ievo Ltd, global provider of biometric fingerprint recognition products, announced that it received Lenel factory certification and joined the Lenel OpenAccess Alliance program. ievo biometric fingerprint recognition products can now interface with the OnGuard access control system, providing a streamlined approach to fingerprint enrollment. “ievo has completed required factory testing at Lenel to validate the functionality of its interface to the OnGuard system. Having this interfa...
“With C•CURE 9000 at the heart of so many high security solutions, it is not surprising that end-users want to be kept informed on any emerging cyber threats and how we are dealing with them,” said Gordon Morrison, GB Sales Director for the Tyco access control and video brands. “In this respect the well-established Tyco Cyber Protection Program, which we see as part of our long-term' holistic approach to supplying customers with quality solutions, is helping us maintain a...
HID Global, a worldwide provider of trusted identity solutions, announced that it has acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services, making HID Global one of the world’s major providers of fingerprint biometric technologies....
Last year, natural disasters in the U.S. cost homeowners and businesses a record $306 billion, according to the National Oceanic Atmospheric Administration (NOAA) 1. While natural disasters can occur at any time throughout the year, the U.S. government recognises September as ‘National Preparedness Month’, an effort to encourage Americans to prepare for emergencies. To help safeguard your valuables, The Master Lock Company provides peace of mind with trusted security products that he...
Customers want services. Services that add convenience, simple control and easy management of all their security devices. With Connect ONE by Connected Technologies LLC, it’s easy to add the new services that one may not have thought about or assumed were too difficult to add. Connect ONE is a cloud-hosted integrated security management platform that bundles intrusion, access control, video surveillance, energy management and critical environmental monitoring in one single user interface t...
Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit, currently employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R1...
Invixium, an innovator of biometrics solutions, made its North American debut at ISC West 2018 in Las Vegas and unveiled an impressive lineup of modern biometric products including its newest - IXM TITAN, featuring an impressive suite of features and technical specifications. TITAN offers customers a multitude of options for access control applications in need of multimodal biometrics (facial recognition as a primary and fingerprint or finger vein authentication as a secondary), with additional functionality for time and attendance, video intercom and video surveillance. Visitors from the security industry including experts, consultants, installers and media were impressed by the company’s design and attention-to-detail as exhibited by the inviting nature of the booth, product displays, brochures and attractive packaging. “We had a fantastic ISC West!” said Shiraz Kapadia, CEO and President of Invixium. “From security consultants, end users to integrators, we received numerous compliments and positive reactions to our products and solutions. It only reinforces our vision of creating biometric solutions that are beautiful, but also rugged enough to be installed in any environment.” Surveillance and physical security systems will continue to play a critical role in keeping organizations, staff and visitors safe Understanding Cybersecurity Threats At ISC West 2018, Kapadia was one of the esteemed security leaders to participate in a panel discussion of industry experts to address cybersecurity. Kapadia joined expert panelists from leading manufacturers Galaxy Control Systems, Pelco by Schneider Electric, Boon Edam, SureView Systems, Manything, and Viakoo to discuss how cybersecurity is not restricted to the IT department – it threatens and affects every connected device in every department. The panelists shared their views regarding connectivity in the security industry, and how as it expands, risks will increase. In this environment, surveillance and physical security systems will continue to play a critical role in keeping organizations, staff and visitors safe. They communicated to the audience how it is vital to understand what the cybersecurity threats are to physical security systems, how protections from cyber-attacks can be implemented and how security professionals must be proactive in planning for incident recovery and ongoing protection. Advanced Biometric Applications “Invixium will continue to develop advanced biometric applications and help educate the market on the many benefits of multimodal authentication technologies,” continued Kapadia. “We are on a mission to become the market leader in the biometric physical access control market, one project at a time and will continue our impressive growth trajectory.”
Invixium, a manufacturer of next-generation biometric products for enterprise access control, time and attendance and smart home markets, introduced its IXM TITAN at ISC West 2018 (booth #6109). TITAN incorporates facial recognition and fingerprint or finger vein biometric modalities into one multifunctional device capable of access control, time tracking, video surveillance and video intercom applications. “Biometric authentication is now relevant and continues to trend across many markets, rapidly becoming a mainstream solution for physical security applications,” says Shiraz Kapadia, CEO and President of Invixium. Invixium’s new TITAN solution combines highly accurate biometric technologies and diverse functionality into one exquisitely designed unit" Facial Recognition Algorithm “Security professionals continue to accelerate the replacement of traditional and antiquated access control methods using physical credentials with advanced biometric solutions. Invixium’s new TITAN solution – which combines highly accurate biometric technologies and diverse functionality into one exquisitely designed unit – delivers higher levels of security, is easy to deploy and implement, and provides lower total cost of ownership.” TITAN’s hallmark features include a revolutionary facial recognition algorithm based on a single 21-megapixel camera solution. With the fastest enrollment time and smallest biometric record size, TITAN delivers superior throughput, authenticating approximately 15 faces per minute with extreme accuracy and includes onboard memory to store an unprecedented 100,000 facial biometric records. Finger Vein Technology TITAN also incorporates Hitachi finger vein technology with liveness detection, making it virtually impossible to spoof. Vein technology provides increased privacy by eliminating latent prints and is not reproducible as vein patterns are beneath the skin. Two Industry-leading Fingerprint Sensor Options: Lumidigm Venus utilizes multispectral imaging technology that virtually eliminates common real-world problems experienced by conventional fingerprint sensors. Fast, accurate and reliable, the Venus fingerprint sensor delivers best-in-class biometric authentication along with liveness detection. SecuGen U20 is an FBI certified, high-performance, maintenance-free optical fingerprint sensor resistant to scratches, impact, vibration and electrostatic shock. Additional Features Of TITAN Include: Android Nougat Operating System A 2.2 GHz Quad-Core Qualcomm Snapdragon processor providing supreme power, graphics, reliability and battery efficiency Inbuilt RFID card reader options: iCLASS SE, MiFARE DESFire, MiFARE DESFire EV1 and 2, EM Prox A 5.0” IPS (in-plane switching) LCD for better color reproduction and wider viewing angles An aluminum enclosure that makes it suitable for all environments including extreme heat, cold or rain. This construction is especially ideal for mines, construction sites, seaports, petro chemical and nuclear power plants Advanced connectivity options such as Gigabit Ethernet, RS485, RS232, customizable Wiegand, 3G for remote locations, Wi-Fi and Bluetooth But it doesn’t stop there. TITAN was designed to be future proof and anticipates more functionality to be added in the near term.
Invixium, a global manufacturer of next-generation biometric solutions for enterprise access control, time and attendance, and smart home markets, continues to add new integration and technology partners to support the company’s global expansion and growth. Integrations with the industry’s leading access control companies compatible with Invixium’s portfolio of biometric solutions are all on display here at ISC West 2018 (booth #6109).Link allows for two-way synchronization of user/cardholder data between IXM WEB and various access control software platforms IXM WEB Enterprise Software Invixium’s IXM WEB enterprise software includes their newest module IXM Link, which plays a major role as the foundation in making these integrations possible. Link allows for two-way synchronization of user/cardholder data between IXM WEB and various access control software platforms, making the entire process of management and system administration simple and efficient for installers and system integrators; eliminating the need to enter user/cardholder data in two places and dramatically reducing set-up time. Invixium’s list of integration partners to date include Galaxy Control Systems, RS2 Technologies, Honeywell, Genetec, Gallagher Security, Paxton Access, Siemens, Remsdaq and S2 Security, with more to follow shortly. Integration Partnerships “Establishing a long list of integration partners is a pragmatic and proven way to further increase market penetration and growth,” says Shiraz Kapadia, CEO and President of Invixium. “Invixium’s IXM Link makes it easier for system integrators to implement our best-in-breed biometric solutions quickly and accurately; significantly speeding up deployment and setup time. Invixium has so far completed eight integrations with various access control companies in just nine months – a testament of our focus and pace and we look forward to adding more integrations in the next few months.”We selected the experts in the field of card access, sensors, processors and cover glass and harnessed their technologies to the fullest" IoT-Centric Biometric Solutions By leveraging the industry’s most trusted technologies along with the most dependable fingerprint sensors on the market, including multispectral imaging, active thermal and high-resolution optical, Invixium has crafted a suite of exquisitely designed, modern, IoT-ready biometric authentication solutions for a myriad of applications that are robust and easy to deploy. “We selected the experts in the field of card access, sensors, processors and cover glass and harnessed their technologies to the fullest,” says Kapadia. “The result is a portfolio of visually stunning, feature-rich biometric products engineered and designed to deliver the best user experience possible.” Invixium’s Technology Partners have grown to include: HID, SecuGen, Hitachi, Texas Instruments, Qualcomm, Corning, and NEXT Biometrics, to name a few. Working closely with these experts has allowed Invixium to incorporate numerous features and functionalities across the company’s entire portfolio of biometric products.
Invixium, an innovator of biometrics solutions, will be unveiling a new benchmark in multimodal authentication technology at ISC West 2018 at booth #6109. The new IXM TITAN promises to be the most advanced biometric product ever engineered, reflecting Invixium’s drive to become the world leader in multi-purpose authentication solutions. TITAN is equipped with facial recognition as the primary biometric modality, fingerprint or finger vein authentication as the secondary and consolidates features for access control, time and attendance, video intercom and video surveillance into a single device that accommodates a diverse host of applications with extreme efficiency and convenience. TITAN was conceived and engineered using a unique set of design parameters including unparalleled application versatility, simplicity of use and implementation, industry-leading processing power and exquisite aesthetics that clearly differentiate it from traditional biometric devices. The introduction of IXM TITAN at ISC West is a milestone for Invixium as this marks our entry into North America with a plethora of biometric products and solutions" Multimodal Biometric Authentication Versatility “TITAN is a master stroke,” says Shiraz Kapadia, CEO and President of Invixium. “We engineered TITAN to be an iconic biometric product; beautiful enough to be installed in luxury homes and corporates, extremely rugged for installation in the harshest environments, technologically futuristic to be an IoT connected device and security-focused with its multimodal and multifactor authentication versatility." "The introduction of IXM TITAN at ISC West is a milestone for Invixium as this marks our entry into North America with a plethora of biometric products and solutions,” adds Kapadia. TITAN’s impressive suite of features and technical specifications will be unveiled at ISC West 2018, where the product will be featured at booth #6109.
Boon Edam, a global manufacturing firm of security entrances and architectural revolving doors, has announced it will emphasize integrated access control solutions in booth #8037 at the ISC West exhibition in Las Vegas, NV from April 11-13. ISC West is the largest security trade show in the United States, bringing together over 30,000 security professionals for its 3-day event. Boon Edam is also the official turnstile sponsor at the exhibition. Integrated Technologies Security entrances with integrated access and anti-tailgating technologies are helping security professionals manage risk and liability by preventing infiltration into their buildings. The following solutions will be on display in Boon Edam’s booth: Lifeline Speedlane Swing: The industry’s slimmest optical turnstile will feature a custom, integrated pedestal that incorporates the MorphoWave touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification, all in a stylish, cohesive design. Circlelock 200: Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorization, followed by an iris scanning technology installed inside the portal using an Iris ID called the iCAM7S Series reader, to confirm identity. Circlelock Half Portal: The Circlelock half portal is the newest entry solution by Boon Edam. This clever solution transforms an existing swinging door into a high security mantrap entrance that prevents piggybacking. It also enables organizations to save on both space and renovation costs. In the booth, the half portal will demonstrate a two-factor authentication scenario: initial authentication using an AMAG Symmetry card reader to enter the portal, followed by facial scanning technology from StoneLock Pro to open the second door. Tourlock 180+90: The industry’s high-selling security revolving door will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. StereoVision 2: A proprietary technology in Boon Edam’s Circlelock and Tourlock, StereoVision 2 prevents piggybacking by using a combination of near infrared and optical sensors to determine if someone is entering the door alone. Visitors to the booth will be able to see how they can calibrate the technology to obtain the mathematical probability of successful piggybacking prevention, thereby justifying their investment in high security doors and portals. BoonConnect: An IP-addressable, proprietary software system provides diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. BoonTouch: A proprietary desktop control panel with integrated software for efficient traffic management of many of Boon Edam’s security entrances. For the 11th year in a row, Boon Edam is the official turnstile sponsor of ISC West. For the first time, the company is excited to install 34 lanes of a new optical turnstile at the show entrances: the Speedlane Open, which features a barrier-free design ideal for deterring casual tailgating attempts. The Open turnstile is part of the sleek and modern Lifeline Series launched in 2015, which has helped propel Boon Edam to the market leading position for security entrances, according to “Pedestrian Entrance Control Equipment” by IHS Markit for the 2014-2016 period.
ISC West, sponsored by the Security Industry Association (SIA), is the largest converged security event of the year, constantly evolving to educate security professionals on the tools and skills needed to protect against today’s emerging cyber-physical security and safety threats, and the anticipated ones of tomorrow. ISC West debuted its SIA Education@ISC session lineup for the 2018 show. These 85+ plus accredited sessions, covering a range of industry topics, are designed to arm attendees with the assets and knowledge they need to protect and defend against developing threats in today’s complex security landscape. ISC West 2018 will take place April 11-13 at the Sands Expo in Las Vegas, NV. SIA Education@ISC will kick off a day prior to the exhibits, on April 10. SIA Partnership Sees Success Through its partnership with SIA, ISC West has organized a comprehensive program for attendees from all industries, roles and functions across physical, IT and IoT security. Now that registration is officially open for ISC West, the Connected Security Expo and the Unmanned Security & Safety Expo, attendees can sign up to take part in key sessions. Sample sessions will include: How Advanced IoT Technology can Create the Connected Workplace of the Future The Internet of Things (IoT) is booming, but there’s no one-size-fits-all approach for deploying an IoT project in the enterprise, nor for securing it. This session will provide attendees with a model for implementing an end-to-end IoT ecosystem and how to leverage its predictive benefits to improve efficiency and security. You Are the Password: Frictionless Biometric Security Biometrics will continue to be a hot topic this year, with everyone wondering if using facial recognition or fingerprints is truly more secure than traditional passwords and pins. This session will define where we are with biometrics, how it’s changing the way we interact and transact, and how its increasing popularity will impact our relationship with physical devices. Active Shooter Workshop Today’s defense environment is unpredictable, and active shootings are a real concern for businesses and communities. Back by popular demand, join this hands-on workshop to learn how to protect and defend from a communications and infrastructure perspective. Another Brick in the Firewall: Security Leaders Discuss The Elements of Complete Cyber Protection As a 50-year-old brand, ISC West has evolved from a physical security event to a converged security event, adapting to stay on the cusp of the changing environment. This diverse panel comprised of experts across intelligent power, surveillance, access control, identity management and cybersecurity will address these vital topics. Case Study of Law Enforcement Uses of UAVs Listen to a first-hand account of how the Nevada Highway Patrol has pioneered the use of unmanned aerial vehicles (UAVs) to investigate motor vehicle crashes. A case study will be presented showing the capabilities of UAVs to speed up on-scene investigations, allowing roadways to be cleared faster. A comparison of the data obtained by the UAV and by a total station will be presented. Providing Education For The Industry “Each year, our mission is to provide attendees with the knowledge, strategies and tactics they need to fight emerging threats, straight from industry experts who are experiencing the same security concerns,” said Will Wise, group vice president of the ISC security portfolio at Reed Exhibitions. “This year is no exception; we’re providing education covering everything from access and ID management to connected security to video surveillance to unmanned systems to IoT and AI, and more. We’re looking forward to continuing to provide that expert-level thought leadership we’re known for and to help cross-functional teams learn and collaborate.”
Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users. Find Out More About: Access control new opportunities Main objections to access control systems Is your system as secure as you think? Ineffective access control policies Why upgrading can benefit enterprises Conclusion
Time and attendance has proven to be a successful use of biometric technology traditionally used for controlling access to highly sensitive areas Security technology is increasingly being used to help organizations tackle challenges going far beyond controlling access to office buildings and monitoring parking lot activity. Video, in particular, has become the darling of many markets. Retailers use live and recorded video to assess promotional sales efforts. Manufacturers confirm employees are following mandated safety regulations. Transit officials debunk false liability claims with a review of recorded mobile video. But here’s a relatively new one – biometrics. Long thought perfect for controlling access to highly sensitive public and private research and military facilities, they are showing up in offices, hotels — even in remote fruit fields and sugar processing plants — for employee time and attendance. It’s proven to be a successful use of the broad technology. Risks Of Mechanical And Electronic Clocks The process of keeping track of employees’ hours has long been open to fraud and other issues. Mechanical time clocks — in use since the 1800s — and even more modern electronic clocks using magnetic stripe or proximity cards are open to a process known as ‘buddy punching.’ That’s a scheme in which an employee clocks in and/or out for a friend who may be late or not even at work. Mechanical systems are also slow, potentially leading to long queues during shift changes resulting in wasted time and lost productivity. Mechanical cards also need to be keystroked into the payroll system, requiring significant back office time for data entry. Electronic cards can be shared. They may also be lost or stolen, costing additional time and money in back office expense. Even small errors in collecting and processing employee time and attendance can add substantially to the cost of payroll, already a major expense for any organization. Studies by a leading international human resources consulting firm have shown even small payroll errors and fraud can boost operating costs by up to 10 percent. Biometric Time And Attendance Solution But fraud, delays and lost credentials can be largely eliminated by a biometric solution. Common biometric systems involve hand or fingerprint readers, facial identification or iris recognition. Each technology records and then compares physical characteristics unique to every individual. However, changes in weight, hairstyle, finger or hand size, cuts or even the effects of manual labor can trigger the need for re-enrollment – in all except iris-based solutions. Fraud, delays and lost credentials can be largely eliminated by a biometric solution Iris Recognition Advantages The structural formation of the human iris (the visible coloured ring around the pupil), is fixed from the first year of life and remains constant. And few people can’t use the technology, as most individuals have at least one eye. Even blind people have successfully used iris recognition. At employee enrollment, iris systems utilize an industry-standard camera to capture an image of the iris. Software converts that to a small template stored in a terminal database. Authentication requires employees to stand roughly 18 inches from an iris reader and the process takes about two seconds. With multiple readers installed, long lines are eliminated. Also eliminated is fraud. Since every user’s iris is unique and required to be present at the reader, time fraud schemes are virtually impossible. The system can also prevent another type of back-office time fraud known as “ghost employees” – non-existent people added to the payroll. Security is also enhanced. The digital templates can’t be used to produce any sort of visual image, affording a high-level of defense against employee identity theft. An iris recognition system can also grant facility access as employee’s clock in for work. Iris Recognition Case Study Here’s an example of how an iris recognition system has benefitted a major Turkish fruit and vegetable grower and one of Europe’s largest providers of juice. The nature of the local work force created a major time-and-attendance challenge. "Fingerprint and facial recognition systems were tried briefly. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear" New labourers arrive daily seeking work. Once hired, they might work a few days and then leave before returning a week later. Unreliable schedules made standard time cards virtually impossible to manage. The company’s security integrator suggested smart cards as an option. But that wasn’t much of an improvement as authorizing, printing, distributing and tracking cards for thousands of on-and-off workers continued the human resources nightmare. Also, improper use of the cards threatened to cut into the company’s profits. Both fingerprint and facial recognition systems were tried briefly. The constant cuts and scars workers get from the manual labor impaired the accuracy of readers. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear. Daily payroll reports are transmitted to the company’s Istanbul headquarters using wide area networks in the fields and satellite communication. Software links the received data to a payroll module which automatically calculates employee hours and produces paychecks. The system currently has more than 10,000 enrolled workers. More are being added on an almost daily basis. Once a worker is in the system, it doesn’t matter how often he may leave. When he returns, the iris system immediately recognizes him. Also, the contactless iris-based technology inhibits the transfer of virus or bacteria as there is no direct employee contact with the biometric readers. If these systems can work in remote areas of Turkey, they can certainly work in downtown Boston. And they do. There, a boutique hotel uses iris-based identity authentication to keep the hours of its employees. The same system also allows VIP guests to enter their suites without a key card. Reductions In Cost Recent reductions in both product and deployment costs have made using biometrics, including iris recognition, a practical time and attendance investment for organizations of almost any size and in any location. Of course, biometrics still remains the go-to choice for protecting sensitive locations and international borders, as well as national identity and voter registration programmes.
Part 4 of our Security in Healthcare series Secure visitor management integrated with physical access control systems (PACS) is increasingly popular Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. For instance, one children’s hospital recently chose HID Global’s EasyLobby Secure Visitor Management solution to streamline screening/badging using driver’s licenses or other government-issued IDs. Integration with hospital databases enables benefits like accessing real-time patient feeds using Health Level-7 (HL7) standards. All visitor information Is seamlessly passed to the hospital’s access control system to optimize efficiency at nine stations badging more than 160,000 visitors annually. The example shows what technology can do in the area of visitor management. Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or “after hours” An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during “after hours” periods, according to HID Global. Systems should support real-time patient feeds using HL7 integration, which ensures that no visitor is sent to the wrong location or to see a patient who is no longer checked in. Systems should also pre-register approved vendors and temporary employees through Status Blue integration, and support integration with access control systems for the most efficient badging. Barriers To Visitor Management "Due to financial limitations, many hospitals are trying to make do with older desktop technology, and have not been able to benefit from some of the newer efficient options, such as mobile tablet-based visitor management, "says Paul Terschuren, CEO, STOPware Inc. "And, some hospitals have the mistaken belief that the multiple entrances and complexity of a modern hospital facility pose a barrier to implement visitor management, or that managing visitors more closely will create an unwelcoming culture or environment," says Terschuren. "As a result, some hospitals only implement visitor management after hours, when the number of entrances and visitors is reduced." "However, neither of these ideas should be barriers", says Terschuren –" visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software. And, many hospitals have found that visible security improvements, when they are not overly burdensome, actually improve the feeling of safety and security with patients, visitors and families alike. Some hospitals with limited implementations are already realising this and changing their plans to implement systems hospital-wide." Visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software STOPware PassagePoint Visitor Registration STOPware specializes in visitor management, a critical element in physical security for hospitals and healthcare facilities. STOPware’s flagship software product, PassagePoint, provides visitor registration and pre-registration, visit approvals, identity confirmation, visit logging, and integration with access systems. STOPware also provides related hardware including self-registration kiosk, mobile registration tablets, credential scanners, and badge printers. As announced in March, PassagePoint software now integrates with HL7 to allow real-time patient location tracking for hospitals and healthcare facilities, as well as integration with more than 20 access control systems to help make the healthcare environment more secure. STOPware takes Health Insurance Portability and Accountability Act (HIPAA) and all privacy regulations very seriously. The PassagePoint HL7 module only uses patient location data, and functions as a “listener;” that is, the data used by the module is not “stored” in PassagePoint. The HL7 integration only makes use of patient location data and does not collect or use any diagnosis information. PassagePoint is also designed to protect visitors’ Personal Identifiable Information – either by not capturing certain data or by encrypting information that is stored. By treating sensitive information of both patients and visitors in this way, STOPware Visitor Management system is designed to help healthcare facilities protect privacy in alignment with the letter and the spirit of their required regulations. Pre-booking And Advance Approval Tighter control of visitor and contractor management in non-public areas through pre-booking and advance approval are developing areas, says Dave Ella, Vice President of Product Marketing, AMAG Technology. AMAG has developed a new visitor management solution called Symmetry GUEST that allows visitors to be vetted to provide a safer and more secure environment for patients and staff, as well as the use of smartphones as identification and access credentials. "Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation" Staff training and turnaround processes are an often-overlooked element of a security plan in general, and a Visitor Management plan in particular, says Terschuren of STOPware. “It is well and good to put guards and checkpoints in place, but what should those guards do when they find someone that should be denied entry? Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation while minimizing the chances of negative impact on the facility. “ STOPware expects that remote reception desk management, which makes use of an operator from another location and/or country who can greet and process visitors efficiently, will continue to grow and improve. Integration of Visitor Management systems with access control and other security-related systems provides for safety and an audit trail in such implementations. “We are also seeing a groundswell of interest in Mobile Visitor Registration and Kiosk Self-Registration and Sign-ins,” says Terschuren. “These systems increase efficiency, empower visitors, and provide for a better visit experience that many facilities find compelling.” Combining Identity Verification And Visitor Management “We are also seeing the growing importance of identity verification; and, in particular, the use of biometric methods to verify identity, ranging from fingerprints and facial recognition all the way to higher security iris readers,” Terschuren adds. “Identity verification can tie in with Visitor Management, both in terms of identifying visitors, but also in terms of verifying the authority of hosts and approvers, to improve the security of sensitive areas and facilities in general.” One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Catch up on Part 3 of our Security in Healthcare series here
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrolls in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organizations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric High-Throughput System The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility Entry Control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless Iris Authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
Kredi Kayıt Bürosu (KKB) was founded by the then nine leading banks of Turkey on 11th April, 1995. KKB is a highly regarded financial institution in turkey and has a total of 156 members. The KKB Anadolu Data Center is located in the capital city of Ankara across 43,000 square meters of land, consists of three main sections. The facility is equipped with protection systems against lightning and earthquake. Center authorities to provide the supervisors with an additional option of authentication through RFID cards Need Of Cost Effective Solution The data center has cabinet system in place while access to data racks require biometric authentication. The center is equipped with numerous data racks for which they required a display device at the entrance. Each rack was locked with physical locks as a result of which the center required a cost effective solution that did not include a device for each rack. Moreover, they required devices that supported both smart card authentication as well as door locks. The center authorities were looking forward to provide the supervisors with an additional option of authentication through RFID cards. With respect to gaining access, they wanted a solution that would grant access through two steps, biometric authentication and physically opening the locking system. Finally, the center wanted a solution that could alert them in case of situations such as a door being left open. Data Center Solution Matrix, in association with SouthCo, provided the KKB Anadolu Data Center with the following solution. The data center required a display device at the entrance, integrated with the biometric device installed by Matrix. So, we integrated our Data Center solution with a touch screen display. Whenever any user tried to access the data center with their biometric credentials, the touch screen would display a list of racks the respective user is authorized to access. From the display, the user would be allowed to choose the racks he/she would like to access. Once the user is granted access into the chosen racks, they will be allowed to access the same for a pre-defined period of time. COSEC ARC provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps Gather Customized Reports User based access makes ensures security of sensitive company data. We also installed 200 COSEC ARCs, at the entry/exit of racks between 400 SouthCo locks, one between two door locks, making it a cost-effective solution for the center. Additionally, the COSEC ARC also provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps such as an open door, a door forced open, door being left open, etc. The personnel can also gather customized reports on events like who, when and which rack was accessed. Results Maintenance of Diverse Data Foolproof Security with Biometric User-wise Rack Access Accurate Records of Who Accessed Data Center at What Time
JK Tyre & Industries Ltd. have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to Time-Attendance and Visitor Management. Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees Matrix Time-Attendance Solution Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage Time-Attendance of over 500+ workers. Moreover, we provided Employee Self Service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so we delivered Visitor Management software, which helped them create a visitor pass, fetch visitor records and generate reports of the same. 40% Increase in Productivity of Employees and Workers Results Reduction in Cumbersome HR tasks Automatic Maintenance of Visitor Records on Day-to-Day basis 40% Increase in Productivity of Employees and Workers The Products COSEC VEGA FAX - Fingerprint and Card based Door Controller with Touchscreen, IP65, Wi-Fi and 3G/4G Connectivity Option COSEC PATH RDFM - Fingerprint and Card based Exit Reader with IP65 COSEC CENTRA ME - Application Server Platform with 500 Users and Expandable up to 1,000 Users for Basic Access Control and Raw Event Data COSEC ME TAM - Time-Attendance Software Module for COSEC CENTRA ME Users COSEC ME ESS - Employee Self Service Software Module for COSEC CENTRA ME Users COSEC ME VMM - Visitor Management Software Module for COSEC CENTRA ME Users
JCB Co. Ltd, the only international payments brand based in Japan, will conduct a pilot trial of its latest JCB Biometrics Card with fingerprint authentication. JCB's contactless's payment solution is provided by IDEMIA, a global augmented identity solution provider. Toppan Printing will also take part in the demonstration trial in respect of card personalization. Users first record one or more fingerprints for authentication purposes. When they want to buy something, they need only touch the fingerprint sensor on the card's lower right corner with their finger so as to authenticate payment. The fingerprint record is only kept in the card and given that fingerprint authentication is also done on the card, merchants do not need any further equipment to accept payment. The purpose of the pilot is to validate whether the solution is convenient for consumers and practical for the payment Secure Customer Experiences While currently most contact chip cards rely on users entering a PIN number for authentication, this will be replaced by the fingerprint authentication. With the new JCB Biometrics Card strict security is upheld with fingerprint authentication for any payment method, while maintaining efficiency and speed. The pilot trial first involves issuing the JCB Biometric Card to JCB employees from April. Once card users have recorded their fingerprints using a smartphone or tablet app, they can make purchases via fingerprint authentication at merchants accepting JCB Contactless payments. The purpose of the pilot is to validate whether the solution is convenient for consumers and practical for the payment. JCB will continue to explore and develop various authentication solutions in order to provide consumers with reliable and secure customer experiences.
HID Global, a global provider of trusted identity solutions, is driving biometrics adoption throughout Latin America, and especially in Mexico, ahead of the October 2018 deadline set by the country’s National Banking and Security Commission (CNBV) to deploy fingerprint identification technology across financial institutions. “Banks, government services agencies and commercial entities in Latin America have embraced our biometrics solutions over the past decade because of their speed, accuracy, reliability and fraud-fighting capabilities,” said Greg Sarrail, Vice President of Global Sales, Extended Access Technologies, Biometrics with HID Global. “Now we are helping to extend these benefits across Mexico’s banking infrastructure as part of a major initiative to curb identity theft.” HID’s multispectral fingerprint devices have helped eliminate fraud in Mexico’s national vaccination program and other healthcare initiatives Enhancing The Security Of ATMs HID Global’s Lumidigm biometrics sensors with multispectral imaging technology are currently used in Latin America’s retail banks, financial institutions and government agencies to create a more convenient customer experience while increasing the security of ATM and other transactions. More than 115,000 multispectral fingerprint sensors are deployed in Brazil to protect billions of ATM transactions per year, with nearly 80 percent of the nation’s ATMs used by over 85 million banking customers. Financial institutions in Chile and Argentina have embraced HID’s technology to secure pension payments for over one million elderly citizens. HID’s multispectral fingerprint devices have helped eliminate fraud in Mexico’s national vaccination program and other healthcare initiatives that provide millions of underprivileged citizens with subsidies for medicine and medical care. Most Reliable Fingerprint Capture Technology The company’s biometrics sensors are also used extensively in commercial applications in Mexico, including verifying identity for more than 70,000 members of a large fitness club franchise. Now, the same technology is poised to improve banking security and convenience in Mexico as the CNVB gets closer to the October 2018 deadline for financial institutions to verify their customers’ identity using fingerprint biometrics when creating accounts, applying for loans and conducting other transactions. HID’s patented multispectral fingerprint imaging technology captures unique characteristics from both the surface and subsurface of the skin HID’s patented multispectral fingerprint imaging technology captures unique characteristics from both the surface and subsurface of the skin, providing the most reliable fingerprint capture technology available. Multispectral fingerprinting works for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions--from dirt and grease to sunlight to wet or cold conditions. Liveness Detection Capabilities To Eliminate Fraud HID Global’s Lumidigm biometrics solutions also feature field-updatable ‘liveness detection’ capabilities that help eliminate fraud by preventing the use of fake fingerprints or ‘spoof’ attacks. The devices use a top-ranked NIST certified MINEX III minutia algorithm for proven interoperability with industry-standard fingerprint template databases. HID will be demonstrating its biometrics solutions at Expo Seguridad Mexico from April 24-26 in Stand #3131 at the Centro CitiBanamex in Mexico City.
Boon Edam Inc., a manufacturer of security entrances and architectural revolving doors, has announced that Georgia Southern University’s state-of-the-art Recreation Activity Center (RAC) has deployed an integrated pedestrian access solution so only members can access the facility. A Boon Edam Trilock 60 tripod turnstile is integrated with Iris ID IrisAccess solution to enable swift user verification and access with a minimum of effort for students, faculty and staff. Center Of Campus Life The RAC at Georgia Southern serves as the center of campus life, welcoming over 5,000 students each day. Originally opened in 1998 with 80,000 square feet, the facility was expanded in 2006 to its present size of 215,000 square feet. The expansion achieved LEED certification, the first building to do so at Georgia Southern, which reflected the university’s culture of sustainability. Among the many amenities at the RAC are an aquatics center with a 25-meter swimming pool, eight indoor basketball courts, group fitness studios, a rock climbing wall and an 18,000 square foot fitness center.When students used the iris scanners in the dining halls, it took no more than 2 seconds to process their entry. Iris Recognition-Based Access Control The newly renovated RAC deployed Boon Edam waist-high turnstiles and gates as a means to control access for the increased number of visitors each day under staff supervision. In 2006, the turnstiles were paired with fingerprint scanning technology to confirm the identity of each member. But in 2014, when the Iris ID IrisAccess solution was paired with tripod turnstiles at two dining centers on campus, the RAC facility managers decided to investigate integrating an eye scanner with their current access control software. “With each passing year, the size of the database would grow, leading to an increase in the time it would take to verify each member. The process slowed, taking five to 12 seconds to grant access, causing unwanted delays for our users,” said Jason Schmidt, facility coordinator at the RAC. “When students used the iris scanners in the dining halls, it took no more than 2 seconds to process their entry. Once we realized that Iris ID was the superior method for access control, we decided to upgrade our system to better meet the needs of our members.”Once students purchase a membership and are entered into our database, the system grants them seamless access to the facility" Trilock Side Gate-Controlled Egress Currently, as members enter the RAC in the main lobby, they can choose from two different access points. They can scan their iris at the iCAM7000S Series mounted on the turnstile, or swipe their ID at the main desk and proceed through a gate. Boon Edam Trilock Side Gates are used on the other side of the main desk for dedicated egress. “The arrangement of a turnstile paired with the iris scanner technology is extremely fast and we’re encouraging our members to use it,” said Schmidt. “Once they purchase a membership and are entered into our database, the system grants them access to the facility and it is pretty seamless.” The RAC is planning to renovate in the near future to have a total of 4 turnstiles integrated with the Iris ID IrisAccess solution. Toward Multiple Entrance Lanes “The Iris ID and Boon Edam partnership goes back to early 2000 when the two technologies were integrated at Schipol airport in Amsterdam,” said Mohammed Murad, vice president for Iris ID. “We’re very excited to continue delivering integrated technology solutions to our customers.” “We are always concerned with who is coming in and prefer to have as many turnstiles as possible to automate the process and reduce the burden on our staff. Everyone who is registered for the iris scanner likes it; we’re looking forward to the next stage when we can have multiple entrance lanes, bringing everything up to speed,” concludes Schmidt.