To meet the evolving design needs of the diverse and growing market for biometric access control solutions, the globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced the expansion its fingerprint authentication touch sensor portfolio for physical and logical access devices and applications. FPC1025 sensor access module To enable maximum flexibility in product design, the new FPC1025 sensor version from Fingerprints has a smaller footprint than the other models...
Union Community Co. Ltd. has newly developed its iris recognition terminals (UBio-X Iris) that can recognize IRIS at a distance of 50cm. Sales are expected to increase this year with the launch of contactless new products such as face recognition devices. Amid the on-going COVID-19 crisis, the demand for the non-contact biometric method is growing popular and biometric recognition solutions firm, Union Community has announced to launch an iris recognition system on the 12th of May, 2020. UBio-...
Hank Washington, a company specializing in high-quality household products, announced a new keyless keypad door lock system. The BACKR electronic access control solution is ideal for customers interested in a high-security door lock for both indoor and outdoor applications. The recent announcement aims to provide a reliable security solution for residents and business owners throughout the US. The new BACKR keyless door lock features an easy-to-use touchscreen offering four unlock alternatives:...
Redrock Biometrics and HYPR announce a partnership for Redrock Biometrics to provide palm authentication with their PalmID solution. HYPR is a renowned provider of passwordless authentication for enterprises. Backed by Comcast, Mastercard, and Samsung, the HYPR cloud platform is designed to eliminate passwords and shared secrets across the enterprise. With HYPR, businesses have deployed secure passwordless authentication for millions of users. The addition of Redrock Biometrics' PalmID to the H...
Biometrics company, Fingerprint Cards AB (Fingerprints™) announces a collaboration with the global on-line distributor, Digi-Key Electronics. This cooperation will strengthen Fingerprints’ position and help the company scale into new markets and application areas within IoT and access globally. “This is a step for us to be able to scale with FPC BM-Lite and to reach new verticals that require additional sales channels to drive business. Digi-Key will help us reach out and find...
Suprema, globally renowned provider of security and biometrics, has announced that 2020 marks the company’s 20th anniversary. Suprema was founded in 2000 and the company has built a worldwide sales network in over 140 countries and number of users with Suprema technologies surpassed one billion. Access control systems major Suprema’s extensive range of portfolio includes access control systems, time & attendance solutions, mobile access solutions and fingerprint live scanners....
Pedestal PRO, a world renowned manufacturer for access control pedestals, in cooperation with 2N, an Axis company, has introduced a line of purpose-built pedestal solutions designed for use with the 2N IP Verso security intercom system. Integrators and 2N customers can choose from a selection of pedestal and housing options that provide the most elegant presentation of their 2N IP Verso units in settings that preclude wall-mounting. Pedestals are available in various heights and colors and may be paired with attractive housings configured to accommodate any combination of up to three 2N IP Verso Modules, including touch display, touch keypad, Bluetooth reader, fingerprint reader or RFID reader. In addition, special “tower-style” pedestals are available for entryways and lobbies, offering a beautiful, low profile design that complements the aesthetic of premium office space as well as the stylish 2N units. Available in powder coated steel Dimensions and mounting holes on all pedestals and housings have been engineered for the perfect alignment with the 2N modules, ensuring seamless, hassle-free installation. Pedestals are available in powder coated steel or are upgradeable to #304 stainless steel to match architectural facades, prevent rust and improve longevity. Customers can request customized height, width and color, as well as adding additional cutouts and mounting patterns to accommodate third-party hardware. The company provides free CAD engineering services for all special orders. Standard models can ship as quickly as 24 hours; custom orders require just 12-15 business days. Security system manufacturers A “Search by Device” feature displays all Pedestal PRO models compatible with the IP Verso line The pedestals are suitable for the many indoor and outdoor applications where 2N IP intercoms are used, including industrial, commercial, apartments and gated communities. Pedestal PRO, which manufacturers turnkey pedestal solutions for a wide range of leading security system manufacturers, makes it easy for 2N customers and dealers to quickly find and purchase relevant pedestal and housing models via its website. A “Search by Device” feature displays all Pedestal PRO models compatible with the IP Verso line. Spec drawings, installation guides and care and maintenance instructions are all available for download. New mounting options "2N IP Verso is valued by customers who demand both premium performance, and style, from their intercom system. With new mounting options from Pedestal PRO, these customers can now mount their systems anywhere and feel confident that the impression they make, along with the user experience they deliver, are truly best-in-class,” said Pike Goss, CEO of Pedestal PRO. Pedestals are available for order on the company’s website. To learn more about Pedestal PRO solutions for 2N IP Verso, customers can visit Axis Communications in booth #14051, at ISC West, March 18-20 in Las Vegas.
Attracting trade visitors from across the subcontinent, the region’s most influential trade fair for the security industry, Secutech India, is scheduled to return for its 9th edition from 7 – 9 May 2020 at the Bombay Exhibition Center, Mumbai. With exhibitor registration still open, the fair has already attracted more than 350 of the world’s leading security brands with less than three months remaining before it commences. The 2020 exhibition will feature Axis Communication, CP Plus, Hikvision, ZKTeco, Infinova, Matrix, Toshiba and many more. Security devices and turnkey solutions The 2020 edition of Secutech India is set to reflect the country’s digital transformation Detailing the business value of the fair, Ms Regina Tsai, the General Manager of Messe Frankfurt New Era Business Media Ltd said: “Catering to local market requirements such as cost efficiency and a need for fast project implementation, Secutech India assembles the full range of security devices and turnkey solutions under a single roof. Benefiting from its position in Mumbai, India’s commercial center, last year the fair attracted more than 20,000 buyers traveling from across India’s main regions, and we are looking forward to welcoming even more business this coming May.” The 2020 edition of Secutech India is set to reflect the country’s digital transformation. IP cameras are in high demand from SMEs, retail and the residential segment, while biometric access control systems are also gaining popularity in offices and at border controls, with users gradually favouring contactless systems such as facial recognition above fingerprint biometrics. Core security solutions In the view of Ms Tsai, this year’s fair is taking place at a favourable time for the regional industry: “The government aims to transform India into an electronics export hub, which will open up new opportunities for component manufacturers catering to the local manufacturing sector. But just as importantly, as part of India’s proposed Union Budget 2020, infrastructure development across roads, railroad, airports, ports, and economic corridors are expected to raise demand for core security solutions including video surveillance, video analytics, biometrics and intruder detection systems." "The governments ‘Digital India’, ‘Smart City Mission’, and ‘Technology Empowerment’ initiatives will also be growth drivers.” Access control in healthcare facilities As a maturing security market, the appetite for knowledge in India is growing" Among many benefits, the ability to make onsite comparisons, conduct meaningful business discussions and view product demonstrations are a few of the show elements that visitor’s to Secutech India value. According to Ms Tsai, business effectiveness is the top priority for the fair’s organisers: “Initiatives such as the ‘Secutech connect’ business matching service which links buyers with exhibitors based on industry background continue to be highly popular, helping us to generate genuine business outcomes for participants.” But beyond business, information exchange is also a priority says Ms Tsai: “As a maturing security market, the appetite for knowledge in India is growing. This is a need that the upcoming edition of Secutech India will cater for with a series of conferences dealing with topics relevant to the local market, including cybersecurity, smart city digital infrastructure; the convergence of 5G, artificial intelligence, data analytics and the IoT; access control in healthcare facilities, and fire safety in elderly care homes and restaurants.” Personal protection equipment In addition to its core focus on security, Secutech India 2020, in cooperation with the GPS Association of India, will feature a pavilion dedicated to fleet management, vehicle tracking as well as passenger and driver safety. The concurrent ‘Fire and Safety India’ event will also return as the destination for trade buyers to locate the latest firefighting gear, personal protection equipment and smoke detection systems.
Matrix Comsec has announced that it will be attending the International Security, Safety and Fire Exhibition in Spain - Sicur. The exhibition will commence from 25th of February 2020 and last for 3 days up till February 28, 2020, and is organized by the IFEMA held at Feria de Madrid in Madrid, Spain. Matrix is all set to participate in the event to evince the ability of its products and solutions. Designed to meet the complete security requirements of any organization, the products are of par excellence. Matrix Comsec stays at the forefront by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its comprehensive range of Time-Attendance and Access-Solutions at Sicur 2020. COSEC range of Access Control Solutions Matrix Access Control Solutions offer comprehensive three-dimensional Access Control policy Matrix Access Control Solutions offer comprehensive three-dimensional Access Control policy that aims at having the right people, in the right place at the right point of time. Furthermore, it offers 25+ enterprise-grade access control features meeting all industry-specific access control and compliance needs, including instant SMS and email notifications and a plethora of industry-standard reports. Matrix COSEC range of Access Control Solutions is specifically designed for modern organizations offering robust security, flexibility, simplicity, scalability and ease of use. In addition to this, the Matrix COSEC range for modern Access Control solution is equipped with 25+ advanced access control features. Matrix Palm Vein Recognition and Time-Attendance Solution Matrix will do a live demonstration of two of its unique and innovative solutions: Matrix Palm Vein Recognition is a state-of-the-art biometric that uses the infrared light to map the unique vein structure of the palm, capturing over millions of data points. Eventually, offering the highest point of security which makes it arguably the most advanced biometric on the market. Matrix Time-Attendance Solution is a one-stop solution for managing and controlling the attendance data. It is designed to meet the diverse requirements of any organization by offering a superlative range of flexibility in attendance policies, configuration, integration and report generation. Additionally, it offers features like automatic calculation of overtime and much more.
FIME has been accredited to test biometric components in line with FIDO Alliance’s Biometric Component Certification Program. The accreditation enables device manufacturers and solution providers to ensure the quality and performance of biometric authentication solutions including fingerprint, facial, voice, and iris recognition. "In an age dominated by cumbersome passwords, biometric authentication delivers stronger security while improving UX. And in a post-PSD2 world, it’s a compelling option for the payments world to meet new Strong Customer Authentication (SCA) requirements,” comments Stephanie El Rhomri, Vice President of Services at FIME. Usability of biometric authentication FIME offers a broad portfolio of biometrics services including consultancy, customized test strategy development, and expertise on use of biometric ISO standards. “Expanding our existing biometric offering is an important strategic move for us. FIDO Alliance is leading biometric authentication standardization efforts and we’re proud to be sharing our support and expertise that we are developing with insights from two research projects to help advance its success.” continues El Rhomri. “The Biometric Component Certification Program is the first of its kind in the industry, enhancing the security, interoperability and usability of biometric authentication methods," Dr. Rae Hayward, Certification Director, FIDO Alliance said. “Support from testing experts such as FIME is invaluable to the continued success and adoption of our standards and, in turn, moving us closer to our goal of removing reliance on server-side passwords to authenticate users.”
Iris ID, a globally renowned provider of iris recognition technology solutions, has announced the integration of its handheld iCAM M300 multimode platform for biometric enrollment and verification with the FBI-certified Sherlock fingerprint scanner from Spartanburg, S.C.-based Integrated Biometrics (“IB”). Sherlock fingerprint scanner The fingerprint reader snaps on to the iCAM M300 to create one lightweight portable unit for field use. Sherlock is certified by the FBI as a FAP 45 fingerprint scanner having met the bureau’s stringent image quality conditions in virtually any environment, including indirect or direct sunlight, dusty conditions and with dry or dirty fingers. The unit can simultaneously scan up to two fingerprints and run for hours connected to the iCAM M300. iCAM M300 multimode platform Iris ID’s iCAM M300 is designed for field use in law enforcement, access control, national ID programs & border control Iris ID’s Android-based iCAM M300 is designed for field use in law enforcement, access control, national ID programs, border control and time and attendance situations. The unit’s embedded cameras capture both iris and facial modes. Also included are magstripe and contactless card support, as well as an MRZ reader to verify ePassports. Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE and more. “IB is extremely pleased for the Sherlock to be chosen for integration into such a cutting-edge mobile multi-modal identification device,” said David Gerulski, executive vice president of Integrated Biometrics, further adding, “Our lightweight, low-power devices, based on IB’s patented Light Emitting Sensor film, are enabling a completely new approach to identification for police, border authorities and more.” Software integration Mohammed Murad, Vice President of Global Sales and Business Development, Iris ID, said “the combination of the iCAM M300 and Sherlock provides an ideal portable identity enrollment and verification solution for both public and commercial organizations. Equipped with Sherlock, the iCAM M300 offers access to the three leading modes of biometric authentication- iris, fingerprint and facial - in a lightweight unit that performs virtually anywhere. Sherlock integration is a tremendous enhancement to the growing Iris ID line of biometric authentication solutions.” The Security Industry Association named the iCAM M300 the 2018 New Product Showcase award winner for best mobile app.
Access Control is always a very critical aspect of an organization's overall security strategy. Regardless of its size, it is inevitable for any organization to have a flexible and comprehensive access control solution. To connect separate areas in the single location requires a standalone access control. For small and medium organization, Matrix has designed a standalone Access Control solution for small organizations, while keeping security and simplicity in mind. This innovative solution works on industry standard IP protocol allowing organizations to expand easily even with a single door. This eliminates the need of installing any application software. Centralized Monitoring and control Key Features: Automatic Fingerprint/Palm Distribution Access Control on: User, Zone and Time First-in User Rule 2-Person Rule Man-Trap Guard Tour Occupancy Control Blocked Users Route based Access Door Auto Relock Dead-Man Zone Anti-Pass Back Do Not Disturb (DND) Zone Smart Card based Identification Who's In Time Stamping Integration with Other Hardware Notifications on Exception Centralized Monitoring and Control Informative Reports
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organization and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviorAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organizations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behavior and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organizations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerized applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies Prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organization (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System Helps In Tailgating Mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy Enrollment And Deployment Enrollment in the system is easy. Companies can deploy a separate enrollment station, or any reader can be used for enrollment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrollment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting Intent From Positioning Of Eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed. The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based Video Systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. The economics of the cloud make implementation of analytics much more affordable Augmented Identity: Biometrics In Security Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial Intelligence Applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades. Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live Video Streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customizable Turnstile Solutions Delta highlighted their new designer series turnstiles, whose colorful appearance led booth visitors to ask about customization Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colorful appearance led booth visitors to ask about customization. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.” Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organization. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralized location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customized reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralized monitoring and control Increased productivity Customized reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
HID Global, globally renowned company in trusted identity solutions, has announced that the traffic branch of the Singapore Police Force has deployed an electronic Know Your Customer (eKYC) system that uses HID Lumidigmâ V-series Fingerprint Sensors to verify the identities of driver’s license applicants. Lumidigmâ V-series Sensors The HID Lumidigm sensor’s patented multispectral imaging technology has helped improve identity-verification speed and efficiency as compared to their previous paper-based process, and its proven liveness-detection capabilities significantly diminish the risk of fraudsters compromising the eKYC system. The new eKYC system improves security by using fingerprints to verify the “true identity” of driver’s license applicants Deployed by HID partner Secur Solutions Group at Singapore’s three driving schools, the new eKYC system improves security by using fingerprints to verify the “true identity” of driver’s license applicants. The speed and reliability of the Lumidigm sensors has enabled the entire enrollment process to be performed at kiosks in seconds, from fingerprint capture through matching against the actual identity documents (NRIC/Work Permit). Fingerprint sensors The Singapore Police Force is now enrolling 500 to 700 individuals a day at the kiosks since deployment and has cut almost 1,500 man-hours of labor per month since eliminating its staffed counters and manual workflow. “The HID Lumidigm sensors have outperformed all alternatives with respect to speed, accuracy and consistency of image acquisition regardless of finger or environmental conditions,” said Tseng Wun Hsiung, CEO of Secur Solutions Group. “New opportunities are being considered for service enhancement and parts of the eKYC system are being evaluated for integration.” Integrated with multispectral imaging technology HID’s V-Series Lumidigm sensors were the first fingerprint products certified to the ISO standard HID Global’s patented multispectral fingerprint imaging technology captures unique characteristics from the finger’s surface and subsurface, which is particularly important for the Singapore Police Force’s eKYC system because it serves a large population spanning many ages, ethnicities and skin types. The Tseng Wun Hsiung technology works reliably with normal, wet, dirty, dry or damaged fingers, and in sunlight or wet or cold conditions. Field-updatable liveness detection is employed to distinguish between the captured biometric data from a real living person versus a plastic, fake or other artificial fingerprint copies. HID’s V-Series Lumidigm sensors were the first fingerprint products certified to the International Standards Organization (ISO) standard focused on anti-spoofing and liveness detection. Fingerprint recognition “HID Global is delighted that our Lumidigm V-series sensors are delivering unparalleled accuracy in fingerprint data capture for the Singapore Traffic Police’s new eKYC system,” said Sujan Parthasaradhi, Director, APAC, Extended Access Technologies Business Area, HID Global. “We have no doubt our solutions will continue to give the Singapore Traffic Police the confidence of standards-validated spoof protection at their driving schools while helping them sustain the highest levels of efficiency and customer service.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution center for a top four UK supermarket. The new distribution center, fulfills orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centers are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorized personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centers are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorized colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organizations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorized ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organizations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorized manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste water treatment, oil-gas and pipelines. It has 25 construction sites across Middle East. Managing time-attendance, shifts, overtime and leaves of 20,000 employees at different locations was a challenging process for them. They wanted a centralized time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Project Highlights Time-attendance solution for 25 construction sites Access control solution for 25 sites Centralized attendance management for 20,000 employees Managing time-attendance data Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leaves and overtime of 20,000 employees at different locations is very time consuming and a tedious task. Previously, the customer was using Hand geometry solution, which was very time consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralized time-attendance and access control solution which could be managed and controlled from the head office. Faster and accurate salary calculation After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected Optical fingerprint based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Error free time-attendance Time required for salary calculation reduced by 30% Productivity increased by 20% Control of all sites through a live monitoring window Error free time-attendance and overtime data Database management of all employees Centralized report generation Products installed COSEC DOOR FOP - optical fingerprint and RF card based door controller COSEC ENROLL FINGER - fingerprint enrollment station COSEC LE PLATFORM - web based application software platform COSEC LE TAM - time-attendance and leave management module COSEC LE ACM - access control module COSEC LE USER10000 - 10000 user license for LE platform
NEC Corporation has announced that NEC Technologies India (NECTI), a pioneer in the integration of IT and network technologies, has partnered with the Centre for Development of Advanced Computing (C-DAC) to deploy its industry-leading automated fingerprint identification system (AFIS) for the Kerala State Police in India. The new AFIS will be used by the Kerala State Police to match unknown fingerprints against a central database of known fingerprints for criminal investigation. More than 600 police/enforcement facilities across the state, including police stations and the district police headquarters, will have access to the system for verification and new registration of fingerprints. Faster and accurate fingerprint verification The new system is able to enhance the quality of fragmented fingerprints captured at crime scenesThis new system will help state police accelerate investigations more efficiently by providing a faster and more accurate fingerprint verification. The new system is able to enhance the quality of fragmented fingerprints captured at crime scenes and makes it possible to match the prints against the central database. NEC's AFIS boasts the world's no. 1 authentication accuracy and is a core technology of the company's portfolio of leading biometric solutions, ‘Bio-Idiom’. Mr. Takayuki Inaba, Managing Director, NECTI, said, "NEC has always been at the forefront of public safety. As a world leader in biometrics technologies, we are delighted to be working with C-DAC and the Kerala State Police to implement a new fingerprint recognition infrastructure, and are committed to building safer and smarter cities in India."
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload
The 2020 State of Physical Access Control ReportDownload