from the reader. The security considerations here do not indulge in these topics and appropriate precautions are to be put in place to improve the overall security of the system. Does the card reader have communication interfaces other than Wiegand such as RS485 or RS232? The Wiegand card as well as the Wiegand interface for data transmission is a 40-year old technology that originates from the Wiegand effect discovered by John R. Wiegand in the early 1970s. While the Wiegand cards are still in production, they have been largely replaced by newer and cheaper forms of access cards. However, these cards are still based on the Wiegand data format that is susceptible to interception as the data are available in plain text. Also, the Wiegand interface introduced in the 1980s remains prevalent across the logical access as well as the physical access control industry despite various security vulnerabilities. This technology no longer conforms to the current security standards. It is therefore important for integrators to choose a communication interface that can offer higher security from interception and support encrypted data exchange. Do you require tamper detection technologies? If so, can the reader meet this requirement? The need for tamper detection largely varies from one application to another so it is more important to consider whether this level of security is suitable for your respective use case. As an example, card readers attached to multi-function printers (MFPs) for releasing print jobs in an enterprise environment can be considered less critical since tampering with the reader can ultimately lead to the downtime of the printers but will not compromise the safety of your documents. Typically, in such scenarios, the card reader works hand in hand with the MFP and a print management solution that ensures the release of print jobs. Therefore, if the card reader is sabotaged or tampered with, the MFP or the solution simply prevents the release of any information. On the other hand, high-security environments such as data centers certainly need greater protection. One must thoroughly evaluate the consequences of any attempts directed towards compromising the device integrity or the data associated with the device. These topics need to be considered separately and are outside the scope of this article. In conclusion, depending on the application, the credentials involved as well as the data that is being exchanged with the card reader and eventually the host, tamper detection technologies can improve the security of the device. There are several technologies in the market such as mechanical and optical tamper detectors that can be embedded directly on the card reader for superior protection against threats. Do you require the reader's ronfiguration or firmware to be securely shared or loaded on the card reader? If so, can the reader meet this requirement? We are all aware of system and application software updates as at some point our phones have received security patches or app upgrades over the network. In the case of card readers, the process is quite similar except here the software or configuration updates might require encryption based on your use case. For example, if an end customer is reading static card numbers from an RFID media or isn’t using data protected by encryption keys this does not require the firmware or the configuration to be encryption for a simple reason that these files do not carry any sensitive information. The need to encrypt configuration/firmware files arises if the data that is being read by the reader contains any personal information or is part of a proprietary corporate format that is confidential, or should a customer wish to move to a higher security credential encrypted with keys. This means that either their existing card readers or new card readers must have a configuration that holds these keys. Configuration or firmware must also be encrypted since it holds sensitive information In such a scenario, the configuration or firmware must also be encrypted since it holds sensitive information. If the configuration or the firmware is encrypted, the file will no longer pose a security risk and can be shared with customers to perform updates to the existing readers or with the card reader manufacturers to load new readers with the configuration of firmware updates. This not only secures the sharing process but also the update process since the reader is now receiving an already encrypted file. After all, it is essential to choose a card reader that can carry out the aforementioned security considerations but more importantly the security features that are chosen need to be appropriate to the requirement of the customer. Any integrator first and foremost should thoroughly evaluate the respective application. They should work with subject matter experts in the field and establish requirements and objectives. After developing the concept, system architecture, data flow as well as various secure channels, only then can one begin to account for the security features needed. This process not only helps cement the end system’s overall security view but also elucidates the exact security requirements that correspond to the resulting application. In conclusion, choosing an RFID product that not only has the above security features but also has a flexible system design capable of accommodating future adaptions will prove to be the right choice for OEM’s and system integrators.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimizes security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimized operational costs; and an improved passenger experience. AI for Object Recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbor, Sydney Opera House, and Sydney Harbor Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf, and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 meters-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorized people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. This project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
Sharps Pixley is a British bullion house, formed in 1957 when two historic private bullion partnerships merged. In 2015 Sharps Pixley decided to put physical gold back on the streets of London via a flagship high street presence in St James’s Street, just off Piccadilly. In this very special shop, not only can customers buy products but they can also store them on-location in new, state-of-the-art safe deposit box facilities. Sharps Pixley needed to upgrade their ageing control system for their safe deposit box service. Old biometric system They were facing a number of challenges with their old biometric system which was substantially impacting customer experience and satisfaction: Capturing fingerprints during the enrollment phase, especially with older clients, would typically take several attempts. During the verification process, the shop operator faced similar issues thus requiring multiple system restarts to get the device working correctly. The software was unstable and would often crash. New additional functionalities were also required to be able to offer the correct secure services to the clients: Two person authentication to access a single safety deposit box. Manual authentication in addition to biometric identification. Replacing the key fob with a biometric solution. Access control technology Arana Security was contracted to help. Operating in the UK and Middle East, Arana Security specialises in biometric solutions, access control technology, surveillance and monitoring systems. They set about to design a new application for Sharps Pixley, to enhance the security, authentication and usability of the system - adding new next-level security clearance and a fresh and improved enrollment of clients’ biometrics. For the important biometric part, Arana Security and Sharp Pixley selected IDEMIA’s MorphoWave Compact contactless fingerprint device to enable fast, smooth and accurate verification of clients. MorphoWave Compact performs a 3D scan and verification of four fingerprints in less than one second, in a quick, easy and hygienic touchless hand wave gesture. Thanks to advanced algorithms based on Artificial Intelligence, the accuracy is very high, even with ageing fingers. Contactless biometric devices The system provided has improved the client’s service and provided a more robust, secure and reliable solution The implementation of MorphoWave Compact contactless biometric devices meant less time wasted at the desk waiting for confirmation of IDs and less stress on both the clients and employees. The system provided has significantly improved the client’s service and provided a more robust, secure and reliable solution. Sharps Pixley’s comments: “We approached the Arana team with a particularly unique set of problems to resolve including a security system that used hardware and software originally designed for a totally different purpose. I knew what I wanted but was not sure if it was possible. I was essentially an explorer deep in the jungle with a perfect map in my own head, but with no tools or machinery to hack my way out." Provides palpable reassurance "Arana did more than just clear a path for me to get to my destination - they paved the road for me afterwards. MorphoWave Compact device from IDEMIA is the icing on the cake that makes this all possible. Used properly it is refreshingly simple and intuitive. The team here and our clientele no longer struggle to manage or use our access system. The device itself provides palpable reassurance in the technology and that has true value”, says Bruno Garcia, Sharps Pixley.
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fueled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralized access control systems Almabani General Contractors was using traditional decentralized access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognized in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralized, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customized reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralized solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customized with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralized time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
The contactless technologies will enhance passenger safety and security during the pandemic. Vision-Box, a pioneer in biometrics seamless travel, automated border management and electronic identity management solutions dedicated to improving the quality and security in government services, travel and border control, has announced the implementation of an integrated Biometric experience for Emirates Airline at Terminal 3 of the Dubai International Airport. Vision-Box’s contactless technology Vision-Box’s Orchestra™ Digital Identity Management Platform - a state-of-the-art touchless and contactless passenger processing at the airport to provide passenger safety and security in response to the COVID-19 pandemic. Vision-Box’s contactless technology will offer a sophisticated traveler experience, comprising an identification, clearance, and safety monitoring environment. The new infrastructure offers a suite of digital tools that reduces or eliminates passenger contact with touchscreen surfaces, and physical interaction with airport and airline staff, thus providing a safe travel experience. Some of the key automated features of the Orchestra Platform provided for Emirates passengers include: Touchless identification using facial biometrics Contactless security checks for clearance Digital travel document authentication – eliminating the need for carrying paper documents Touchless lounge access Touchless boarding Additional benefits This also reduces long waits at checkpoints and curtails crowding at clearance hotspotsThe Orchestra™ Digital Identity Management Platform removes the time-consuming task of manual identification, meaning that passengers do not need to physically interact with potentially exposed touchpoints or exchange travel documents manually at counters. This also reduces long waits at checkpoints and curtails crowding at clearance hotspots, allowing passengers to navigate the airport a lot quicker and safely without the need for interacting with other people, thereby reducing the transmission and exposure to pathogens. Vision-Box and Emirates reaffirmed their mutual commitment by signing a long-term agreement to deploy and advance a digital shift in passenger operations at Dubai Airport and beyond, aimed at keeping travellers and staff safe. Advanced touchless biometrics and contactless clearance technology used at Terminal 3 shifts the passenger clearance process from a manual interaction to one of minimal physical contact with automated self-service devices. Using the award-winning Vision-Box Orchestra™ Digital Identity Management Platform, Emirates is optimizing traveler flow and passenger processing through security and clearance checks being performed in less time. Facial recognition biometrics offers the highest level of traveler identity security and significant improvements over traditional manual and touch-based identification procedures in terms of hygiene, accuracy and privacy protections. Vision-Box and Emirates alliance The collaboration with Emirates is the result of a successful 4-year trial of digital identification technology, when one of the world’s leading airlines selected Vision-Box as the key technology provider and partner to deliver a One-ID end-to-end biometric solution that complies with all international security and privacy standards. Travelers digital enrollment allows them to be automatically recognized and for contactless passageIn March 2019, Emirates launched its Biometric Path for select passengers at Dubai Airport T3. Travellers who chose to opt-in, enrolled their facial biometrics during the check-in process to generate their unique One-ID Single Identification Token. This digital enrollment allowed passengers to be automatically recognized and allowed for contactless passage through border control, boarding, and Emirates lounge access using eGates. The new partnership with Vision-Box will now expand the enhanced contactless traveler experience to all Emirates Airline passengers. The agreement also covers an Emirates Group Enterprise wide framework that will allow enhanced contactless access security measures to be deployed across all of the Emirate Group companies and affiliates. Contactless experience Miguel Leitmann, the CEO of Vision-Box said “The need for touchless identity management and seamless passenger flow management is the new reality. As air travel dynamics have evolved under the covid-19 pandemic, the importance of a safe contactless passenger experience is paramount to the industry’s revival. Emirates has been one of the first in the world to recognize the need for contactless digital technology for passenger safety and have sought to swiftly implement the most advanced technology with Vision-Box’s touchless and contactless technology." "With this combined with Orchestra, our smart passenger flow management platform, Emirates is fully equipped to offer revolutionary world class contactless experience for passengers navigating though the airport.” “We are excited to build this partnership with Emirates and together deliver safe, secure and seamless experiences to the millions of travellers who chose to fly with Emirates.” Installed first phase of contactless technology As part of the Orchestra™ Digital Identity Management Platform implementation, Vision-Box has deployed and delivered the first phase of the biometric self-service touchless devices at areas in Concourse B at Terminal 3. The Contactless Passenger solution includes eGates and VBoT™ IoT Biometric devices located at manual counters. The VBoT provides contactless biometric face enrollment and identification for Economy, Business and First-Class travellers and is natively embedded into the Emirates check-in application. Last generation smart eGates enable the use of Seamless Self-service processes for Lounge access and Automated Boarding that ensure a contactless travel experience. TVS allows Emirates to biometrically identify all the US outbound passengers at boarding Emirates is already leveraging on the flexibility of the Orchestra platform on flights to the USA, directly connecting Vision-Box solution with the U.S. CBP TVS (Traveler Verification Service) from Dubai. In cooperation with U.S. Customs and Border Protection, TVS does not require pre-enrollment and allows Emirates to identity biometrically at boarding all the US outbound passengers. Subsequently, Vision-Box will scale up and implement the contactless passenger solutions across all Terminal 3 concourses. Certification and compliance The Orchestra™ Service Platform is fully compliant with Data Privacy regulations through its unique Privacy-by-Design certification. It operates under user-centric business rules and is the kernel of the advanced management of Identity proofing and Flow Monitoring of Passenger processes. The platform’s powerful capability allows it to process the full extent of Emirates passenger volume, thanks to its future-proof scalable design and resilient architecture. With Emirates and Vision-Box building a strong case for contactless and hygienic biometric security on an enterprise wide approach, they are providing the aviation industry with a model for business continuity in challenging conditions. Together they are enabling a distinctive touchless, contactless brand asset in the world of aviation 4.0 that is technologically grounded and inspires passenger confidence. The solution unleashes the power of the IATA One-ID framework as a tool to combat future epidemics and other threats.
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organization is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Center helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Center, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organization to support customers by optimizing spend, mitigating risk and enhancing their security programs. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritize technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Center are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organization’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Center near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
Round table discussion
Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?
A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?