Biometric time and attendance
Iris ID, a global provider of iris recognition technology, announced its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639, the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and other many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique I...
Evolis, global provider of personalization systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business developm...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
Having returned from Security Essen, Traka’s International Sales Director, Martin Woodhouse, reflects on the show and why it was so important to attend for the industry leader in innovative key and equipment management systems. Q: How was the show? Martin Woodhouse: Security Essen was great in allowing us as a global brand, and part of the ASSA ABLOY Group, to demonstrate how we are listening to our customers (new and existing) and responding with latest advances in intelligent solutio...
Plasco ID, global integrator of identification solutions, announces it has hired Jeff Bill as its Chief Operating Officer. Bringing a valuable combination of industry experience and proven results, he will focus on business operations and strategic initiatives. Physical Card Access Control A veteran in visual and physical card access control, Jeff formerly held the position of President at Bristol ID, global technology card business; prior, he served as General Manager for Brady’s Peopl...
Matrix Comsec, a pioneer of technologically advanced security and communications solutions, is preparing to spread its footprints in the Canadian market. Security And Communication Solutions Matrix is renowned enterprise and each of their solutions are designed and manufactured in the company’s exclusive DSIR (Department of Scientific and Industrial Research) certified Research and Development Center. More than 40% of the company’s manpower is dedicated to the development of c...
Reading-based IT security company, VoiceVault Ltd. specializing in voice biometrics has entered administration after experiencing future funding issues. Its business and assets are now up for sale. Voice Biometrics Specialist Firm VoiceAuth - Complete Voice Biometric SaaS platform supporting both cloud and on-premise deployment Voicevault Limited entered administration on 8 October 2018, with Andrew Stephen McGill & Gilbert John Lemon of Smith & Williamson appointed joint administrators. The company has developed and operates a full suite of IT security products to include: VoiceAuth - Complete Voice Biometric SaaS platform supporting both cloud and on-premise deployment; VoiceSign – Custom IVR-based e-signature product designed for healthcare / insurance applications; VIM – Identity management system consisting of voice authorized password reset, out-of-bound authorization and time & attendance tracking; and ViGo – Mobile authentication system supporting iOS and Android The company has a portfolio of ongoing service contracts and worldwide patents and trademarks. Fulfilling Growth Aspirations Andrew McGill said, "The company has been historically funded by significant equity investment and now requires further working capital to move to the next stage of its development and fulfill its growth aspirations. Existing shareholders were unwilling to provide the future funding required without additional third-party investment, which was not forthcoming, and the director has taken steps to place the company into administration to protect the underlying business. We have retained the small team of three employees to maintain the platform and allow the business to continue operating while we seek interested parties to acquire the business and assets of the company.” He adds, "We have already identified a list of potential interested parties in the sector and we are directly approaching possible buyers, advertising on a business sale platform plus using word-of-mouth marketing through our contacts in the technology sector."
Security Essen 2018 presented itself as the international source of inspiration for the industry. 950 exhibitors from 43 countries showed their innovations for increased safety and convenience to over 36,000 trade visitors from 125 nations at Messe Essen on topics ranging from cyber security to innovations for building security and new solutions for the protection of valuables. The representatives of the companies, associations and institutions were in great demand as discussion partners. There was strong need for information and investment from trade visitors as a result of current events such as hacker attacks, challenges involving access control at airports, the still-high number of break-ins and increasing legal requirements. The exhibitors praised the significantly increased percentage of international visitors (eight percent up) and the strong decision-making authority of the trade visitors. Trend-Setting Solutions Security Essen attracted more than 36,000 professional visitors – including experts from industry and installers "Security Essen has underlined its position as a trend-setting international trade fair for all aspects of security. We were able to welcome significantly more visitors from abroad – 125 nations, that's an impressive number", says Oliver P. Kuhrt, CEO of Messe Essen. “Protection – whether public or private, digital or analog – is the central theme of our time. Our exhibitors provided answers to these challenges and presented trend-setting solutions. The high number of first-time exhibitors who showed their services to the specialist world indicates the importance of our trade fair as an independent platform for the security industry." There were more than 200 new exhibitors, including Hoppe AG, PwC Cyber Security Services and AEG ID. The trade fair attracted more than 36,000 professional visitors – predominantly including experts from industry, installers and participants from the security sector – who were characterized by greater internationality, a significant interest in new products and new business contacts as well as a strong willingness to invest. There were more than 200 new exhibitors, including Hoppe AG, PwC Cyber Security Services and AEG ID Numerous New Products Around 40 percent of the visitors came from abroad (2016: 32). The 76 percent of visitors were decision-makers within their companies and one quarter prepared their investments at the trade fair or concluded contracts directly. After all, the economy is still excellent. Industry sales in Germany alone are estimated at around 17.2 billion euros – a two-year increase of 18 percent. 62 percent of visitors rated the economic situation in the security sector as good to very good. Over 90 percent were satisfied with their visit to the fair and want to recommend Security Essen to others. The relevance of Security Essen as a pulse monitor for the security industry was particularly evident in the numerous new products. Once again, the influence of digitization became clear: access solutions are becoming smarter and rely on smartphones or biometric identification as keys. Evaluate Video Data Faster Protection of data and networked access was an all-encompassing topic for numerous exhibitors and many lectures Artificial intelligence helps to evaluate video data faster and more accurately. Apps display unsecured windows in the smart home or help keep track of valuable contents of safes. The protection of data and networked access was an all-encompassing topic for numerous exhibitors and many lectures. The winners of the Security Innovation Award attracted a great deal of attention. Seven exhibitors were honored with this award for their pioneering innovations. UrbanAlps convinced the jury with Stealth Key, a forgery-proof key from the 3D printer. The Jansen Tore burglar-proof sectional door with WK5 classification, which also received a prize, is especially secure – suitable, for example, for museums, hazardous material stores or military headquarters. Kötter Security received one of the coveted awards for the new emergency call and service control center, in which high-tech infrastructure and digital processes ensure the best possible customer security. New Service Facilities Security Essen was held for the first time in the modernized halls of Messe Essen, which will set new standards once the final construction phase is completed in 2019. Spacious, single-storey halls, plenty of daylight, the new glass entrance area and new service facilities such as the Business Club have already delighted exhibitors and visitors. Security Essen also provided optimal visitor and exhibitor communication with a new hall structure organized according to exhibition areas. The guests of Security Essen praised the division of the fair into key topics. The exhibition hall for Cyber Security and Economic Security celebrated a successful premiere. Exhibitors such as the Federal Office for Information Security, Telekom Security, Advancis Software & Services GmbH and the newly founded Federal Association for Critical Infrastructure Protection (BSKI) presented here. Numerous campaigns and events relating to the actual trade fair events offered visitors genuine added value Thematically Suitable Exhibitors Numerous campaigns and events relating to the actual trade fair events offered visitors genuine added value. Thus on the ‘Day of training and further education’, which was organized by the Federal Association of the Security Industry (BDSW) and Messe Essen, 300 participants of the security industry were provided with information on training possibilities and career opportunities. At the new Cyber Security Conference, Arne Schönbohm, President of the Federal Office for Information Security, spoke about cyber security as a challenge for politics, business and society. The computer scientist Jan Krissler, known as Starbug, was also a guest at the top-class conference. Gregor Gysi, member of the Bundestag of the German party ‘Die Linke’, discussed the economic importance of cash at the BMWL (Federal Association of Medium-Sized Value Logistics Companies) booth. In the security experts’ forum, practical experts designed a non-stop programme with more than 90 presentations. The guided tours were expressly aimed at architects, planners, installers, operators, authorities and employees of construction and planning departments and stopped at thematically suitable exhibitors. Topic Of DigitizationCooperation between Western Business Exhibitions and Messe Essen offers a comprehensive platform for business The organizers are already setting the course for the next Security Essen, which will take place at Messe Essen from 22 to 25 September 2020. The new thematic hall structure will be further expanded and the topic of digitization will be explored in greater depth. Numerous exhibitors have already confirmed their registration for the next event. 88 percent of the visitors have already stated their intention to participate in Security Essen 2020. The fair is also taking a further step towards internationalization: From 9 to 11 April 2019 ‘The Security Event - powered by Security Essen’ will take place for the first time in Birmingham, Great Britain. This cooperation between the British trade fair organizer Western Business Exhibitions and Messe Essen offers the European security industry a comprehensive platform for business in Great Britain. Over one hundred of the world's leading security brands are exhibiting. Excellent Platform 950 exhibitors from 43 nations presented innovations in the field of civil security at Messe Essen. The projection for the last day of the fair estimated 36,000 visitors from 125 nations including conference participants, VIP guests, delegation participants and journalists (including FKM projection of 33.000). The proportion of professional visitors was 99 percent. The hall distribution was particularly great success this year Andreas Straubinger, Region Manager D/A/CH, Vanderbilt International GmbH said, “Our stand position in the new Hall 6 was a very good choice. Visitor footfall was above average and the results were even better than we saw at the last Security 2016 trade fair. We thought the hall distribution was a particularly great success this year. The number and quality of our D/A/CH trade fair contacts were very good; not only this but we were delighted to see how many trade fair visitors attended from around the world, which was a great fit for Vanderbilt’s global orientation. The trade fair contributed to further developing the level of awareness of the Vanderbilt brand. We consider Security to be the leading trade fair for our industry. It is an excellent platform from which to present our solutions to a broad audience.” Extremely Well Informed Security Essen set up its own exhibition hall for cyber security this year for the first time, to us it was a logical step to come and present our products" Bernd Hohlfeld, Management Board, ALVARA Cash Management Group AG commented, “For us, Security Essen has been our most successful trade fair to date. The high levels of demand for our ALVARA Logistic App and ‘Digital Driver Legitimation’ were one reason, but not the only reason by any means. In particular, the BMWL joint stand brought together all of the stakeholders in cash services, offering an overall solution for efficient cash circulation. The joint stand was well placed not only to present the route to innovation but also to confirm it. The concept is very impressive and we will be back in 2020.” Knud Brandis, Managing Director of PwC Cyber Security Services GmbH said, “PwC Cyber Security Services GmbH is Germany’s leading consultancy firm for data security. As Security Essen set up its own exhibition hall for cyber security this year for the first time, to us it was a logical step to come and present our products and services here. The topics which were in particularly high demand were information security, data protection, emergency services and cyber security. The trade visitors were extremely well informed and precisely our target audience.” Invaluable Validation Stamp Sebastian Mosbacher, Managing Director, Stölting Service Group commented, “Stölting Security was extremely satisfied with Security Essen 2018 in Essen. As a large security services provider operating in Germany, we were able to present our services and position ourselves in the best possible manner. The second day saw high footfall and was of great significance for us as a trans-regional personnel service provider operating in the sector of cleaning, security and staffing. Stölting Service Group will be back in 2020!” Dr. Alejandro Ojeda, CEO and Founder of UrbanAlps AG said, “Security Essen was beyond our wildest expectations; it has been one of our best platforms to get in direct contact with our target audience at an international level. Furthermore, winning the Security Innovation Award 2018 for our core product the Stealth Key, the worlds’ first 3D metal printed key, has been an invaluable validation stamp from arguably the world’s leading security fair. It is clearly the place to be for security and we eagerly look forward to come back once again in 2020.” Topics discussed at Security Essen were information security, data protection, emergency services and cyber security Convenient Contactless Handles Rainer Schratz, Marketing Manager, HOPPE AG, Stadtallendorf commented, “HOPPE presented at Security Essen for the first time this year – and so far, we are extremely satisfied with the results of the trade fair. Security Essen is a good platform for HOPPE innovations and expertise in the field of protection and amenities; this is also clear from the high number of contacts we made at the trade fair – both with customers as well as visitors who came from segments which are new to us, for example from the electrical wholesale trade.” “Of course, the quality of the new contacts can only be evaluated after the trade fair but we are delighted with the high level of interest shown by visitors in our products – both from trade visitors and from the media. Visitors were particularly appreciative of our innovations such as the burglar-proof window handles SecuForte with automatic locking function and convenient contactless front door handles or the wireless window handle offering central locking.” Diverse Possibilities Offered Current aspects such as ‘Security technology in the smart home’ and ‘Digitisation and cyber security’ were afforded a great deal of attention" Norbert Schaaf, Chairman of the Federal Association of Security Technology (BHE) and Chairman of the Advisory Board for Security Essen said, “Trade fair visitors from around the world were able to seek information about the diverse possibilities offered by modern security technology from around 950 exhibitors. The new layout, with six primary areas, also received very positive feedback. The profile of the Security trade fair offers the right background for the entire security industry.” “As a specialist trade fair, it specializes in security and therefore offers the ideal platform for providers and users to share information and views. Current aspects such as ‘Security technology in the smart home’ and ‘Digitisation and cyber security’ were afforded a great deal of attention. The innovative spirit of the security providers also became particularly clear at the presentation ceremony of the Security Innovation Awards 2018.” Secured Connectivity Platform Serge Coppens d'Eeckenbrugge, Regional Manager BNL - DACH, Managing Director DACH, UTC Fire & Security commented, “Smart buildings and smart homes were the focal point of this year’s Security Essen. Thanks to UltraSync, the new secured connectivity platform, integrated smart home or smart building security solutions can be managed using the internet. UTC Fire & Security presented their Lenel range, which offers various security technologies (video, access, fire and burglary), which are integrated into both the home and larger-scale environments in a user-friendly manner.” “The trade fair offered us the ideal platform to present our upcoming new product range of cable and wireless fire alarm systems. The feedback we received from both the domestic market and neighboring countries was outstanding. The relaxed stand design provided the perfect environment for intense yet enjoyable conversations. Security Essen was very successful for us and we are looking forward to taking part again.” The relaxed stand design provided the perfect environment for intense yet enjoyable conversations Digital Burglary Protection Dr. Florian Scharr, Press Spokesman, VdS Schadenverhütung GmbH said, “Our goals were surpassed at Security Essen. At times, our stand was besieged! The burglar protection was particularly important and the topic of digital burglary protection was in high demand, which was very pleasing. We are delighted that so many industry representatives as well as numerous installers and planners came to find out more about VdS. Security Essen is a very important trade fair for us.” For the first time, the three security associations -BDGW, BDSW and BDLS – presented themselves together at Security Essen" Dr. Harald Olschok, Managing Director, BDSW Bundesverband der Sicherheitswirtschaft commented, “Once again we can look back on a successful trade fair week. For the first time, the three security associations – Federal Association of German Money and Value Services (BDGW), Association of private security industry (BDSW) and Federal Association of Aviation Security Companies (BDLS) – presented themselves together at Security Essen.” Buy Something Specific “The expert visitors and interested guests were informed about the work of the security associations through various events and lectures in the trade fair forums. Alone on the ‘Day of training and further education’, which takes place in cooperation with Messe Essen, around 300 visitors again took part.” Friederike Nielsen, VP of Marketing, Dedrone GmbH said, “Two years ago, our subject area ‘protection from civil drones’ was still very new. Even then, we made a great deal of interesting contacts with German and international customers and partners at Security Essen. Since then, our market has seen a great deal of additional growth. A great deal of visitors has come to our stand with a specific intention – many of them have an intention to buy something specific. We are leaving the trade fair very satisfied and will definitely be back.”
Matrix Comsec is to participate in the NPPC (National Public Procurement Conclave) 2018 to be held in New Delhi from 30th to 31st October 2018. Matrix will be exhibiting their communication and security solutions along with other enterprise grade solutions. IP Solutions For Modern Enterprises From the Telecom domain, Matrix will be exhibiting the newly launched pure IP solutions for modern enterprises - PRASAR UCS and the smart video IP deskphone - SPARSH VP710 at the event. The company will also be exhibiting SARVAM UCS and Media Gateways. Solution experts for Matrix’s people mobility management solutions will be demonstrating the Aadhaar enabled biometric attendance system at the event. They will also be giving a brief on the well-engineered access control solutions to be displayed at the event. Company experts are to exhibit COSEC Panel Lite standalone access control solution, which is a site controller that implements advanced access control features and restricts unauthorized entry. Video Surveillance Solutions Matrix will also be discussing COSEC ARC - an I/O Controller which provides the flexibility to control and monitor a range of hardware devices that are integrated with the controller. Additionally, Matrix will be displaying the COSEC PATH series door controllers, which are fingerprint and RFID card-based devices. From the video surveillance domain, solution experts will be talking on the recently launched Extreme series of Network Video Recorders. These recorders are equipped with features like cascading, H.265 compression, 4K decoding, RAID 5, 10 support, high storage, and 512Mbps throughput. Matrix will also be exhibiting IP cameras that are furnished with Intelligent video analytics that enhance security of enterprises. Learn more about Matrix solutions by talking to company's solution experts at the NPPC (National Public Procurement Conclave) 2018 event, Stand No. 43-44 from 30th to 31st October 2018.
Matrix will be showcasing its latest trends and technologies from the security and telecom domain, including the new NVRX Series and PRASAR UCS for modern enterprises. The company will demonstrate Enterprise Telecom and Security solutions that cater to the needs of SMEs, SOHOs and large enterprises. Matrix, a premier manufacturer of telecom and security products will be hosting Matrix Insight on 26th July from 8:30 am onwards at the Marriott Hotel in Riyadh, Saudi Arabia. The company welcomes everyone in the telecom and security industry from new prospects, strategic partners to existing customers and suppliers. Matrix will showcase an enterprise grade time-attendance solution engineered with features such as Auto Push Events to Server, Automatic Fingerprint Distribution, Instant Notification, 200+ Customized Reports Generation, Scheduler Services including Backup, and more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone Access Control solution with License Free Environment, whereby a single panel can handle up to 255 doors and 25,000 users. The event will offer a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials option at Riyad Matrix will also be unveiling its latest communication solution, PRASAR UCS – Unified Communication Solution for Modern Enterprises Matrix video surveillance solutions Matrix will also be unveiling its latest communication solution, PRASAR UCS – Unified Communication Solution for Modern Enterprises that support up to 2,100 IP users from a single box at. A brief glimpse into the telecom portfolio will also be given to the audience. The Matrix video surveillance wing is going to sport a new range of IP cameras, incorporating SONY STARVIS series sensors with EXMOR technology. The Matrix video surveillance wing is going to exhibit its video management solution, SATATYA SAMAS which approaches threats in a logical sequential manner through its unique features like CREAM (Cognitive Responsive Engine with Automated Monitoring). We will also introduce the new range of smart Extreme Network Video Recorders - NVRx. "Events like Matrix Insight are important to us because they give us the chance to connect with our partners, SIs and prospects. We look forward to explore and spread our footprints in the territory through this product expo, showcasing our innovative solutions that can help accelerate business growth", said Ganesh Jivani, Managing Director.
Everyone can agree the convergence trend is in full force in the electronic security industry and organizations are pushing more and more for integrated solutions that can not only enhance ROI but also solve problems that have traditionally been out of the realm of electronic physical security systems. This leaves system integrators and other solution providers in a difficult position as they scramble to be competitive especially when faced with an industry dominated by a few power players. Tackling this problem can now be a matter of survival for small to medium players especially in regional markets. To address this need, Apollo Security Access Control has introduced the new ASP Series Controllers that promise to set a new standard in for secure, scalable and customizable solutions. For 30 years, Apollo has been known for producing some of the most robust hardware in the industry and with the ASP series a new layer of flexibility has been added by allowing ‘post-factory’ customization in addition to many other feature upgrades. This will have the effect to put more control in the hands of integrators and even end-users so they are not locked into hardware solutions that are ‘off the shelf’ and don’t provide any ability to adapt to customer specific needs for the present or the future. The flagship of Apollo’s new controller series, the ASP-4 is an intelligent access controller designed to provide a high performance security solution Intelligent Access Controller The flagship of Apollo’s new controller series, the ASP-4 is an intelligent access controller designed to provide a high performance security solution with the ability to solve non-standard problems. Natively, the ASP-4 can support four readers and four doors, but when clustered with 32 other ASP devices it can secure up to 128 doors in one management unit by utilizing inter-device communication across standard IT networks. Each ASP-4 can also support up to 16 additional readers by utilizing OSDP Secure Channel communications, supporting configurations such as 4 Doors with In/Out (8 Readers) or even more doors by adding input/output modules for door control. Enterprise capacity of 250,000+ cardholders, 300 access levels with up to 50 access levels per card is provided at each device, providing total cardholder and access rights database redundancy, preventing reduced functionality modes such as ‘facility code check only’. The ASP’s real power lies however with the ability to customize the functions of the controller by loading customized App Scripts and third-party protocols. Using industry standard ‘C-like’ programming language, the ASP can have new functions designed by the integrator. Running customizations at the hardware level instead of in software offers the benefits of drastically reduced time/cost of implementation as well as superior reliability. Whereas before if an organization wanted to integrate a new device such as an alarm panel, fire system or similar they would have to request software customization which can take months and cost tens of thousands of dollars, with the ASP such a task can take days or weeks and be completed with a budget of hundreds of dollars. An example of how effective this customization works was provided by a subsidiary of a large multi-national Corporate Access Control Solutions An example of how effective this customization works was provided by a subsidiary of a large multi-national that was struggling to comply with strict labor regulations. Under these rules, workers in their factory can only work six consecutive days, requiring the seventh day for rest. The HR department struggled to keep track of this as each employee’s rest day could be prior to when six days was expired; in addition to workers switching shifts and other complications the tracking was too difficult to be done manually, so an automated solution was necessary. The current access control solution the company was using didn’t provide any solution for this so the only possibility was expensive customization which would take 3-4 months and then provide no guarantee in the future what would happen if needs changed. With ASP-4, Apollo’s local partner was able to offer a much more rapid solution. The requirements were programmed into a logic script that was loaded to the controller. This script checks every cardholder at time of access for any violation of the rules and will deny access if necessary, then displaying a reason on an LCD display as well as flash an indicator light so that the cardholder will know it is not simply an access level error that has denied their entry. This customization took less than one man-day to program and was tested over the course of one week and was then ready to be deployed. The ability to do this customization gave the partner the edge needed to provide a timely, cost effective solution to a problem that could have cost the company greatly if a work-related accident resulted in legal action. In the future, the logic script can be easily changed for example if the company would like to move to a five-day work week in the future. Additional customization possibilities are possible using the serial connections of the ASP Real-time Monitoring Additional customization possibilities are possible using the serial connections of the ASP. This allows integration of input devices such as scales or barcode scanners, or interface to any device that has a serial interface such as displays, mimic panels, entry phone systems and more. Protocols for these devices can be embedded in scripts and the devices can assume alarm input/output functions or even new card reader types can be supported such as wireless locks or long-range RFID readers. In addition to being customizable, the ASP of course is designed with security in mind. With all communication channels being secured with 128-bit TLS encryption which prevents attempts to intercept or forge data. Security goes all the way down to the reader using OSDP Secure Channel to protect card reader data transmission lines. Being able to communicate simultaneously with up to five software hosts also gives the ASP ability to be monitored in real-time by redundant systems, ensuring that important alarms are always delivered in time for the security team to react. Software OEMs And System Integrators The ASP Series has been designed from the ground up to be friendly to Software OEMs and System Integrators using other systems in place of or in addition to Apollo Security’s software platform. A native Open Platform SDK allows tight integration with all the ASP’s standard features in addition to the customizations available through scripting and embedded software. The SDK comes with several integration pathways including .NET and Python and includes sample code, tutorials and online developer support. To better support Software OEM partners, Apollo Security’s parent company, ADME INC., has recently announced a new division, ApolloEM which will provide support for partners that utilize the ASP hardware platform in their own software solutions. William Lorber, Vice President of Sales and Marketing said, “Establishing a separate division to strengthen our role as an Access Hardware OEM became logical as more partners are coming on board to utilize our new product line. We are excited to see the solutions that our partners develop on this platform.” Lorber added that partners will be able to share and market their solutions on the upcoming App Script Library platform that Apollo will roll out later this year to expand the effectiveness of ASP solutions.
Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit, currently employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R100 cameras will now be made available with Mentalix Fed Submit live scan stations, operating alongside standard fingerprint scanners so iris information may be shared with the FBI as part of its NGI (Next Generation Identification) program. With Fed Submit it’s possible for agencies to access the FBI’s iris database, as well as create and grow their own local iris archive. Accurately Capture Iris Data Dale Remmers, the chief technology officer of Mentalix, said the Iris ID technology was selected for its speed and accuracy in capturing iris data. He reported that jail officials can often acquire, submit and receive an FBI response to an iris query before a suspect’s booking procedure is completed. “They can know within a few minutes if the suspect arrested for public intoxication has any felony warrants in other states,” Remmers said. “We’re excited to be able to offer our law enforcement customers the Iris ID technology as an additional modality within our Fed Submit product.” The iris solution is contactless, unlike fingerprint pads which need to be wiped clean after each use R100 Iris Recognition Technology The R100 iris recognition technology can obtain a valid identity scan from virtually any suspect. While fingerprints can be altered intentionally or worn down by jobs in industries such as agriculture, construction and manufacturing, iris patterns remain unchanged through a person’s life. The iris solution is also contactless, unlike fingerprint pads which need to be wiped clean after each use. Remmers said law enforcement clients may also use the iris scan feature of the Mentalix Fed Submit system to authenticate the identity of suspects being released from jail. Iris ID Authentication Mohammed Murad, vice president global sales and business development, Iris ID, said the Mentalix partnership is another example of how Iris ID’s technology is being used to assist law enforcement officials. “Our iCAM R100 cameras add a valuable dimension to the Fed Submit kiosks” he said. “The Mentalix solution will make it easier – and faster – for local officials to know who is being booked and released from their facilities.” Iris ID technology is also being used by governments around the world for authentication at border crossings, national ID and voter registration efforts and by corporations large and small for access control and time and attendance applications.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centers, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrollment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labor. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrollment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity Authentication In common access control systems, access is authorized either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organizations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customization of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of blinds, lighting and heating, and 4K video and audio distribution. But despite the market entry of some big names such as Google’s Nest, Apple’s HomeKit, and telecommunications giants AT&T and Deutsche Telekom, are we really on the threshold of a home automation revolution? Not quite, according to market intelligence firm Ovum. It says growth is still limited to certain niche segments – mainly the higher end of the market and early adopters of technology. Michael Philpott, Senior Practice Leader, Consumer Services at Ovum says one of the main drivers is basic product lifecycles – if you are having a new boiler and thermostat fitted, why not get the latest ‘smart’ version? “What the market has failed to do is convince the mass-market that smart technology provides enough benefit to stimulate a purchase outside of the normal cycle.” Security And Privacy There are other reasons for the measured growth in home automation. Key inhibitors to rapid growth include technology fragmentation, a lack of adequate security, products too complicated to use or install, a lack of consumer trust and concerns over reliability. “Many of the products on the market today have inadequate security and provide easy targets for hackers, not just to gain access to those devices, but the connected home in general,” says Philpott. “Privacy of data is the next [concern]. To maximize the potential of the smart home, consumers will be asked to share an increasing amount of data and personal information. Keeping control of who can access that data, however, will be essential in order to retain consumer trust.” In spite of these hurdles, Ovum sees the smart home market growing quite strongly, with worldwide revenues rising from $19 billion in 2016 to $76 billion by 2020. Breaking down that 2016 figure, connected home support accounts for around $3.6 billion, home automation is just $162 million, home security/monitoring is at $2.7 billion, and smart energy at $1.2 billion. Products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions So why are telecommunications companies such as AT&T and Deutsche Telekom active in the market, or at least preparing to be? “Telcos are looking for new revenue streams beyond broadband access,” says Philpott. “Operators believe that over time the smart home market will be significant and believe [that] as the owners of the networks, as well as having existing customer relations with millions of consumers, they are well positioned to play a part in the smart home.” Security Industry Role In terms of a service which can attract recurring revenue, the security industry can play a pivotal role in the smart home market. “Recurring revenues from home automation services are harder to develop outside of home security, where customers are already used to paying a monthly fee for a security monitoring service,” says Philpott. “There are other potential and interesting business models being explored, however, that could become significant over time. These include things like new home insurance models, appliance-as-a-service and household goods replenishment.” Does this mean the home automation market is about to take off? “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” he says. “This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” "Operators believe that over time the smart home market will be significant and believe [that] they are well positioned to play a part in the smart home" Surprisingly for what has historically been something of a grudge purchase, in the context of home automation security is seen as a solution some consumers are willing to pay for. “There is a lot of interest around home security as it is something that a certain segment of the market is willing to pay for,” says Philpott. “Everyone wants to feel safe in their homes, but that doesn’t mean everyone feels the need to invest in an electronic alarm or monitoring system. The trick therefore is to expand outside the traditional home alarm market. Other products can be monetized, but the industry needs to be more innovative in developing the business model. For example, very few people will pay $100 for a flood sensor, but they may consider installing one if it meant they somehow reduced their home insurance premiums.” High End Sees Growth But what’s the view from the sharp end of the market? Installation company Cyberhomes works predominantly in the high-end residential market in the UK and has seen steady growth over the last few years. As one of the firm’s directors, Andy Mack, says: “There is an increased expectation that properties of £4m value or greater will have a centralized control system for lighting, heating, AV and security. Once these systems are integrated it allows a wide range of automation options to be programmed, such as turning on lights when an intruder alarm is triggered.” Mack says an increased awareness among project designers and specifiers is a key driver. “At the high-end, architects and interior designers are more aware of the need to integrate home technology and the importance of having it professionally installed; whereas at the entry level, products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions.” But who is likely to benefit from the spoils of the smart home – companies like Cyberhomes or security integrators? “Many home automation specialists, Cyberhomes included, will work closely with security integrators in order to provide a seamless solution for the home owner. Security companies like Co-ordinated, who we partner with on many projects, are aware of what can be achieved by integrating intruder alarms and fire detection into a home control system; but they leave the specialist programming to us.” The lack of customer knowledge hinders the uptake of smart home technology, but that is improving Market Threats The lack of customer knowledge hinders the uptake of smart home technology, but that is improving as more people understand what integrated smart home technology is capable of. As for the other threats to its adoption, Mack says: “A home automation company should be involved with the network infrastructure of a property and will ‘lock down’ as many security risks as possible. A well-designed and well-installed smart home should be extremely reliable. We are often called in to try and solve problems with an existing smart home system installed by someone else, and it is usually a poor installation that is causing many of the unreliability issues, rather than the equipment itself.” Is a fragmented market with differing technology and standards putting off potential customers? “Not in the high-end sector, as it is the responsibility of the home automation company to specify only products that they know will work correctly with the control system being installed – this can incorporate a surprisingly wide range of third-party equipment from a large number of manufacturers." “For entry level customers, there are a number of competing standards around and this can cause confusion and also limit the useful lifetime of any chosen solution. Companies like Apple are trying to simplify this with technologies like HomeKit, but that is taking a while to get any traction in the market.” Save
Workplace mobility is on the rise, which means organizations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situations. One of the major worries for an organization is the safety of its employees, whether they’re on-site, at a different office location, on-the-road, in the field or in the air. When disaster strikes, organizations need to quickly communicate with their employees in case of a location-based event (active shooter, fire, explosion, natural disaster or terrorist attack) to help protect their safety and direct them to take specific actions. For example, if there are angry protesters in the same area an employee is traveling, it is important to be able to notify that person to keep them out of harm’s way. Employer Duty Of Care This leaves companies with a tough task – do you know where your people are at all times? How can employers fulfill their Duty of Care and ensure employees are safe in times of crisis, no matter where they are located? This is easier said than done. According to Ernst & Young’s latest Global Mobility Effectiveness Survey, only 30 percent of companies have a system in place for tracking business travellers. In addition, contractors, visitors and vendors are difficult to reach and account for when traveling in and around your facilities. But, with the help of timely location data collected from building access control systems, wifi access points, travel management systems and more, safety-conscious organizations can automatically keep employee locations current – even when employees are traveling or moving between buildings and campuses. In such instances, organizations can improve security preparedness and employee safety by harnessing location-based technologies that help them ensure they can send the right message at the right time. The increasing regularity of critical events worldwide necessitates the need to locate and alert employees of any nearby risks at a moment’s notice. Dynamic location tracking and alerting has huge potential for safeguarding the well-being of mobile workers. Many organizations have started to integrate critical communication solutions with physical security systems to rapidly identify, communicate with and account for employees during these disruptive events. Everything from modest access control systems to sophisticated biometric systems can track specific employee movements When implementing location-aware alerting systems, it’s important for organizations to keep the following best practices in mind: Aggregate Location Data Across Multiple Systems The beauty of today’s digital world is that everything is connected and many of the devices and technologies we use on a daily basis transmit data instantaneously – meaning employee locations (or, at the very least, last known locations) can be automatically acquired. Everything from modest access control and badging systems to more sophisticated biometric systems that require fingerprint and facial recognition track specific employee movements between corporate buildings. Wi-Fi access points act similarly, providing location information linked to laptops, apps and other devices your employees connect to throughout your facilities. By tapping into these systems, companies can maintain a database of where their employees are and use that data for triggering automated incident communication for rostering, mustering and site evacuation purposes at the moment emergencies occur. Merge Travel Risk Management With Location Alerting But what about when someone is working remotely or traveling? Corporate travel management tools, and travel security services companies like International SOS, provide specific travel details and itineraries for individual employees – so you know where they’re traveling to, how they’re getting there (airplane, bus, train), as well as where they’ll be staying once they get there. Data doesn’t exist in a silo, so a good location alerting system will aggregate and store data from as many sources as possible. This enables organizations to locate and communicate with staff during global events and emergencies and help determine if they are safe or need assistance – no matter where they are. Again, this helps you meet your Duty of Care to keep your team safe at all times. Ensure Employee And Building Databases Are Accurate Location-based notification systems, from badging systems to Wi-Fi access points, need quality data that is up-to-date and accurate in order to effectively reach an organization’s employee base. Traditional methods of importing data, including importing spreadsheets and call lists, just won’t cut it. While these sources important contact path information like landline numbers and addresses, they clearly lack the many other contact paths that employees will be most likely to notice right away while traveling, such as cellphones and email. Collecting correct and relevant contact data, such as personal or BYOD phones, can ensure that messages are received and responded to by relevant employees. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees Automate Communication And Collaboration Once location data is gathered and stored, it must be connected to an incident communications solution that can instantaneously distribute targeted alerts in the case of an emergency. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees. When a location-based emergency occurs, the systems that can send messages to a targeted geographic region – whether that is a specific building, floor, neighborhood or zip code – instead of the entire employee directory, will be the most effective in ensuring the right messages are sent to the right people. Additionally, if recipients can acknowledge that a message was received, it allows organizations to identify who is safe – and who may still be in harm’s way and needs help. Every Minute Counts Let’s say a fire breaks out in a corporate building on the fifth floor and an emergency alert is sent out to all employees in the building. You know that three employees used their security badges to swipe in to that floor earlier that afternoon, but only one responded to your emergency alert. Because you have enabled two-way communications and expect responses from employees that are safe and unharmed, you now know that there is a very real possibility that the other two employees are incapacitated and could be in immediate danger. Building upon this idea, systems that enable employees to initiate communications are much more impactful in protecting their safety in location-based emergencies. If an employee finds him or herself in an active shooter situation, for example, panic button app capabilities are extremely valuable. Panic buttons have the capability of sending a message to an organization’s security team – automatically transmitting the employee’s location, as well as any shared audio and video with just the push of a button. During critical events, man-made incidents or natural disasters, the ability to identify and reach employees with reliable, automated communications that harness geo-intelligent tools can not only protect your business assets, but can be the difference between life and death for your staff. Because every minute counts, you can’t afford to waste time searching spreadsheets, directories and schedules to notify your employees. Automated communications that utilize available location data enable organizations to connect with employees more effectively, helping to ensure their safety during critical events worldwide.
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behavior and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analyzing Body Recognition Factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognizing the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analyzed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognized. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behavior and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognize people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorized to be a passenger in their car (to identify possible car-jacking scenarios).
Visiting with the youngest "old company" in the security market: One of the newest companies at this year’s ISC West show is 130 years old. Allegion launched in December 2013 as a standalone, publicly-traded company following the spinoff of the commercial and residential security businesses from Ingersoll Rand. Making its high-profile debut at ISC West in Las Vegas, Allegion sponsored the kickoff ceremony and featured a big booth full of familiar brands like Schlage and Von Duprin. I caught up with Dave Petratis, chairman, president and CEO of Allegion, for a quick interview at the company’s booth. Some in the security market may remember Petratis as chief operating officer and CEO of Schneider Electric North America from 2002 to 2008. He comes to Allegion from Quanex, a Houston-based manufacturer of engineered materials and components for building products. SourceSecurity.com: So what’s the Allegion story at the ISC West show? Petratis: We’re a brand new company with 130-year-old roots. We sponsored the ISC kickoff this morning, so that certainly got some attention. I’m really amazed by the level of foot traffic at the show. We’re a new company, deep roots. We launched Dec. 2, 2013 and we have been extremely well received by our employees, our channel partners and the financial community. We are already involved in acquisitions and joint ventures. That’s what was lacking under Ingersoll Rand. There wasn’t a lot of aggressiveness to build through mergers and acquisitions. We have the ability to do that. We have the ability to invest, the feet on the street, spec writers, new products. That’s really the message here. We’re a company that you touch every day through Schlage, Von Duprin, LCN. We’re independent and moving very quickly. SourceSecurity.com: What is your brand strategy related to the new name? Petratis: We’re a house of brands. Allegion will be the umbrella, but as we acquire, we will plug those brands into the umbrella and continue to run with our master brands, which are Schage, Von Duprin, LCN, CISA and Interflex. When you have that installed base around the world, it’s pretty powerful. We wouldn’t want to distance ourselves from that at all. As we bolt on and buy new companies, they’ll be part of Allegion. SourceSecurity.com: Have there been any residual effects from the Ingersoll Rand era? Petratis: The transformation and launch of the company have been extremely smooth. But I wouldn’t underestimate the amount of work involved. Anytime you create a brand and go out and raise $1.8 billion in capital to buy the company, IPO the company, there’s a tremendous amount of work. That work is behind us. The most exciting thing that I feel going forward after joining the company is: I have the capability to go out and touch the industry and touch our customers and think about the future. SourceSecurity.com: What will be your news a year from now? Petratis: Growth, investment, open protocols. We think having capabilities in an open environment is good for customers. Customers want to have choices and don’t want to get locked into proprietary systems. As an independent company, we have all the ability to drive that.
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrolls in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
A chain of one-stop shopping destination is one of the pioneers of discount shopping center in the UAE and Dubai. With a selected chain of suppliers, they offer the widest choices of products at very affordable prices. The products of this retail chain range from daily food items to beauty products and perfumes. Household items such as kitchenware, tableware, appliances, decors and electronics including mobile phones and computer accessories are also available here. The store offer apparels such as ladies wear, menswear, and children’s wear, in addition to shoes, bags, school and office supplies. Branches of this retail chain are located in more than eight locations with the one in Sharjah being the biggest branch till date. Easy Attendance Management Since branches of this retail chain are spread across UAE, managing attendance of every employee became a tedious task. Moreover, keeping track of each of their IN and OUT timings, overtime, leaves, and shift management for multiple locations from a single location was another challenge the retailer faced. Attendance management, multiple shift management and over time calculation became tricky challenges to deal with. Apart from that, they required specific type of reports to map everything department or location wise. Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices. As the retail chain is an exponentially growing company building stores at several locations, Matrix offered its Time-Attendance module along with fingerprint and card based door controller, COSEC DOOR FOT. This solution assisted in easy attendance management of employees along with their shift and overtime management. Analysis Of Employees’ Attendance The solution also allowed generation of several specific types of reports with detailed filtering options for smooth process and analysis of employees’ attendance details. Matrix People Mobility Management solution assisted the retail chain achieve following results: Centralized Attendance Management and Monitoring Easy Shift & Schedule Management Elimination of Overtime Issues Smooth HR Process with Various Precise Reports The products used for providing solutions: COSEC DOOR FOT - Fingerprint and Card based Door Controller for Time-Attendance COSEC CENTRA ME - Application Server Platform with 500 or more Users and Expandable up to 1,000 Users COSEC ME TAM - Time-Attendance Module for 500 or more Users COSEC USER100 - User license for 100 users
Bluffton Self Help, a non-profit organization providing food, clothing and financial assistance to low-income residents of Bluffton, S.C., has gone high tech with an Iris ID iris recognition system tracking the hours of paid staff and volunteers. An Iris ID iCAM R100 camera replaces mag stripe cards, said Tony O’Brien, president of Sourcecode LLC, a South Carolina-based software development firm. He designed the iris system, as well as a computer network and telephone system for Bluffton Self Help. Saving The Cost Of Purchasing ID Cards “When I started working with the group it was still using sign-in sheets for its patrons to receive benefits,” he said. “I helped move them to a swipe card system about seven years ago. Then last summer I suggested to the executive director we could use iris identification to eliminate the cards.” The iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cardsAccording to O’Brien, the iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cards for the five paid staff members and more than 250 volunteers who regularly use the system. The Iris ID system paid for itself in about five months, O’Brien said. After staff inputs a new volunteer’s data, it takes seconds to enroll the person in the system. The person stands in front of a camera which takes a picture of both eyes (irises). Software turns the photo into a digital template stored on the organization’s computers network. The same camera is later used to identify volunteers arrive and leave in a process that takes less than two seconds. Monitoring Volunteers’ Working Hours Kimberly Hall, executive director, Bluffton Self Help, said the volunteers, many of them senior citizens, tell her the system is easy and fun to use. “Our volunteers love it,” she said. “And with the touch of a button on our computer we can see how many hours our volunteers have worked.” With the touch of a button on our computer we can see how many hours our volunteers have worked"Hall estimated volunteers annually provide about $1.2 million worth of services. That’s important to know when the privately funded group seeks contributions from donors who often want to make sure the organization has the manpower to ensure those in need are receiving services. Hall said patrons still use the swipe card system as many are undocumented residents and fearful of new technologies. She hopes education will change that as Iris ID’s stored digital templates cannot be reconstructed to identify a person. Accurate And Easy To Use Systems Mohammed Murad, vice president global sales and business development, Iris ID, said the Bluffton Self Help system shows how iris recognition technology is appropriate for virtually any organization needing identity verification for security or time and attendance. “Systems from Iris ID are affordable, accurate and easy to use,” he said. “They’re no longer just for government organizations or Fortune 500 companies. The company is excited to be a technology provider to many non-profit organizations around the world.”
It began with a desire to help students fit in. Officials in Maine School Administrative District (MSAD) 58 introduced uniform bar-coded plastic ID cards to replace their existing color-coded punch cards so that students eligible for free lunches would not easily be identified by their friends. “In the past, students used punch cards to buy their lunches,” said Angel Allen, Technology Director for both MSAD 58 and neighboring district, MSAD 9. “The different colors identified their economic status for other students to see. It was not a good thing.” Some students chose not to eat rather than be embarrassed by the color of their card. The issue is a significant one. Between 40 and 60 percent of students in MSAD 58 qualify for a reduced lunch program, according to Allen. The district, which sits in a rural area of Franklin County, Maine, covers 500 square miles and serves 1,000 students through five schools. Using ID cards was not new to the Maine school administrators. Sister district, MSAD 9, had been using ID cards as visual identity for its staff for a long time, according to Allen, but “the old system was a beast.” Direct-to-Card Printer/Encoder MSAD 58 began using ID cards printed on a new Fargo DTC300 Direct-to-Card Printer/Encoder for the hot lunch program in the fall of 2005, with the lunch director printing the cards. A second printer was purchased in 2006 and is operating out of the superintendent’s office to create staff ID and lunch cards. MSAD 58 continues to expand its use of ID cards: It created a debit system in which parents can apply money to the card so their children can charge against it rather than carrying money to school. ID cards without photos are used for substitute teachers, volunteers and parents who enter the schools. Students and faculty can check out library materials using their ID cards. Students without drivers’ licenses have even used their school ID cards for identification on school trips. In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9 Building access solutions “We also use the ID cards as medical emergency cards,” said Allen. “They are particularly useful on field trips to identify students with allergies, diabetes or asthma and to provide emergency contact numbers.” In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9. The district is printing RFID cards for staff ID and building access. There is also a DTC300 for the student lunch program. “My experience in MSAD 58 introduced me to Fargo,” said Allen. MSAD 9 includes nine schools and serves 2,500 students. Here, the ability to print on two sides of a card was important, as administrators wanted a bar code on the back to work with the district’s time card system and door access program. In addition, the district is initiating a new lunch program, and a library program is in the works. Software integration “In MSAD 58, we began printing small, key chain ID cards from perforated card stock,” said Allen. “Each includes the student’s name and a bar code. Being able to carry their ID card on a key chain helps prevent students from losing their cards.” Nevertheless, a $1 replacement fee is charged each lost card, although the fee was never meant to build revenue. “It’s just enough to aggravate the students,” Allen said. TAll students carry the same plastic ID card. Information on their lunch status is contained in a bar code on the back of the card. “Now, everyone has the same card,” said Allen. “The bar code number is scanned into the cafeteria software, and only the computer can distinguish who is eligible for a reduced lunch from those who are not.” Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners Student ID cards “The big thing with schools is technology,” said Jennifer Clancy, ID Wholesaler Marketing Manager (www.idwholesaler.com), who sold Allen the printers. “In Angel’s case, she is creating a system where the student ID is a stored-value card for the lunch program using a bar code. Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners. Schools nationwide are instituting policies where a visible ID is required of students, faculty and staff at all times. With a visible ID, there is no excuse for a person to be somewhere he or she is not supposed to be. Individuals can be better identified and dealt with by the existing school protocols.” Requirements for the ID cards differ between high school and elementary school students. High school students are required to carry their ID cards at all times. In the elementary schools, students grab their ID cards from a rack on the wall outside the lunch room each day before lunch. Cards are scanned by the cashier and put back in a basket, so someone can replace them in the rack after lunch. “Younger kids can’t be responsible for remembering to bring their card every day,” Allen said. School security system Employees, especially those with multi-school assignments, such as administrators, supervisors, plant operations, maintenance, food service and transportation personnel are required to display their identification card at all times when performing duties for the school system. “Schools that have a student photo ID program in place are starting to expand the use of the cards to applications such as library checkout, lunch program management, equipment checkout, access to computers, student activity passes and bus access,” said Clancy. “More advanced schools are moving to cashless vending, lunchroom use or activity attendance.” Allen, who is responsible for the technology in both MSAD 58 and MSAD 9, envisions expansion of the ID card program, especially the RFID technology component for access control. “We try things in one place and then take them beyond,” she said. “That’s the cooperative nature of our districts.” But for now, simply using ID cards to help students fit in during lunch is a huge step forward.
Varsity Management is an innovative education system focused on learning and leadership. Varsity offers well-designed courses plans that are in sync with the state and national board curricula. Based on the re-engineered learning patterns, these plans help teachers provide multisensory learning and develop social and thinking skills in students. Varsity Management is empowering 3,85,000+ students annually with its presence across 465+ schools, PAN India. Recording Accurate Attendance Data The main requirement of the organization was to bring its time-attendance under the same network umbrella. Varsity Management Pvt Ltd wanted to manage time-attendance of more than 15,000 employees at 100+ locations across India. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records of the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of staff members. They required a biometric hardware solution that could precisely capture employees’ attendance. Moreover, they needed instant SMS notifications for certain events like missing in/out punch, attendance summary, etc. Matrix meticulously studied the needs of Varsity Management along with its regional partner Vigilant Technologies Time-Attendance Management Solution Matrix meticulously studied the needs of the institute along with its regional partner Vigilant Technologies. Having discussed in depth with Varsity’s team, Matrix offered its comprehensive Time-Attendance solution for managing and tracking staff movement from a single place. Matrix has installed 130 COSEC DOOR FOT V3 biometric time-attendance terminals at 100 locations across India. HR/Admin could easily track attendance of all employees and generate different types of reports for timely salary payment. Now users are updated instantly on different events like missing in/out punch, attendance summary, etc. when it occurs. Benefits of Biometric Time-Attendance Terminal Centralized Monitoring and Control Efficient Time-Attendance Management Quick and Easy Salary Calculations Improved Productivity Customized Reports
Dayton Public Schools (DPS) covers about 53 square miles in Dayton, Ohio. The school system is comprised of 30 school buildings and special centers with approximately 15,000 students in pre-kindergarten through high school. An urban district, DPS brings innovative students and teachers together to develop productive citizens ready to serve their communities. Core to achieving their mission is ensuring first, that students arrive at their school and at their classes, on time and ready to learn. DPS had a wide variety of, and in some cases a lack of, ID system capabilities throughout the district. This made it difficult to implement standard process improvements that would speed the creation of new IDs at the beginning of each school year. Additionally, DPS needed to expedite the check-in of tardy students thus allowing them to arrive at their classes faster. For managing tardy students, the schools traditionally used manual processes with handwritten passes which were inefficient and caused unnecessary delays if multiple students came to school late. Seeking to streamline processes, the school district realised that it needed to institute a universal, mandatory student ID system that allowed them to improve student attendance across the district while enhancing the security of its students and visitors. PlascoID Card-based Management System PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing While attending the Ohio eTech conference in early 2011, DPS learned about PlascoID, an authorized HID Global FARGO integrator and global provider of card-based ID systems. PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing. Because the printers and software integrated seamlessly with eSchoolPlus, the school system’s existing Web-based student-information system, DPS selected PlascoID to help streamline its attendance processes. Genuine HID products including the DTC4500 card printer/encoder, non-technology cards and Asure ID Enterprise card personalisation software were recommended by PlascoID to support the creation of efficient, multipurpose IDs. HID Global’s Asure ID software would enable the school system to create customized student ID cards while the DTC4500 printers would allow campus officials at each school location to instantly issue all student IDs. The printer’s modular design and small footprint were also ideal features for the school environment where space is at a premium. Asure ID Enterprise Software Prior to the start of the 2012 school year DPS implemented the solution over the course of just two weeks, installing the PlascoTrac system with 31 DTC4500 printers and Asure ID Enterprise software so it could be used on the first day of the new academic year. With the new DTC4500 printers and Asure ID software, DPS can now: Print a high volume of cards at fast print speeds: Every year, 15,000 IDs are needed by DPS in just the first week of school. The DTC4500 meets this challenge by quickly and reliably producing large quantities of cards with high-quality images. Able to withstand the day-to-day wear and tear by students these new IDs are now also uniform in image quality, design and durability. Save money and training time: The modestly priced DTC4500 has an intuitive set up and is easy to use. Already optimized for organizations like DPS, the printer is a high-security, high-performance ID issuance system that doesn’t require large capital investments or extensive training by system operators. Prepare for future ID card needs: The DTC4500 is field upgradeable. As their student ID system changes and evolves, DPS can modify their printers to fit new requirements. Achieve multiple uses with a single software application: With Asure ID Enterprise software, DPS is able to easily design card templates, enter student data and create photo ID badges. Additionally, Asure ID’s LiveLink capability enables the schools to sync student ID badge data with attendance data in PlascoTrac, and with student records in eSchoolPLUS. PlascoTrac Card ID System The newly designed DPS student ID is a white card featuring the district’s logo and mission statement With this combined solution from PlascoID and HID Global, DPS can now easily and quickly provide all students with IDs during the first week of the new school year. And when a student loses his or her badge, or is newly enrolled in school, a new ID can be created and issued that same day. The newly designed DPS student ID is a white card featuring the district’s logo and mission statement. New visual security elements include a large color photo of the student and his/her name printed in large font on the front of the card, so school personnel can easily identify individuals. Additionally, the ID now includes a barcode that is used in conjunction with the PlascoTrac system. So, when a student arrives late to school or is tardy to a class, they are scanned into PlascoTrac and a tardy pass is printed automatically. HID's Plasco ID Cards With this brand-new student ID system, processing tardy students now takes 25 to 35 percent less time than before, enabling DPS students to spend more time in class while reducing the administrative burden of its staff. Some schools have even tied the new ID cards to their media center In addition to addressing their original challenges, DPS has now found that the new HID and Plasco ID card solution gives them even greater functionality and versatility. Some schools have even tied the new ID cards to their media center for checking out books or documenting lunches purchased in the cafeteria. Elementary schools are even exploring ways to use the IDs to encourage positive reinforcement of good behaviors. HID Global Card Issuance/PlascoTrac Solution “We are extremely satisfied with how adaptable the solution is on a per-school basis,” said Richard Melson, director of The Office of Information Technology at Dayton Public Schools. “Initially the principals had one vision of how things were going to work and now that they have the technology in their possession, they each use it a little differently based on specific needs of their school.” In the near future, DPS expects to expand its use of the HID Global card issuance/PlascoTrac solution to keep track of visitors. Currently the district provides printed temporary ID passes, but it plans to eventually incorporate scanning of government IDs, such as a driver’s license, before granting visitors entry.
JK Tyre & Industries Ltd. have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to Time-Attendance and Visitor Management. Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees Matrix Time-Attendance Solution Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage Time-Attendance of over 500+ workers. Moreover, we provided Employee Self Service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so we delivered Visitor Management software, which helped them create a visitor pass, fetch visitor records and generate reports of the same. 40% Increase in Productivity of Employees and Workers Results Reduction in Cumbersome HR tasks Automatic Maintenance of Visitor Records on Day-to-Day basis 40% Increase in Productivity of Employees and Workers The Products COSEC VEGA FAX - Fingerprint and Card based Door Controller with Touchscreen, IP65, Wi-Fi and 3G/4G Connectivity Option COSEC PATH RDFM - Fingerprint and Card based Exit Reader with IP65 COSEC CENTRA ME - Application Server Platform with 500 Users and Expandable up to 1,000 Users for Basic Access Control and Raw Event Data COSEC ME TAM - Time-Attendance Software Module for COSEC CENTRA ME Users COSEC ME ESS - Employee Self Service Software Module for COSEC CENTRA ME Users COSEC ME VMM - Visitor Management Software Module for COSEC CENTRA ME Users