Alcatraz, developer of secure touchless access control products, has partnered with Clear Cloud Solutions Inc. to sell and market Alcatraz’s innovative facial authentication platform in targeted physical security verticals. Marketing Alcatraz Rock Platform “Clear Cloud Solutions Inc. has earned a great reputation for specializing in protecting critical assets in many sectors, particularly the utilities vertical,” said Alcatraz Chief Revenue Officer, Tina D’Agostin. She...
Ping Identity, the intelligent identity solution for the enterprise, announces PingZero, a suite of passwordless authentication features organizations can implement to deliver seamless digital experiences to employees and customers. By eliminating login friction, including the need for usernames and passwords, PingZero boosts employee productivity, improves customer retention and acquisition rates, and strengthens cybersecurity defenses — all with zero passwords and zero friction. PingZer...
Alcatraz, globally renowned developer of secure touchless access control products, has partnered with New York Security Solutions, Inc. (NYSS) to sell and market the Alcatraz Rock platform, in the US East Coast market. Touchless access control solutions “At New York Security Solutions, Inc., we take pride in the effort we put into choosing a security product to recommend to our clients and as technology geeks, we have been very impressed with the Alcatraz Rock platform and its ability to...
Vision-Box a global provider of biometrics seamless travel, automated border management and electronic identity management solutions dedicated to improving the quality and security in government services, travel and border control - announced a regional strategic partnership with AirAsia Group, to implement pioneering, identity management technology across its network of 152 airports. As a provider and pioneer of new seamless digital identification technologies throughout the travel ecosystem,...
The Physical Security Interoperability Alliance (PSIA) has announced that it has elected Jason Ouellette, as its Chairman and Ewa Pigna, the Chief Technology Officer for LenelS2, a part of Carrier Global Corporation, as its Vice Chairman. Standards-based digital data In addition, Peter Boriskin, the Chief Technology Officer for ASSA ABLOY Opening Solutions Americas, will continue in his role as the organization’s Treasurer. The PSIA membership develops specifications for enabling standar...
One of the biggest trends in security and technology today is centered around solutions that take advantage of the wealth of connected security systems and devices powering the organizations all over the world. As the number of cloud-powered systems and sensors have massively grown in recent years, security leaders in the private and public sectors have started to look at ways to leverage the data from these devices to better the lives of employees, customers, and residents. But while the drea...
Securiport, the pioneer in border management and civil aviation security and threat assessment solutions and systems, announces the release of their newest product line within their suite of services focusing on In-Vehicle Biometric Collection (IVC) and In-Vehicle Biometric Verification (IVV) to automate border processing. Over the years Securiport has pioneered a variety of solutions to ensure the safety of travelers and citizens alike. The most recent product release of in-vehicle systems has been tailored to meet the demands of increased traffic at international borders and border control points. Automated processing system In-vehicle collection and verification will allow for an automated processing system where persons crossing borders are accurately and efficiently verified without the need to exit their vehicle. The in-vehicle systems will drastically decrease traffic and wait times, especially in areas where workers cross borders several times a day. The systems have been developed in coordination with government authorities to process both pre-registered and un-registered travelers without compromising border security. Securiport’s patent-pending system allows travelers to be pre-registered and then processed through in-vehicle biometric verification (IVV) in both single and multi-occupant vehicles. Pre-registered individuals will be able to opt into the process and share the necessary personal data and biometrics in a secure setting as required by the country’s laws and policies. Multi-Modal biometrics The system can then automatically process the driver and all occupants of the vehicle smoothly and quickly Thereafter, each individual is equipped with a transponder that will be activated using the person’s biometrics once they approach the border point. The system can then automatically process the driver and all occupants of the vehicle smoothly and quickly if they are all pre-registered in the system. Unregistered travelers will also benefit from this innovative solution through the in-vehicle biometric collection (IVC) where travel documents and multi-modal biometrics are captured through a ruggedized handheld tablet. The process does not require any passenger to exit the vehicle, cutting down on processing and wait times. Patent-Pending product “We have worked closely with our government partners to find an innovative solution that meets the demands of our travelers, especially those people who cross borders several times a day. We are very pleased to be able to provide this novel patent-pending product to create a positive impact on both the traveler as well as the officers who are on constant alert,” said Leandro Olie, Securiport’s Chief Operating Officer. The in-vehicle collection and verification systems can be operated as a stand-alone system, integrated with other border control systems, or can enhance existing Securiport solutions and can positively identify and process all the occupants of the vehicle quickly and conveniently.
Radio Physics announce winning the security category in Prosegur’s “COME IN”, open innovation program. From amongst the more than 190 start-ups from 33 different countries, the winning companies will receive support from the different units at Prosegur, one of Spain's top security multinational, to develop and implement their projects worldwide. Radio Physics, a renowned provider of stand-off concealed threat detection, is pleased to announce winning the security category of the challenge aimed at finding security solutions with non-invasive methods for busy spaces or events. The winning proposal comprised Radio Physics’, Optracon concealed threat detection solution, a sensor system that uses a combination of radar, VCA, LiDAR and machine learning for the remote detection of hidden threats such as weapons or explosive devices. Threat detection solution Their talent, combined with the enormous potential of Prosegur's technological innovation Mark Pritchard, CCO said: “We are looking forward to forging a strong relationship with Prosegur. Working together using our state-of-the-art threat detection solution, Optracon, and Prosegur’s global reach to develop and implement our solutions worldwide, in collaboration with Prosegur's business units and their customers.” In the words of Prosegur's Director of Innovation, José Daniel García Espinel, "the excellent response to the program highlights the impetus of the start-up ecosystem. Their talent, combined with the enormous potential of Prosegur's technological innovation, have turned future security challenges into real projects that will reinvent the way we protect our environment." International experience and projection Furthermore, he referred to collaborative models as "in combination with Prosegur's international experience and projection, the formula for success to incorporate the external talent of start-ups and accelerate the "go to market" process, thus revolutionizing the security sector."
HID Global, the globally renowned provider of trusted identity solutions, has announced that its next-generation Seos credential technology will enable Nymi Band 3.0 users to seamlessly open doors and authenticate to systems, devices and machines. Nymi Band 3.0 wearble wristband The Nymi Band is the world’s only workplace wearable wristband that, once authenticated, offers the convenience of continuously authenticating the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. “Wearables are increasingly popular authentication for access to buildings, doors and assets, manufacturing systems with compliance traceability requirements, healthcare and defense markets and other hands-free applications, where users may not be allowed to carry mobile devices, cards or fobs,” said Steve Currie, Vice President and Managing Director of Extended Access Technologies with HID Global. Steve adds, “We are excited to provide these high-assurance authentication capabilities with the Nymi Band 3.0, an exciting new wearable on the market.” Integrated with HID Seos technology HID Seos technology gives the Nymi Band 3.0 all the capabilities of a secure smart card" In addition to physical and logical access use cases, Seos technology enables the Nymi Band 3.0 to be used for applications ranging from secure intelligent print collection and social distancing and contract tracing to contractor and visitor management, canteen and vending machine payment, and secure remote working. “HID Seos technology gives the Nymi Band 3.0 all the capabilities of a secure smart card, including its best-in-class cryptography that delivers superior data and privacy protection compared to other biometric and credential technologies,” said Chris Sullivan, Chief Executive Officer (CEO) of Nymi. Enhanced privacy and security Chris adds, “We believe these capabilities will fuel even faster adoption for our wristbands, which are already seeing rapid uptake in applications like pharma manufacturing with an emphasis on privacy, security and a natural user experience.” How it works: The HID Seos applet is loaded onto secure elements (SEs) inside a Nymi Band so they can carry security keys and encrypted firmware. Seos credentials are sent to the wristbands over a Near Field Communications (NFC) connection. Users enrol their fingerprint one time to the Nymi Band and the band is matched to the user identity. At the start of the work day, the user authenticates the band with their fingerprint, and the Nymi Band is enabled with strong assurance after it detects a heartbeat. Native support in HID DigitalPersona software also enables the wristbands to be used for Windows login with both Seos and FIDO2 passwordless authentication. Seos credentials support HID Signo and iCLASS SE readers that are broadly deployed in every major vertical market around the world. Integrated with unique biometrics The Nymi Band provides strong assurance of an individual's identity using their unique biometrics. Through On-Body Detection (OBD) and presence, the Nymi Band 3.0 ensures that it is always on the intended user and the user is physically present. The users’ biometric credentials never leave the Nymi Band 3.0 database, providing advanced security and privacy at all times.
Resideo Technologies, Inc., a provider of home comfort and security solutions, announces the availability of its Honeywell Home ProSeries Security and Smart Home Platform. From an entry-level security system to a fully integrated smart home solution, the ProSeries Platform offers dealers that serve residential and small businesses a complete, end-to-end solution, and expands Resideo's overall portfolio of connected security solutions and services. Connected smart home "The initial preview of the ProSeries Platform with our professional security dealer network generated significant excitement as they told us it is exactly what has been missing in the industry," said Alice DeBiasio, vice president and general manager, Global Security, Resideo. "As families spend more time at home, it is more important than ever to have access to professional monitoring and the benefits of a connected smart home. With the introduction of our award-winning ProSeries Platform, our security dealer network can better meet the growing demand from customers for solutions that help keep families and businesses safe and secure." Wireless security panel The ProSeries Platform also offers homeowners a sleek and modern design that seamlessly blends The new ProSeries Platform offers a uniquely scalable, modular design and includes an all-in-one wireless security panel with a 7-inch color touchscreen, a family of wireless keypads and two-way sensors, alarms and accessories. Designed specifically for easy, professional installation, the ProSeries Platform also offers homeowners a sleek and modern design that seamlessly blends in with any décor. The platform allows for easy additions as technology trends evolve and families' lifestyles change, and provides: World-class security. It provides dependable alerts for movement and intrusion, and 24/7 professional monitoring can alert first responders, when necessary. Whole-home safety. From fires and floods, to smoke and carbon monoxide, the system helps keep families safe and informs them if they need to exit quickly through the company's exclusive One-Go-All-Go alarm Smart home control. Provides an enhanced user experience with hands-free disarming, a built-in Amazon Alexa voice assistant and a consistent user experience across all user interfaces and the Total Connect mobile app. Ensuring system reliability The product trials and testing for the ProSeries Platform included an extended beta program with security dealers to help ensure system reliability, performance and security. Professional security dealers applauded the seamless combination of hardware, software and back-end surveillance capabilities that allow for remote service. The new ProSeries Platform combines three critical elements – security, fire safety and smart home control" "The new ProSeries Platform combines three critical elements – security, fire safety and smart home control – in an easy-to-use, all-in-one solution," said Stephen Wheeler, President of Holmes Security Systems in Fayetteville, N.C. "Homeowners will really like the smart home features, including the integrated Amazon Alexa voice assistant and commands. During the beta trials, our whole team got excited about the new platform and really loved the two-way encrypted sensors and wireless keypads." Life safety solutions Resideo is a manufacturer of security and life safety solutions, with millions of installed solutions worldwide. Its professional security portfolio includes a broad portfolio inclusive of: Security, life safety and home control systems; Panels and secondary keypads, including touchscreens; Two-way encrypted sensors with anti-takeover protection: including Indoor MotionViewers and life safety sensors with the patented One-Go-All-Go alarm feature that ensures true total protection throughout the residence; and, The AlarmNet 360 Cloud Services and Solutions, the company's proprietary, back-end and video surveillance capability that offers a seamless installation experience and real-time data insights.
VIVOTEK, the global IP surveillance solution provider presents its latest facial recognition surveillance solution, brought through cooperation with the AI and facial recognition technology pioneer CyberLink Corp. The enhanced software integration between VIVOTEK’s Video Management Software (VMS), the VAST 2 and CyberLink’s FaceMe® Security facial recognition software will enable users to monitor and manage facial recognition results effortlessly for a wide range of security applications. Facial recognition In response to the surging demand in facial recognition applications, VIVOTEK is committed to providing a state-of-the-art facial recognition experience by adopting CyberLink’s FaceMe® Security software, into VIVOTEK’s VMS VAST 2. Staying ahead of the competition, VIVOTEK offers not only facial recognition compatibility but also supreme image quality by implementing a diverse array of VIVOTEK’s edge computing network cameras to VMS. Empowering security operators Through VIVOTEK’s enhanced VMS VAST 2, users will encounter a smoother installation process due to the centralized interface Through VIVOTEK’s enhanced VMS VAST 2, users will encounter a smoother installation process due to the centralized interface for camera settings, and receive accurate instant alerts based on preset blocklists, VIP and employees. Moreover, a series of matched videos filtering by VAST 2 database profiles empower security operators with a seamless facial recognition management experience. Beginning their alliance with CyberLink in early 2020, over the past few months, VIVOTEK has successfully brought this solution to the market across industries worldwide. Access control management It has found ideal application in settings from contactless access control management in commercial buildings, factories and hospitality, to security monitoring across campuses. In the near future, VIVOTEK will co-host a series of online webinars with CyberLink in Taiwan, Japan, Latin America and the USA, to demonstrate how AI facial recognition will transform smart security.
Intersec, the world’s renowned security, safety, and fire protection trade fair, has been rescheduled to take place in January 2022, organiser of the trade event, Messe Frankfurt Middle East confirmed on September 24, 2020. The 23rd edition of the three-day event was originally set to run from January 24-26, 2021, at the Dubai World Trade Center, in Dubai, UAE. However, the event has now been moved to 2022, after extensive consultation with key industry stakeholders. Intersec Dubai 2022 “We’ve spoken to many of our exhibitors, industry trade associations, supporters, and partners over the last couple of weeks and have heard first-hand the many challenges they’re facing putting pressure on their ability to participate at Intersec in January 2021,” said Alexandria Robinson, Intersec’s Show Director at Messe Frankfurt. He adds, “Moving Intersec to its customary January dates in 2022 at the Dubai World Trade Center will allow time for recovery.” Webinar series in 2021 Ms. Robinson said Intersec will be very active throughout 2021, via its ongoing webinar series, while the team is now working towards creating a virtual event early next year, so as to engage industry leaders, regulators, government agencies and opinion formers. “We might be restricted physically, but we know there is a definitive need for critical conversations and discussions to address the challenges the industry has faced,” said Robinson. Digital forum to share ideas and solutions By hosting these talks via a digital forum, it enables us to keep connected to the industry" He adds, “By hosting these talks via a digital forum, it enables us to keep connected to the industry and nurture our existing relationships, while sharing solutions and common goals. We’ll share further details and plans about the digital event in the coming weeks.” Intersec’s popular free-to-attend webinar series, of which there’ve been 11 so far in the last four months, have kept thousands of attendees abreast of the latest industry trends and opportunities. Ensuring safety in COVID-19 pandemic period “We know we have a vital role to play in connecting and supporting the industry, and the Intersec webinars stimulate meaningful conversations, collaborations and success stories,” stated Robinson, adding “We will continue to run these and support our stakeholders in every way possible until we meet again personally, and safely, at Intersec 2022.” She further said, “One thing is absolutely certain, our community is resilient and will bounce back. It has been involved in many frontline situations throughout the course of this year and it will continue to play a critical role in the months ahead. Throughout 2021 and come January 2022, we’ll have much to share and learn from each other.” Intersec 2020 Intersec in 2020 featured 1,100 exhibitors from 56 countries, while attracting 33,872 visitors from 135 countries. The global industry event is supported by Dubai Civil Defense, Dubai Police, the Security Industry Regulatory Agency (SIRA), Dubai Police Academy and Dubai Municipality.
A total of £1.6 billion worth of goods are reported as ‘lost’ to in-store theft in supermarkets each year, with figures increasing steadily. The presence of self-checkout systems have increased in supermarkets, as well as other industry retailers. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016. While this increase comes with such benefits as reduced wait times for customers and staff costs, it also comes with a risk of retail theft at self-checkouts. With the circumstances the world now finds itself in i.e. mass unemployment, financial uncertainty, the retail industry has seen an influx in these types of petty crimes, hitting retailers during an already turbulent period. While retailers are taking precautions to protect themselves and their patrons in this new era of in-person shopping, it’s important to ensure the business itself is protected. A popular method to combat these fears is to employ on-site security personnel, however, as we continue to adapt to new operating guidelines, retailers must begin thinking past the immediate future, and begin implementing long-term security solutions to prepare for life after lockdown such as strong CCTV systems with remote access. How has the security industry adapted its services to a post-lockdown world? Technological innovations like thermal recognition are key to adapting security systems for a post-lockdown world. Businesses which previously relied on facial recognition now must update their methods to account for shoppers wearing masks on-site and in-store. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016 Biometric systems are now able to identify people with face masks, and thermal recognition such ADT’s Thermi-Scan system which can track human body temperature without the need for contact. Implementing these safe protocol procedures protect both employees and customers against virus outbreaks such as COVID-19. The need for these advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027. Artificial intelligence has been hailed recently as the way forward for remote security needs, and while business-owners continue to navigate procedures of returning to work post-lockdown, having remote access to real-time security monitoring is essential now more than ever. What are the main measures stores can take to prevent or reduce theft? Strategically placing a multi-camera surveillance system to ensure clarity, eliminate blind spots, and deter thieves should be top priority. It’s equally essential to invest in a system which has an efficient playback program, particularly in situations where reviewing important footage efficiently can offer vital information to the police force. Advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027 As business-owners continue operating at reduced hours and with limited on-site staff, being able to access camera footage quickly and remotely is a key factor to consider. Whether owners opt to receive an alert on a mobile device allowing them to review notifications, or if their system is monitored by a remote security center, it’s important to be able to access footage quickly for added efficiency and ease. Facial recognition and AI have been popular points of discussion in relation to security cameras and CCTV. While careful considerations must be taken prior to utilising any sort of facial recognition technology, including conducting a Privacy Impact Assessment, the benefits include being provided with real-time tracking of repeat offenders which immensely helps the prevention of in-store theft. Here are some key points to consider when choosing in-store surveillance: Assess your needs – To get the best out of your security system, it is essential to analyze what your requirements are for your business as they might have changed to adapt to a post-lockdown world Camera setup – With store layouts shifting to accommodate social distancing guidelines, it’s important to re-evaluate the current set-up of any security cameras. Depending on any layout updates, it might be important to consider operating multiple cameras in one area to ensure a peripheral view and eliminate any blind spots Camera positioning – For optimal performance, check that light sources are not obstructing your view such as glare from the sun. It is also worth considering the height at which cameras are installed to maximize surveillance Check the focus – It is worth testing camera lenses bi-monthly to ensure that lighting or weather hasn’t affected the focus of the lens, resulting in a blurry visual Remote access – As guidelines continue to evolve, ensure you’re able to access any necessary camera footage quickly and safely in case of emergency Will we begin to see a reduction of theft as new technology is implemented? We’re beginning to see incidents of shoplifting and theft being taken more seriously by law enforcement. In the coming months, for the first time in Britain nearly twenty shoplifters who were either caught red-handed or identified on CCTV will be appearing before magistrates. While currently these court cases are being pursued by a private police force, these actions come after a Government plea to high-level police to prosecute shoplifters stealing under £200. Retailers have long voiced concerns that forces have abandoned low-level thefts and these steps are small but show that businesses are being heard. As innovations in surveillance security continue, we’ll be seeing a move away from human involvement which will create a more reliable and efficient system able to rely on machine learning and analytics. While there have been wider strides made in utilising AI for surveillance, these are largely being used currently by local governments to alert police forces to threats of criminal activity. It’s not unreasonable to think that in the near future, these types of smart technology will be employed by private businesses to analyze suspicious behavior or possible theft. However, as we see an increase in the advancement of security technology, we anticipate that those inclined to commit in-store theft will adapt their methods, therefore retailers should look to regularly evaluate their security needs to keep risks at bay.
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working. The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way. Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.
Modern working life has changed dramatically in the last decade. Driven by the growth of a millennial workforce, working behaviours and communications are more agile, digital and mobile than ever before. Remote working has risen 140% since 2005, a figure that will undoubtedly continue to rise in light of the pandemic. And its benefits are well studied: people are more productive, more motivated, and report a better work-life balance. The traditional office space and the digital collaborative working platforms we access both inside and outside of “work” have changed. In turn, there is a requirement for increasingly sophisticated access control and security products and systems. Today, and in the future, biometrics can play a crucial role in empowering workplaces both physically and digitally. Biometrics: accessing the right area Physical access and alarm systems are the first, and perhaps the most obvious area, biometrics is securing workplace access control – whether it’s to access office buildings, manufacturing floors, or even private rooms and safes. The humble key is easily lost and stolen, yet still represents 80% of door lock security The humble key is easily lost and stolen, yet still represents 80% of door lock security. And while digital solutions are gaining traction, PIN entry not only offers a poor UX, but requires close management, given its vulnerability to loss and misuse. Access fobs and badges pose similar challenges. Say, for example, an employee loses his badge to a restricted lab or highly confidential development centre on his commute - the security of the building is instantly compromised. By adding biometric authentication to cards or fobs, employers need no longer worry about them falling into the wrong hands. Without the correct user to authenticate, access to buildings, business operations and company files remain secure without needing to update any management systems. Moreover, by using this personal ‘on-device’ approach, employees no longer need to worry about the hygiene of shared sensors or PIN pads. Meanwhile, businesses can also avoid the technical and legal challenges of needing to manage a biometric database. A win-win. Touchless access Touch-free biometric solutions are another compelling way biometrics can not only improve security, but the user-experience and personalisation of security systems. Today, many touchless authentication solutions are combining the strong security of iris authentication with facial recognition to offer a compelling balance of security and convenience. This combination also means a reduction in false rejection due to physical changes, as it continues to authenticate even when wearing sunglasses, face masks or in bright sunlight, for example. Touchless solutions can bring benefits to numerous use cases and settings. Firstly, they can be utilized for mobile credential authentication on personal devices for seamless access to company servers, apps, or VPNs. It can also be implemented in traditional physical settings, offering the capability to alter access rights for personnel too. An R&D lab or healthcare setting is a good example here where restricted access to areas is in high demand, but would also benefit from a hands-free, seamless entry. OK computer Computers and laptops sit at the heart of the modern-day business set-up – whether at home, in the office, or on the move. In parallel, the evolution of modern working behavior changes has seen the number of applications, cloud-based services and shared VPN drives used reach an all-time high. While the benefits are numerous, the extensive PIN and password management that accompanies this is problematic. 6 out of 10 users felt they had too many passwords For users, they are a source of frustration and anxiety – our research found 6 out of 10 felt they had too many passwords, and worried about forgetting them. In turn, many are all too familiar with the laborious process of setting a complex password, forgetting it, and needing to reset again after several failed attempts. While complex password requirements (such as requiring capitals, numbers, and special characters) mitigate risk in theory, in practice they create a major point of friction in the user experience and require significant management. From a business perspective, security and cost concerns are even greater. Microsoft reportedly spends around $12 million a month on forgotten passwords. Worryingly, workplace security breaches are increasing too, with 54% of IT professionals reporting an increase in phishing attacks according to a recent Mimecast report. Here, the end-user is usually the weakest link due to easily guessed passwords, complacency, and the use of the same password across multiple apps and accounts. Biometric authentication via unique personal devices such as USB dongles, or by utilizing on-device authentication on a smartphone offers simple and frictionless way to increase security for the enterprise, free up IT teams and offer a better user experience to employees. FIDO-certified solutions are just one compelling solution supporting this. Plus, biometrics can also be used to authorize selected employees to access restricted areas of an organization’s network, protecting confidentiality. Meanwhile, with 80% of smartphones now featuring some form of biometrics, utilising biometric authentication for smartphone applications in the workplace can also be done at a relatively low-cost investment. Getting personal With more flexible working in place, many workplaces now operate a ‘hot desk’ system or share devices such as printers between colleagues. This is another instance where biometrics can be used to simplify access to personalized settings or employee accounts. In the future, this could even be integrated into wider office use cases, such as personalizing the air conditioning preference in meeting rooms or unlocking your personal settings on the coffee machine with a simple touch or gesture. More with multimodality Multimodality layers more than one type of biometric authentication to increase security and improve functionality and ease of use. For example, combining fingerprint with facial or iris to verify someone’s rights to access a secure manufacturing floor. While spoofing a fingerprint is challenging enough, spoofing a fingerprint and iris at the same time is near impossible. What’s more, by combining more than one modality, access control product manufacturers can reduce the false rejection rate (FRR) to deliver even smoother experiences. Secure, seamless authentication For enterprises, adding biometrics needn’t be a full ‘rip and replace’ solution. In fact, it can be added as a complement to existing solutions for added security without creating additional user friction. A biometric card or key fob can replace existing contactless access cards without big investments, or a biometric USB dongle can be added to email or VPN login to significantly enhance security, without infringing ease of use. A biometric card or key fob can replace existing contactless access cards without big investments To meet this demand, our access control service and solution partners are integrating biometrics for a wide range of physical and logical use cases. It’ll be unsurprising that locks and alarms are top of the list, but with the rise of widespread remote working over the last 10 years and the fight against PINs and passwords being led by organizations like FIDO, logical access for VPNs and work and time attendance, for example, are coming to the fore. Overall, biometrics can not only play a role in securing the modern workplace (wherever that may be), but can also give time and money back to IT and security teams. Most importantly, it can be a tool to empower workforces, driving efficiency and productivity through improved convenience and greater flexibility over how, when and where they work.
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of the policy changes and extra controls? For answers to these and other salient questions, we called on Ian Lowe, Product Marketing Director of HID SAFE Identity and Access Management (IAM) solutions. “There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time,” says Lowe. “Over the past several weeks, we have been working with customers to enable a safe return to the workplace. We have observed that the number of challenges in the mid-to-long-term level and the associated complexity vary by location.” Lowe shares some of the proactive measures and best practices that can assist in a safe return to the workplace as we settle into a “new normal”. Challenge 1: Ensuring building readiness After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though employees may be eager to return, the workplace itself may not be ready. Companies may want to consider continuing remote work while facility operations are prepped. Challenge 2: workforce management There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time While it is dependent on location and industry, taking a phased approach is the best course of action when allowing employees, contractors and visitors back into facilities. First, facilities management will want to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office. Next, it’s important to consider that office density needs are interrelated to the facility architecture. It is possible to accommodate a higher capacity of workforce in an airy, open office space than in a constrained one. A good rule of thumb is to start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns. Welcoming visitors or customers into the office should be delayed as long as possible. If that’s not feasible, visitor numbers should be factored into the total density count. A cloud-based visitor management system can help with implementation. Challenge 3: Controlling access The ability to vet staff, employees, contractors and visitors before and during the return will vary greatly depending on the location. Policies should be implemented that require employees to be screened regularly — and for an extended amount of time. Look to answer the following questions: Where have you visited in the days since last entering the workplace? Have you come into contact with anyone else who has recently visited high-risk areas? Have you shown any symptoms of infection in the past xx number of days? Policies should be implemented that require employees to be screened regularly — and for an extended amount of time If there is cause for concern, refuse the visitor and/or supplement the screening process with additional steps. Temperature checking is mandatory in many organizations— often multiple times a day. This applies to interactions at delivery bays, too. A policy-based physical identity and access management solution integrated with existing physical access controls makes it possible to enforce, monitor and report this type of activity. Challenge 4: Social distancing and contact tracing plan Social distancing may continue within the office, which will impact restrictions and guidelines related to access control. The office layout may be reworked for proper distance between cubicles, workplace positions and employees. Specific entrances, exits and pathways may be designated as one-way-only. Assigning Bluetooth LE beacons to employees once they are inside the workplace will allow companies to monitor proximity to others and measure localised density in real-time by using location services, contact tracing, and surge response technologies. Challenge 5: Reduced physical touchpoints Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces Reducing the number of physical touchpoints is desirable throughout a workplace. Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces such as faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. There have been more requests for a contactless experience to secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access. Challenge 6: Communicating for confidence Proactive communication is key to provide reassurance that appropriate safety measures have been taken and that both visitors and employees are aware of the policy changes and extra controls. Equally important is to communicate a policy change – and the reasoning behind it – before it happens. While there may not be an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organization is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Center helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Center, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organization to support customers by optimizing spend, mitigating risk and enhancing their security programs. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritize technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Center are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organization’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Center near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
St. James Hospital in Dublin, Ireland, which has more than 1,000 beds, is a teaching hospital that specializes in not only treatment but health promotion and preventative services at its central location. It is also a central location for the treatment of COVID-19 patients. Tasked with keeping patients and staff safe from the threat posed by the COVID-19 pandemic, St. James Hospital needed a way to add additional screening capabilities to its facility alongside its existing access control terminals. The technology needed to bring a multi-layered approach to screening individuals entering the hospital facility who could potentially introduce a significant amount of risk to those within the facility. Access control solution integrated St. James Hospital chose the Vanderbilt ACTpro access control solution integrated with the ZKTeco Proface-X-TD Facial Recognition Terminal to address its challenges. The ACTpro solution specifically used the ACT1500 Single Door IP Controller and ACT1030 MiFare Card Reader alongside the ZKTeco system. The Proface-X-TD solution uses intelligent engineering facial recognition algorithms and the latest computer vision technology. It supports both facial and palm verification for a fully touchless experience. Coupled with the Proface-X-TD solution, ACTpro can not only grant and restrict access based on biometric functionality, but can detect mask-wearing and high temperatures as a means to grant or restrict access to the facility. As a result, better hygiene is achieved with touchless biometric authentication, skin temperature detection, and masked individual identification. Anti-spoofing algorithm If a member of the staff presents to the door with high skin temperature, that individual is routed to another location, and the door will not open to identify potential infection. The Proface-X-TD solution is also equipped with an anti-spoofing algorithm for facial recognition against almost all types of fake photos and videos. The solution is ideally suited to hospitals like St. James because of their ability to be layered as part of a comprehensive approach to screening individuals considered at-risk for infection as a means to protect patients and other staff members. Elevated temperatures detections The touchless nature of the terminals brings safety and hygiene issues to the forefront, cutting down on possible exposure to infectious disease. The device detects people with elevated temperatures who can then be further scrutinised to add extra screening processes and identify potential disease exposure. This ability, along with the visitor check-in and tracking processes integrated with the ACTpro access control system, is a critical component in today’s modern healthcare facilities to provide real-time data for security officials.
Václav Havel Airport Prague (PRG), with its prime location in the Center of Europe, is the largest and most important international airport in the Czech Republic. Prague Airport handled 17.8 million passengers in 2019 and received the Airport Service Quality Award 2019 awarded by ACI1 for the second time in a row. At Prague Airport, there are different types of areas restricted to authorized personnel. These are governed by an access control system fitted with approximately 1,000 readers and over 1,500 secured points (doors, locks, etc.). Mifare Desfire cards are predominantly in use for the time being. Among these, Security Restricted Areas (SRAs) are the highest security areas, with 60 access points of high importance. Contactless biometric technology Due to the critical nature of those areas, Prague Airport needed a very high level of security, and decided to implement a biometric solution, as the card itself (including with the use of a PIN code), would not be deemed as secure enough. The biometric system had to be able to cope with over 20,000 individuals, with the capability to increase to up to 30,000 users in the future. Prague Airport decided to keep the existing access cards but to add a biometric verification level for the SRAs. This means that the biometric solution would have to be used in combination with the existing cards through a two-step process. In order to avoid any physical contact with the devices, for user convenience as well as for hygienic considerations, it was decided to deploy a contactless biometric technology. Access control system The readers were installed at existing control points and are fully integrated into the airport access control system Prague Airport tested two technologies capable of connecting to its access control system, among which IDEMIA’s MorphoWave Compact contactless fingerprint terminal. After a thorough testing period, the choice was to go for IDEMIA’s technology for a number of reasons including: great user experience with an easy and quick hand gesture, as well as a strict GDPR compliance with users’ biometric information stored only in their cards. Prague Airport deployed more than 60 MorphoWave Compact in its SRAs. The readers were installed at existing control points and are fully integrated into the airport access control system. More than 20,000 users now have their biometric data in their access cards and the system is fully operational. Embedded card reader IDEMIA’s seamless biometric technology helps address health and safety issues. Employees appreciate the user experience provided by the solution deployed: it is easy to tap the access card onto the embedded card reader situated at the top of the reader and then to just wave the hand in a quick simple movement to get 4 fingerprint verified in less than 1 second, without the need to touch any part of the device. Airports is a key vertical among the many different ones served by IDEMIA. The biometric devices are used by 35+ of them throughout the world for staff access control, as here in Prague. The company’s biometric solutions are also used for border control and passenger flow facilitation, in more than 30 different airports.
Beginning September 1, 2020, six Vision-Box Automated Border Control (ABC) eGates will greet arriving travelers enrolled in the NEXUS Program at Winnipeg International Airport. As the only international airport in the Province of Manitoba, Winnipeg is an important travel hub for the region, having served close to 5 million aviation passengers in 2019. NEXUS program NEXUS is a trusted traveler program operated by Canada Border Services Agency (CBSA) that expedites border crossings for pre-approved and enrolled Canadian, American, and Mexican citizens. Travelers enrolled in the NEXUS program avoid border entry lines by using specially reserved lanes equipped with identity screening platforms for expedited checks when entering the country from anywhere in the world. Automated Border Control (ABC) eGates ABC eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers The Automated Border Control (ABC) eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers from all international locations using safe and secure automated biometric facial matching. “Finding better ways to serve the needs of travellers is paramount for Winnipeg Airports Authority,” said Barry Rempel, WAA President and Chief Executive Officer (CEO), adding “Adding Vison Box eGates for NEXUS users at Winnipeg Richardson International Airport not only enhances the customer experience but sets the foundation for future innovation and brings us one step closer to seamless, touchless passenger travel.” NEXUS touchless solution This is the first time that ABC Biometric eGates are being deployed to process NEXUS enrolled Travelers, instead of the regularly used NEXUS kiosks. It is also the first NEXUS touchless solution that will improve the border clearance process and give NEXUS travelers a unique convenience at the airport. The deployed GT-11 eGates are part of Vision-Box’s newest generation digital identity systems and will use the latest advances in biometric technology to securely and efficiently clear travellers using digital facial matching. The GT-11 eGates offer a smaller footprint than the previous NEXUS kiosks and are part of a modernizing process for a seamless travel journey from curb to boarding at Winnipeg International Airport. Remote installation of border digital identity software This may also be the first time that a complete remote installation of border digital identity software has been successfully attempted and completed. Because of the COVID-19 pandemic that quickly spread across the globe, work at Winnipeg International Airport had to be stopped in February 2020, with only the physical installation of the eGates completed. Software and systems setup The ability to go live with a remote orchestrated installation is a major accomplishment" Logical setup of the software and system testing, prior to going live was then completed entirely from Vision-Box Lisbon headquarters, in close collaboration with Canada Border Services Agency (CBSA), using a dedicated secure connection. By remotely installing a border processing system, Vision-Box proved the feasibility and security of a remote installation process that could lead to far-reaching industry changes and cost-saving measures. “The ability to go live with a remote orchestrated installation is a major accomplishment,” said Miguel Leitmann, Vision-Box’s Chief Executive Officer (CEO), adding “Our team, along with CBSA and members of the Winnipeg Airport Authority worked tirelessly across time zones, with frequent and intense communication, to make this happen. I couldn’t be prouder of this accomplishment and I congratulate all the agencies and people involved in making this project a reality.” Orchestra Digital Identity Management Platform Vision-Box’s Orchestra Digital Identity Management Platform will manage the Nexus border clearance and crossing process. Orchestra manages in real-time the necessary parameters of traveler identification at the crossing point. After the traveler scans their NEXUS member card, a photo is taken of the traveler’s face and a secure identification match is made against the biometric facial information in the traveler’s NEXUS membership profile. This system gives CBSA and Winnipeg International Airport added flexibility with faster dedicated lanes that simplifies the airport border clearance process along the way.
Iris ID, a provider of iris recognition technology, announced its contactless IrisAccess® biometric technology is being used for employee time and attendance at hotels in Iraq which are part of Millennium & Copthorne Hotels, a London-based hotel company that manages and operates 135 luxury hotels in 80 locations worldwide. The Millennium hotels – the Millennium Kurdistan, the Copthorne Hotel Baranan and Millennium Kurdistan Hotel and Spa – are located in the Sulaymaniyah province in the country’s Kurdistan region. Biometric readers The process takes a second to complete and is highly intuitive, requiring virtually no employee training to use" Mohammed Murad, vice president, global sales and business development, Iris ID, said iCAM 7S series biometric readers provide a quick and accurate way to record the time employees work each day. “The process takes a second to complete and is highly intuitive, requiring virtually no employee training to use,” he said. “The iCAM 7S platform automatically tilts to locate a person’s face and iris patterns. Also, it’s important in the COVID-19 era, that the technology is contactless and not impacted by employees wearing personal protective equipment such as gloves, masks and goggles.” Integrate with the payroll management system The iCAM 7S time and attendance units integrate with the hotels’ payroll management system to ensure accurate reporting of hours worked without any manual processes. Iris ID’s highly accurate identity verification technology eliminates a costly payroll fraud scheme known as buddy punching – when one employee signs in or out for another. InfoMet Technologies, an Istanbul, Turkey-based integrator of security and building management systems, installed the Iris ID system in the three Iraqi hotels.
Family-owned and run company, Bijou Wedding Venues, that offers exclusive wedding venues coupled with exceptional food and service, is improving its safety in response to the COVID-19 pandemic by implementing a state-of-the-art body temperature monitoring solution from ANT Telecom to reduce the risk of virus transmission. With restrictions lifting to enable larger groups of people to meet, weddings can begin to take place with greater numbers of guests. Bijou therefore wanted a solution that could enable special days to go ahead with confidence and reached out to ANT Telecom to implement its thermal imaging cameras at wedding venue entrances to ensure a significant reduction in risk to guests. Temperature monitoring cameras With Bijou operating across a range of venues, the cameras will be used to scan guests discreetly as they enter the venues to ensure minimum disruption to the day, and allow full focus to be on the couple’s celebration with families and friends. It comes as part of a range of other initiatives the company is implementing, such as changes to seating arrangements to ensure ample distancing; provision of outdoor ceremonies where possible; new methods of serving food and drink; as well as many other adaptations to minimize risk. ANT Telecom’s temperature monitoring cameras can be set up very quickly and are easy to use. The camera can detect multiple people at the same time, so is perfectly suited to scan wedding guests entering the venue. Protect guests and staff Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption" Sam Cutmore-Scott, Managing Director, Bijou Wedding Venues, comments: “We’ve made a range of changes in light of the pandemic to ensure that weddings can continue as planned and we’re pleased to offer couples this extra layer of safety alongside other measures. The temperature monitoring cameras allow us to protect all of our guests and staff right from the entrance of the venue. This is one of our key initiatives, and on top of this our exclusive venue model means venues can be completely sanitized between events and essentially acts as a private home for the couple, unlike hotel venues which have other people and staff entering and leaving the site.” Discreet notifications Upon camera detection of a temperature above the guidelines, that guest can be discreetly notified by a nominated person on behalf of the couple and alternative arrangements made, for instance inviting them to watch live streamed footage of the ceremony. Klaus Allion, Managing Director, ANT Telecom, states: “We’re delighted to support Bijou in enabling couples’ memorable days to continue and take place as close to as expected as possible. Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption and peace of mind for both the couple and guests at the venue, as well as staff. It’s an essential component of hospitality and event management and will help many types of gatherings similar to this take place safely as the fallout from the pandemic continues.”
Round table discussion
A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?
The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue to play a big role. We asked this week’s Expert Panel Roundtable: Which technologies have the greatest potential to disrupt the security industry in the second half of 2020?
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?