Signature verification
HID, a worldwide pioneer in trusted identity solutions, announces its 2024 State of the Security Industry Report, which gathered responses from 2,600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organization sizes representing over 11 industries. The 2024 State of Security Report delves into the underlying concerns driving upcoming innovations and the technologies underpinning them, helping security pioneers proactively adapt to evolving challen...
In a groundbreaking collaboration, Partisia Blockchain and the University of Applied Sciences and Arts Western Switzerland (HES-SO Valais-Wallis) are poised to transform the management of digital identities for Swiss citizens. This partnership aims to develop a decentralized electronic identity system in harmony with the Swiss Federal Council’s unwavering commitment to data privacy and security. Redefining digital identity management This collaboration marks a significant leap toward re...
Transmit Security, a pioneering provider of customer identity and access management (CIAM) SaaS solutions, announces the appointment of Chris Curcio as Senior Director of Strategic Alliances and Partners for North America and Kaltrina Ademi as Director for Channel and Alliances in EMEA. Prior roles of Curcio Curcio has over 25 years of experience in various positions within the IT industry and joins Transmit after almost four years as GSI Alliances Director at Forgerock during w...
Identity and Access Management (IAM) specialist - ProofID has announced that it has acquired Identity Governance and Administration (IGA) integrator, Regatta Solutions Group. The acquisition unites the competencies of both organizations as integrators of Ping Identity and SailPoint solutions respectively while positioning the company as a provider of enterprise identity solutions and global identity managed services. The combined business is projected to generate more than $32 million in revenu...
Vector Flow, the industry pioneer, and innovator of AI and data-driven physical security solutions, is demonstrating its powerful range of automation solutions at GSX 2023, September 11-13 in Dallas. PIAM automation product Most notably, Vector Flow is highlighting its Physical Identity Access Management (PIAM) automation product wherein organizations can autonomously manage individual identities over the entirety of their lifecycle under one platform. “With Vector Flow's PIAM appl...
Netwrix, a cybersecurity vendor that makes data security easy revealed additional findings for the education sector from its survey of 1,610 IT and security professionals from more than 100 countries. According to the survey, 69% of organizations in the education sector suffered a cyberattack within the last 12 months. Phishing, account compromise Phishing and user account compromise were the most common attack paths for these organizations, while phishing and malware (such as ransomwar...
News
Vector Flow, the digital transformation pioneer offering the next-generation AI-enabled physical security automation platform, is proud to announce the release of its suite of Aviation Identity Management solutions designed to enhance security and operational efficiency for airlines and airports. AI and ML-enabled platform The company’s AI and machine learning-enabled platform enables operators and their workers to collaborate to continuously ensure compliance and security. Each actor knows when and what they need to do, providing a platform for increasing security without increasing costs and burdens. Physical Security Automation Our suite of Physical Security Automation Solutions introduces a level of efficiency and sophistication" “At Vector Flow, we strongly believe that aviation security should not be compromised by cumbersome processes and outdated technology,” says Ajay Jain, Founder and CEO of Vector Flow. He adds, “Our suite of Physical Security Automation Solutions introduces a level of efficiency and sophistication unseen in legacy solutions, changing the way airports and airlines safeguard against insider threats and manage their staff.” Key benefits Key benefits offered by the Vector Flow Aviation Suite include: Rapid Deployment: Quick implementation and seamless integration with existing security infrastructure. Cloud and On-Premise. Perpetual Compliance: Designed around the security standards set forth by the aviation industry - 49 CFR Part 1542/1544 and beyond. Aviation Subject Matter Experts (SME): Dedicated SME team provides continuous support, personalized training, and expert guidance. Scalability: Highly adaptable and scalable to cater to the specific needs and size of any environment without compromising sustainability. Dashboard Driven: The platform’s easy-to-use, AI-infused interface boosts user satisfaction and reduces training time, benefiting all stakeholders. Vector Flow invites aviation security professionals to learn more about their modern solutions for the aviation sector at the upcoming AAAE Airport Credentialing & Access Control Conference2023, taking place from August 22-23, 2023, in San Diego, California, USA.
AMAG Technology, an Allied Universal CompanyⓇ, has hired Pascal De Zitter as the new Vice President of Security & Information Management Solutions (SIMS). This is a newly created role designed to develop, implement and lead a new, soon-to-be-established solutions delivery team. Customer value In this pivotal role, the VP of SIMS will generate new opportunities for both Symmetry CONNECT Identity Management and Symmetry Control Room solutions. This strategic step is in line with AMAG’s overarching goal to drive more opportunities for channel partners and transform how it conducts business. The goal is to deliver exceptional value to customers and solidify its position as an industry pioneer. Tailored Symmetry solutions By aligning the sales and solutions delivery teams, we aim to provide a seamless customer experience" “I am confident that our new VP of SIMS will strengthen AMAG Technology’s ability to communicate and deliver tailored Symmetry solutions that address the unique needs of our customers,” said AMAG Technology President, David Sullivan. “By aligning the sales and solutions delivery teams, we aim to provide a seamless customer experience and foster long-term partnerships.” New responsibilities De Zitter will manage AMAG’s Application Engineering team, which is responsible for pre-sales support. He will also provide key consultation on translating an organization’s overall business requirements into security system requirements. Work experience “I am excited to apply my Symmetry Control Room expertise and leadership skills and build a brand new team that will help transform AMAG’s business,” said AMAG Technology, VP of Security & Information Management Solutions, Pascal De Zitter. De Zitter transitioned to AMAG Technology from G4S, where he was a Solution Manager and Integration Manager for over 11 years. Before G4S, he held managerial roles at Stanley Security and GE Security.
Innovative FinTech startup, Mia-FinTech, has partnered with the passwordless authentication platform, Futurae, to give their customers access to advanced authentication and authorization services for digital identity management. Addressing login errors Login errors account for over 50% of helpdesk tickets in the banking and financial services sector. Futurae addresses these challenges by offering a range of authentication options that comply with regulatory standards, streamlining the onboarding process and reducing user friction and operational costs. Safeguarding data Mia-FinTech and Futurae ensure customers benefit from the highest level of security and trust By partnering with Futurae, Mia-FinTech aims to streamline how companies authenticate transactions and safeguard sensitive data. By combining their expertise and technology, Mia-FinTech and Futurae ensure customers benefit from the highest level of security and trust in their digital transactions. Multi-factor authentication Bruno Natoli, CEO at Mia-FinTech, said, “Partnering with Futurae will enable our customers to access their robust multi-factor authentication and transaction confirmation capabilities." Bruno Natoli adds, "Moving forward, Mia-FinTech can provide unparalleled protection against unauthorized access and fraudulent activities and empower our clients to confidently authenticate their transactions, mitigate risk, and strengthen their overall digital identity security posture.” Identification Manager The partnership follows the launch of Mia-FinTech’s Identification Manager, an end-to-end solution that allows users to create, manage and customize the identification process. The application simplifies integrating a digital identification system into existing digital infrastructures. It offers an improved customer experience and seamlessly shares data, increasing onboarding conversion rates and reducing operating costs. Passwordless authentication platform At Futurae, we understand the critical need for robust authentication solutions to protect businesses" Sandra Tobler, CEO at Futurae, said, “Cybersecurity threats are rapidly evolving. At Futurae, we understand the critical need for robust authentication solutions to protect businesses and their customers." Sandra Tobler adds, "Through our partnership with Mia-FinTech, we’re excited to bring our passwordless authentication platform to the fintech ecosystem, enabling companies to establish secure and trustworthy relationships with their users. Together, we’ll ensure customers can engage in digital transactions with utmost confidence and peace of mind.” Futurae Futurae is an authentication platform for businesses of all sizes, protecting customers’ data, reducing risk and fraud, and providing an exceptional user experience, empowering companies to build trust and provide a friction-free login experience. Futurae’s Digital Identity Authentication Platform is available via the Mia-FinTech Partner Ecosystem.
Identity One announced the successful testing of their joint solution with Convergint Federal for a North Carolina military facility. The military facility expressed a need to register Common Access Cards (CAC) into an air-gapped AMAG physical access control system (PACS). Convergint’s integrated solution employs Identity One’s FIPSlink software to ensure the facility’s ability to become fully FICAM compliant when requirements change. Government compliance and regulations “Convergint Federal has extensive experience in adhering to government compliance and regulations including high-security specifications, and life safety, physical security, and cybersecurity standards and we’re excited to work alongside the Identity One team that has deep expertise in the industry,” said Shane Hamilton, Program Manager, Convergint. Shane Hamilton adds, “Our commitment to meeting and exceeding government standards is complemented by our drive to be our customers’ best service provider, and we’re proud to collaborate with a team that prioritizes the same mission.” Programmatic and project management tools Convergint Federal’s innovative, scalable solutions ensure consistent risk management Focused on compliant, innovative security solutions for the federal government and military installations, Convergint Federal is a wholly-owned subsidiary of Convergint, a global pioneer in service-based systems integration. Convergint Federal offers a suite of programmatic and project management tools to facilitate system optimization at federal and military installations worldwide. With a deep understanding of regulatory compliance requirements, procurement, and the complexities of the federal government, Convergint Federal’s innovative, scalable solutions ensure consistent risk management. FIPS 201-3 compliance “Identity One understands the unique needs of federal government customers implementing smart cards based on FIPS 201-3,” said David Smith, CEO of Identity One. David Smith adds, “We are excited to collaborate with Convergint Federal to make this deployment possible, as their extensive experience in this market establishes them as a trusted partner in government security. Our joint integration will safeguard facility personnel and ensures total FIPS 201-3 compliance for years to come.” Integrated physical access and identity management Using FIPSlink from Identity One, the Convergint Solution enables the AMAG PACS the opportunity to validate, authenticate and register a PIV, PIV-I, and/or CAC, in addition to providing one, two or three-factor authentication by verifying the credential’s digital certificates and matching a live biometric against the templates stored on the card. With Identity One’s contribution, the Convergint Federal solution delivered a reliable, flexible, and integrated physical access control and identity management system.
Vector Flow, the digital transformation pioneer in physical security automation, is proud to announce a new partnership with Nedap, a Dutch multinational technology company responsible for the development of powerful physical security solutions. This partnership sees the Vector Flow platform seamlessly integrate with Nedap’s AEOS physical access control system to simplify physical access and identity management (PIAM) and deliver an outstanding user experience. Bridging security gaps “The integration between Vector Flow and Nedap allows enterprises of all sizes to bridge security gaps in provisioning physical access, SOC operations and to automate many of the time-consuming and cost-inefficient tasks traditionally associated with physical access provisioning and physical Identity Lifecycle Management,” says Ajay Jain, Founder, and CEO of Vector Flow. He adds, “By taking pressure off of Security, HR, and IT departments, enterprises are afforded higher levels of both efficiency and security.” AI-PIAM integration Vector Flow integrates with Nedap to efficiently manage personnel and their physical access privileges Vector Flow integrates with Nedap to efficiently manage personnel and their physical access privileges, leveraging Vector Flow’s Artificial Intelligence to automate associated PIAM processes. For example, when a new hire onboards or changes to an identity are made, Vector Flow automatically adjusts and provisions their access within the AEOS system. Streamline identity, physical access management As a result, enterprise users are provided with a single source of truth for all identity provisioning requests beginning with provisioning access on day one. This joint solution delivers streamlined management of identities and their physical access in AEOS while automating policies for synchronized on/off-boarding, enforcement and monitoring of access compliance controls, training prerequisites, background checks, reporting on historical data, and more through plug-and-play integration with the Vector Flow platform. Partnership benefits The new partnership allows enterprise security teams to: Streamline on/off-boarding experience for employees by automating the entire journey for all facilities and personnel types (employees, contractors, vendors, tenants, third parties, and visitors). Replace multiple checklists with one playbook that automates personnel lifecycle management, physical access, and provisioning as well as approvals, facilities fulfillment, and access reconciliation. Offer powerful, real-time self-service controls for physical access, approvals, and audit/compliance reports. This allows employees/contractors to request real-time access to owned, leased, or standalone facilities. Automate access decisions based on compliance prerequisites such as completion of a background check, training or certifications, service tickets, insurance, purchase orders, etc. that personnel must maintain to gain access to secure areas. Provide on-demand mustering of employees, contractors, vendors, and visitors across an enterprise and its associated facilities. Ensure the readiness of physical security devices by monitoring and optimizing them to eliminate false alarms. Detection and elimination of nuisance alarms. The integration of Vector Flow and Nedap is effective and can be applied to all Vector Flow users using the Vector Flow platform v.3 or higher running in cloud or on-prem. In addition to that, both companies are in the process of finalizing the integration of the Visitor Identity Management (VMS) suite.
Neurotechnology, a provider of deep learning-based solutions and high-precision biometric identification technologies announced the expansion of the MegaMatcher product line with the release of the MegaMatcher Identity Management System (IDMS). The new end-user-focused system is capable of handling a variety of different tasks from identity registry formation to comprehensive administration for both civil and criminal applications. Benefits “By introducing our cutting-edge MegaMatcher IDMS we are greatly expanding the capabilities of our products ecosystem in the identity management domain,” said Irmantas Naujikas, Director for Neurotechnology. “Our solution will provide even more benefits in different ID projects.” Features The MegaMatcher IDMS is capable of handling the most common identity lifecycle procedures, including registration, updates, status changes, history tracking, and other relevant activities, ensuring that the information is up-to-date and presented intuitively. The system stands out from other solutions as a unified package presenting a complete set of features from the MegaMatcher product line: An intuitive identity registration wizard with a step-by-step registration process ensures that all necessary information is captured accurately. Personalized biographic data collection offers flexibility and adaptability by allowing users to provide tailored biographical information to meet the unique needs of the organization or project. Multimodal biometric support allows capturing of fingerprints, ICAO-compliant facial photos, palmprints, and iris images, ensuring that the biometric data is of high quality and reliability. Identity validation ensures the quality, accuracy, and integrity of biometric and biographic data. It helps to prevent anomalous records and fraud attempts through liveness detection as well as age and quality assessment. Consolidation of identity data from different sources enables the creation of a single identity registry that can be used for various purposes. Registry clean-up eliminates duplicates and fraudulent records, which helps to maintain the integrity of the identity registry. Summarized statistics and reports provide transparency and enable various data analyses, helping to understand the distribution of identity data and enabling informed decisions about identity management system improvements. A high level of security is ensured by using encryption on each identity record. During the data consolidation, the system performs integrity checks to ensure records were not compromised. Flexible deployment ensures that the system can be used on a variety of hardware and software configurations as well as operate both online and offline, making it highly flexible and adaptable to different environments. Applications As a central part of identity management ecosystems, the MegaMatcher IDMS can be applied in the majority of civil and criminal application scenarios, for example: National identity registry: Create a centralized database of citizen information to facilitate identification, governance, and the delivery of government services. Voter management system: Ensure the integrity of elections by registering applicants, eliminating fraudulent records, and building a reliable identity registry. Refugee registration: Provide accurate and efficient identity management of refugees to improve assistance. Border control: Streamline immigration processes and secure national borders. Law enforcement: Maintain criminal records, quickly identify suspects, and streamline investigations. Financial services: Provide reliable identity registration and management for financial institutions. MegaMatcher ABIS and IDRS The new MegaMatcher IDMS system unifies other Neurotechnology solutions, including MegaMatcher ABIS and the MegaMatcher Identity Registration System (IDRS). All MegaMatcher solutions can be acquired directly from Neurotechnology or via the distributors’ network.
Expert commentary
Identity management is an important element of both data security and physical security in an organization. But all ID management solutions are not the same—especially when it comes to security. There are no uniform security standards for the industry, and many off-the-shelf systems fall short when it comes to data protection. To protect people, property, and data, make sure you select a system that maximizes security at every stage. What is identity management? Identity management—also known as ID Management (IdM) or Identity and Access Management (AIM)—is a framework for managing digital identities and controlling who has access to what. It includes both policies laying out what types of access different people should have and technologies for enabling and enforcing those access controls. An identity management system makes it easy for IT to define access levels for individuals or groups within the organization. Each user is assigned a unique identity within the system with specific user rights and restrictions These systems enable companies to increase security and productivity while reducing the costs and labor associated with security efforts. At the lowest level, identity management involves defining what a user is allowed to do on a network, with what devices, and under what circumstances. Each user is assigned a unique identity within the system with specific user rights and restrictions. Specific business system For example, what files, business systems, and programs is the user allowed to access? What are they allowed to do within a specific business system? What physical locations and resources are they allowed to access, and at what times? Access rights and restrictions may be role-based or individualized. An IdM system may provide the backend for a Single Sign-on (SSO) system that controls access to everything on the network with one user identification key. Many security products focus on mobile device management (MDM) systems that control access of devices to the corporate network. As more workers shift to remote and hybrid models, managing what devices are authorized to connect to the network, how users are authenticated when they log on to the device, the activities that can be performed by these devices while on the network, and the data and applications they have access to while offline is essential. Meeting the security challenge Ultimately, the ID management system is only as secure as the access system it connects to In an IdM solution, the user administration system that provisions the roles and rights within the system is linked to an access system that verifies the identity of the user. Ultimately, the ID management system is only as secure as the access system it connects to. Access systems include input screens for passwords or PINs, biometric input systems (such as fingerprint or facial recognition), or readers that connect to identification media (such as an ID badge or smartphone) via Radio-Frequency Identification (RFID), Bluetooth® Low Energy (BLE), or Near-Field Communication (NFC). Some systems may require multifactor identification. RFID and smartphone-enabled BLE and NFC access systems are highly popular for their combination of security, reliability, user convenience, and ease of administration. While there are many access systems available, there are no uniform standards for security—and many standard systems are not very secure. User administration system When evaluating security for an IdM and access system, there are two important aspects to consider. Data storage: How is data stored in the IdM system and on the local reader or input device? Are user identities, rights, and activity logs stored in an unencrypted table on a single server or device? Is a blockchain system used for data storage? Or something in between? Data transmission: How is data transmitted between the access system and the user administration system? Is data transmitted in encrypted form? Is the Advanced Encryption Standard (AES) used? Security starts with the creation of the user ID and identification medium Security starts with the creation of the user ID and identification medium. To protect business data and systems, organizations should look for an IdM solution that uses industry best practices for encrypted data storage and transmission. If using ID badges—as a majority of organizations still do—they also need to consider how and where those badges are produced. Industry best practices For example, our partner evolutionID offers a secure ID-Management system with extended security functions. In-house badge production enhances security by eliminating the need to send sensitive, personalized data to a third-party badge printer. It also streamlines the badge production process, so employees can get their badges right away without waiting. With the creation of the identification medium, individual security features such as biometric properties, user ID, and permissions can be programmed directly onto the transponder card using an RFID reader or distributed to relevant systems by interfaces. This system maximizes security and gives organizations the tools they need to customize their security concept for their needs. On top, cost-saving self-service features such as image acquisition or badge management are available for every employee on any device.
Security beat
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organizations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customized questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Newer facial recognition systems are scalable and provide more accurate results, and the end-user selects the parameters of system performance to suit their own application needs. “We have developed algorithms that can be optimized in various compute environments, whether in a small chip inside an edge device or on a large server device,” says Ido Amidi, Oosto’s Vice President of Products and Business Development. “It all depends on client needs. We can do it all without giving up performance. There is no significant loss in performance across various platforms.” The system’s “containerized environment” operates efficiently in a customer’s IT architecture. Facial recognition implementation Oosto, formerly AnyVision, was founded in 2016 based on deep learning research into facial recognition. The focus has been on how to use face recognition to identify people in real-world scenarios. Products began coming to market in 2017, targeting verticals that involve a need to identify “bad actors” or very important people (VIPs). The implementation of the technology involves the software operating in an on-premise appliance or server The most common implementation of the technology currently involves the software operating in an on-premise appliance or server, with inputs coming from cameras at the edge and outputs going to a network video recorder or access control system. As concepts of the Internet of Things (IoT) trickle down into the security marketplace, edge-based deployments will become more common, supplying real-time actionable information, and avoiding a flood of unstructured video data. Ethical recognition Oosto helps users deploy, set up, and calibrate the system; then, it is managed by the customer based on their needs. Privacy features are built into the system, part of the company’s commitment to “ethical” facial recognition. The technology, in general, has changed a lot since early implementations a decade or so ago failed to perform as promised. Expanded capabilities are fueled by developments in deep learning. Privacy features Facial recognition can help end-users identify people of interest but is specifically designed not to violate anyone’s privacy. There are no databases or watch lists involved; the user typically compiles their selection of “bad actors” against which facial recognition algorithms can be compared. While Oosto provides a valuable tool, the end-user customer decides how to deploy that tool in their business, says Amidi. Oosto's “liveness detection” deploys algorithms to analyze images from video and/or 3-D cameras Liveness detection Recently, Oosto has adapted the approach to provide access control; too, including “liveness detection” that deploys algorithms to analyze images from video and/or 3-D cameras to ensure a presented face is not a printed image or mask. Their latest software release is a single platform aimed at recognizing and providing insights into how people behave in physical spaces. New functionality includes the ability to detect unknown individuals entering restricted areas. Neural net algorithm Improved facial recognition functions well even for those wearing masks. A new neural net algorithm improves accuracy when identifying those wearing masks and the system can alert if a person is not wearing a mask (to aid compliance). Expanded video forensics features, designed to expedite investigations, include an ability to do in-depth searches on captured video related to body attributes, the color of clothing, etc. Recognition algorithms How well can Oosto recognize a face among 20 different people on a casino floor? It all depends on variables, such as the number of people, lighting, and angle of view, image quality, and even networking issues. Recognition algorithms are “trained” using data collected from real-world use cases; training takes place in the lab environment. The system can adapt to various lighting conditions, such as in a glass-enclosed lobby in the morning versus in the afternoon. As people enter an area, they may be looking down at their smartphones, for instance, which would mean some of their faces would not be in view. Such variables impact accuracy. Test requirements of a system apply to each specific customer and can be adjusted and tweaked as needed Customizable system Each customer must decide their parameters regarding how to best use the system, with the fewest acceptable number of false alerts, in real-time, and using existing infrastructure. Test requirements of a system apply to each specific customer and the system’s sensitivity and other operational factors can be adjusted and tweaked as needed, including at any time after a system has been installed. Meeting specified application “No customer is alike, so the needs of each customer’s system are unique,” says Amidi. For example, some situations might have a higher tolerance for false alarms, such as when there is an operator available who can make the final decision on whether a face matches. In other situations, such as when there is a missing child, false alerts are a bigger problem, and rapid response is especially of the essence. “What we give customers out of the box applies to any scenario, and customers can tweak the system with the click of a button to meet a specific application,” says Amidi. “We empower our customers to understand the pros and cons so they can react in real-time.” Identity management Oosto can help to enhance the customer experience by identifying important customers Oosto sells through systems integrators and has a partnership program with more than 150 integrators worldwide certified to manage and install systems. Oosto targets Fortune 500-size companies in financial services, gaming, and retail. The system helps to create a safe environment that is devoid of any “bad actors.” Alternatively, Oosto can help to enhance the customer experience by identifying important customers that warrant special treatment. The system also can provide an alert if any unauthorized person enters a restricted zone; that is, anyone who is not an employee, a registered visitor, or a contractor. Understanding technology In many parts of the world, facial recognition is widely accepted and used for applications such as payment and access control. Anxiety about technology, especially in the United States, is based on a lack of understanding. The public needs to “be better educated” on the subject, and Amidi expects the technology to become more socially accepted over time. “It’s a tool, and it needs to be supervised,” says Amidi. “From a technology perspective, we trust the accuracy. It just needs to be better explained.”
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximize convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organizations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimize the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Case studies
Orion Entrance Control, Inc wanted to remove friction and frustration for their integrators and end users with a single-source reader that could support any RFID technology and fit seamlessly into their turnstiles and other physical access control (PAC) products. The reader needed to be able to: Provide reliable and secure user identification and access control with excellent read range. Read all of the RFID card technologies their clients might be using. Have a compact form factor and sleek design for integration with their PAC products. Enable remote updates to support changing client requirements. Integrated access solutions Orion Entrance Control creates software, hardware, and infrastructure solutions for physical access control (PAC), occupant sensing, and visitor management. They develop access control software and manufacture high-end turnstiles, speed gates, swing gates, optical door alert systems, and other security solutions. Founded in 2009, they pride themselves on engineering and product excellence, with all of their products manufactured locally near their New Hampshire headquarters. They work with distribution partners and integrators to bring their access solutions to large commercial clients worldwide in education, healthcare, manufacturing, and other industries. One of Orion’s priorities is offering seamless, integrated access solutions that minimize friction for integrators and are simple and reliable for end users. They wanted an RFID reader that would support any RFID technology and be easily integrated into their turnstile products. Challenges faced by Orion Turnstiles and other components provided by Orion need to work within the access systems already in use Orion has 32 different turnstile products, from full-height mechanical turn gates to classic tripod turnstiles, to high-speed retractable barrier gates. An RFID reader embedded into the turnstile reads user credentials (e.g., an ID badge or mobile credential) and connects to the back-end software that verifies access authorization levels. Both their US and international customers use various RFID transponder technologies. Turnstiles and other components provided by Orion need to work within the access systems already in use by their customers. Traditional credentialing system Traditionally, Orion would work with integrators to determine the credentialing system the customer needed and then order the corresponding readers. This created delays for installers as they waited for the right readers to arrive. It also created complexity in Orion’s supply chain, as they had to manage inventory from multiple reader manufacturers. When the pandemic disrupted supply chains for some of their suppliers, they knew they needed to look for another solution. Read-range challenges At the same time, RFID reader read range was becoming a critical issue for many clients. More sophisticated reader technology and encryption create read-range challenges for some readers, especially when embedded under glass within a turnstile. This creates frustration for end users and slows down entry queues. Need for a standardized reader solution Working with multiple reader manufacturers, each differently sized and shaped readers, created engineering challenges They also needed a standardized reader solution that would fit any of their turnstile products. The architectural community has pushed for smaller, more streamlined turnstiles, so embedded systems must be highly compact. Working with multiple reader manufacturers, each with differently sized and shaped readers, created engineering challenges for Orion and headaches for installers. All of this resulted in more work for integrators and more delays for buyers. Need for a frictionless access range "We were looking for a reliable reader that had a great read range, could accept everyone’s credentials, and would be ready to go when you fit it in the turnstile," said Jerry Waldron, Customer Care Manager, Orion Entrance Control. "It’s one more thing we can do to remove friction and provide better service to our customers." Orion's reader requirements Orion Entrance Control, Inc. wanted to remove friction and frustration for their integrators and end users with a single-source reader that could support any RFID technology and fit seamlessly into their turnstiles and other physical access control (PAC) products. The reader needed to be able to: Provide reliable and secure user identification and access control with an excellent read range. Read all of the RFID card technologies their clients might be using. Have a compact form factor and sleek design for integration with their PAC products. Enable remote updates to support changing client requirements. Solution: ELATEC TWN4 Palon family of readers The Palon Compact Panel Reader features robust panel housing suitable for indoor and outdoor use The ELATEC TWN4 Palon family of readers fits the bill. The versatile readers are designed for seamless integration into third-party products and devices. Palon supports advanced interfaces (including RS-232, RS-485, USB, and more) and is simple to mount and install. The Palon Compact Panel Reader features robust panel housing suitable for indoor and outdoor use and a classic design that fits seamlessly into Orion’s turnstiles. They also have the option of using the TWN Palon Compact M reader, which comes without housing. RFID and smartphone credentials The TWN4 Palon line supports 60+ transponder technologies, including both low- and high-frequency RFID and smartphone credentials via near-field communication (NFC) or Bluetooth® Low Energy (BLE). This gives Orion the flexibility to support virtually any existing transponder technology its clients use with a single reader. Customer experiences "One of our most important values is creating remarkable customer experiences," said Steve Caroselli, Chief Executive Officer and President, of Orion Entrance Control. "We want to provide more than they expect and deliver a product with exceptional quality. With ELATEC, we’ve found a partner that shares that core ethos." Read range and reliability Palon reader acts as a data converter to connect the barcode reader to the Weigand interface, simplifying cabling ELATEC’s readers provide excellent read range and reliability, reducing frustration for users and system managers. ELATEC was also able to help Orion integrate the Palon readers with a barcode reader to meet a customer’s requirements. In that instance, the Palon reader acts as a data converter to connect the barcode reader to the Weigand interface, simplifying cabling for the installer. The integrated system supports barcodes for visitors and RFID for employees for a unified access experience. Flexibility “ELATEC gives us the flexibility to serve all our clients and the confidence that we’re going to be able to deliver a product that just works," said Steve Johnston, Director of Sales and Marketing, Orion Entrance Control. "We know that when it shows up on-site, it’s going to be a good experience for the installer and the owner of the company.” Benefits for ELATEC readers A universal reader allows Orion to reduce friction for clients, installers and distribution partners, and their people. Orion can support all their customers with the same RFID reader, simplifying sales, supply chains, inventory management, installation, and support. The sales team no longer must confirm in advance which transponder technology the end customer needs, the TWN4 Palon supports them all. And the engineering team can eliminate the headaches inherent in trying to fit readers with different form factors into their products. Single-part number solution ELATEC’s readers support fast, contactless reconfiguration after installation via a configuration card A single-part number solution reduces the time it takes to get the right system into the hands of installers and end customers. It also provides flexibility for the future. ELATEC’s readers support fast, contactless reconfiguration after installation via a configuration card or remote update. That means that it’s easy to update the readers for clients who add a new transponder technology, integrate mobile credentials into an existing system, or upgrade their security standards. Their turnstile and door access solutions are ready for the future. Seamless access experience Orion also appreciates the service and support they get from ELATEC. ELATEC has a production capacity in the U.S., which eases Orion’s supply chain worries. With ELATEC’s support, they can offer their customers a truly integrated PAC solution that provides a seamless access experience.
Exabeam, the pioneer in Next-gen SIEM and XDR announced that it has been chosen by Deloitte to help operationalize Managed Extended Detection and Response (MXDR) by Deloitte in an expansion of the existing Exabeam-Deloitte alliance. MXDR by Deloitte is a suite of managed security services and solutions for cyber threat detection and response that aims to help organizations address growing threat complexity, simplify cybersecurity total cost of ownership, and achieve meaningful and measurable cyber resiliency outcomes. Cybersecurity and automation “Exabeam is hands-down the leading user behavior analytics solution focused on the security market. Our cybersecurity and automation capabilities will help Deloitte clients quickly and more effectively detect, investigate, and respond to the increasingly dangerous approaches of global adversaries,” said Exabeam President Ralph Pisani. “We look forward to helping Deloitte clients as they leverage our open API environment and strengthen their security programs via tailored use of MXDR by Deloitte.” User behavior analytics solution Exabeam’s security-focused user behavior analytics and automation capabilities will be integrated into MXDR Exabeam’s security-focused user behavior analytics and automation capabilities will be integrated into MXDR by Deloitte to provide military-grade insider threat and incident response capabilities. Exabeam modernizes today’s security operations centers (SOCs) by automating the entire threat detection, investigation, and response (TDIR) workflow for security teams, greatly accelerating the time it takes to conduct deep investigations and resolve security incidents across their organizations. Threat and incident response “We asked Exabeam to be part of MXDR by Deloitte because we want our clients to be confident that they can more quickly detect and remediate anomalous — possibly adversarial — activity permeating their networks,” said Curt Aubley, MXDR by Deloitte leader and a Deloitte Risk & Financial Advisory managing director, Deloitte & Touche LLP. “We’re passionate about helping Deloitte clients drive better business and cybersecurity outcomes to help future-proof their evolving security strategies.” Zero Trust identity management systems Evolution of existing services and solutions by Deloitte with technologies including XDR, AI, and automation Evolution of existing services and solutions by Deloitte with more advanced technologies including extended detection and response (XDR), artificial intelligence (AI), and automation, MXDR by Deloitte is delivered 24x7x365 by security operations centers both in the U.S. and globally using FedRAMP-authorized and commercially-available capabilities. Suite modules provide advanced and proactive analytics to perform more in-depth detection combined with the continuous response, including prevention, detection, and remediation for endpoints; cloud security workloads; Zero Trust identity management systems; insider threat, proactive hunting, intelligence, attack surface, and vulnerability management; and unified log and analytics management. Network security In 2021, Exabeam was named one of the world's fastest-growing technology companies in Deloitte’s Technology Fast 500, was featured in Inc.’s first annual Best-Led Companies list and 2021 Forbes Cloud 100, and won the 2021 CISO Choice Award in Network Security. Also, for the third consecutive time, Exabeam is a pioneer in the Gartner MQ for Security Information and Event Management (SIEM) and was recently recognized as a Customers’ Choice in the 2021 Gartner Peer Insights ‘Voice of the Customer’ in the SIEM category for its Exabeam Fusion product line.
IDEMIA I&S North America, the identity security and authentication solutions provider, announced the first-of-its-kind travel platform, ID2Travel is launching in North America. ID2Travel is the only interoperable traveler identity platform covering the entire passenger facilitation ecosystem, already proven by IDEMIA and partners around the globe. Identity management and biometric identification Based on identity management and biometric identification, ID2Travel is a passenger facilitation solution that improves the traveler experience to deliver efficient, secure, and frictionless travel. The platform is interoperable and can be deployed as part of the airport, airline, port, or any travel-based infrastructure, or through IDEMIA’s patented and National Institute of Standards and Technology (NIST)-rated biometric capture solutions. The passenger experience from check-in and across every touchpoint in the travel experience uses identity proofing that leverages mobile enrollment with secured digital credentials on the traveler’s mobile device, biometric devices, and technology back-end services. Frictionless passenger experience ID2Travel offering in North America improves passenger flow and maintain a touchless experience" "ID2Travel is transforming the entire travel experience. Before COVID, Americans took approximately 2.3 billion trips, over one year, and this makes the need for the passenger experience to be even more frictionless and seamless as we return to pre-pandemic travel patterns." "With that experience and privacy in mind, the timing couldn’t be more ideal to launch our ID2Travel offering in North America to improve passenger flow and maintain a touchless experience, while balancing interoperability throughout the broader travel ecosystem," said Lisa Sullivan, Senior Vice President, Travel and Transport, IDEMIA I&S North America. Personal identity information Passengers can enroll using a mobile device from home by scanning a state ID or passport, and then taking a selfie to do a 1:1 match. Once submitted for enrollment, travelers will be able to use biometrics to securely and simply move through the airport to their gate and beyond in their travel experience. The IDEMIA solution also allows passengers to opt-out and remove their enrollment at any time and all data is immediately removed from the system, empowering the traveler to take full control of their personal identity information (PII). IDEMIA is the only company that has successfully delivered a complete biometric enrollment to gate frictionless passenger facilitation solution (Fast and Seamless Travel at Changi by IDEMIA, Aéroport Paris Orly, a biometric journey from check-in to boarding, Iceland’s Comprehensive Entry/Exit System with IDEMIA).
SAFR from RealNetworks, Inc., the premier facial recognition platform for live video, has been selected as the facial recognition technology provider to support the Japanese government’s evolution from paper documents to digital “My Number” ID cards with face-based authentication infrastructure. Part of a larger digital transformation, My Number cards represent a new digital identification system designed to streamline and expand access to government services for Japanese citizens and residents. My Number card reader The solution will be rolled out to hundreds of thousands of hospitals, clinics, and pharmacies over the next two to three years. The My Number Card Reader provides online confirmation that supports My Number insurance cards together with facial recognition authentication supplied by SAFR. Certified system integrator Nextware, developed the card reader integration using SAFR’s lightweight and highly accurate facial recognition algorithm. SAFR was chosen because of its speed, precision, and extremely low bias about skin tones, age, and gender. SAFR enables face recognition with little variation in authentication accuracy based on its deep learning" Accurate online authentication “In developing a card reader with face recognition to be used for online authentication, we needed the best facial recognition system available,” commented Mr. Takayoshi Toyoda, President, and CEO of Nextware Co., Ltd. "SAFR enables high-precision face recognition with little variation in authentication accuracy across gender, age, and race-based on its deep learning of about 10 million images. The availability of a device-embedded development kit enabled rapid development of the product.” Identity management in the healthcare system The initial rollout of My Number cards provides access to Japan’s universal healthcare system by allowing citizens to confirm their identity and medical information with specialized card readers and facial recognition features. As part of the new initiative, residents will no longer require multiple ID cards to access different government services. My Number cards contain an IC chip that stores a digital photo of the user. The My Number Card Reader reads the photo information and authenticates the user utilizing SAFR facial recognition even if the user is wearing a mask. The initiative significantly reduce resources and costs associated with the administration of healthcare information Reduces cost and errors The new initiative is expected to significantly reduce resources and costs associated with the administration of healthcare information while increasing convenience and access for all citizens and residents. The new digital system will also enable health providers to access accurate historical medical data reducing treatment time and avoiding costly errors. Digital transformation “We are happy to announce that SAFR facial recognition technology has been chosen for this important digital transformation project by the Japanese government,” said Noriaki Takamura, VP, APAC, SAFR. “Many Facial Recognition companies were considered, but SAFR’s excellent performance, high speed, small technology footprint and focus on privacy made it the ideal choice for this application.”
The Empresa Malagueña de Transportes (EMT) manages a fleet of 242 vehicles, distributed across 47 lines in a city of almost 570 thousand people in the south of Spain. They also have a customer service office in the city center. EMT monitors the entire transportation system from a single command center run by a 4-inspector team. The team leverages the city’s network of approximately 80 traffic cameras as well as proprietary cameras installed in strategic places and inside the vehicles themselves. EMT needed to be able to monitor the inside of the vehicles in real time, and switch quickly between feeds throughout the transportation network. Different display technologies Drivers can activate an alarm that automatically ensures the feed from that vehicle is monitored in the command center, enabling the surveillance team to assess and prevent potential threats to public safety by making mission-critical decisions at the push of a button. EMT needed a solution that was flexible with the ability to pull in multiple sources of content EMT needed a solution that was flexible with the ability to pull in multiple sources of content from the many different feeds throughout their network and quickly switch among them. They also needed something that was simple to use, that their team of inspectors could quickly learn to operate. Finally, it had to be cost effective. After careful review of different display technologies—including specialized hardware solutions for video walls, as well as digital signage—the team at EMT learned about Userful’s Visual Networking Platform solution. Right away, they appreciated the simplicity and flexibility of the solution. Video wall space “The support for real-time interactive content, seeing how simple it was to manage and the ability to easily switch content sources between displays, was what really convinced me that Userful was the solution we were looking for,” said EMT Systems Engineer, Jose Manuel Fernandez. Userful fit EMT’s needs perfectly because it’s able to handle a virtually unlimited number of inputs and it easily scales the number of outputs it can offer. This is unique in the video wall space and is a result of Userful’s innovative architecture. Userful leverages the network to deliver content from the PC onto the video wall(s). With Userful, a single PC can support a video wall of up to 100+ displays. Each display has a simple, cost-effective zero client device on the back that connects to the PC through the local area network (LAN). External content sources The integration for virtual machines in the system made the solution even better for us" Userful software turns that PC into an appliance that is easily managed through a browser. Using the browser-based interface, customers can easily pull content from almost any available source including network sources in real time. The solution can display everything from video to a full-screen browser to a desktop and even a series of virtual desktops (multiple independent desktop sessions running on the same PC). According to Fernandez, “The integration for virtual machines in the system made the solution even better for us.” In the command center, Userful deployed a 3x3 video wall with nine 55” LG commercial displays, all running from a single Intel Core i7 PC with 32 GB of RAM, which is securely located away from the wall itself in a locked room, with a controlled environment—helping to prolong the PC’s lifespan. EMT added HDMI capture cards to pull in external content sources to display on the video wall in real time. Public regarding fares After deploying the control room system, the EMT deployed a 2x2 video wall at the customer service office in downtown Malaga, which is managed and operated remotely from the main office, and displays information to the public regarding fares, schedules and additional information. Through their different functions, these deployments offer refreshed internal and external visualization and the flexibility to display content and notifications in real time. The EMT deployed a 2x2 video wall at the customer service office in downtown Malaga The solution was functional out of the box and the easy configuration enabled a smooth transition, with minimal downtime. Throughout the engagement, EMT has been very happy with the quality of technical support—any questions they had during installation were promptly answered via phone or text, with subsequent follow-ups to ensure the highest performance of the system. Supporting additional displays The EMT has achieved their goal of refreshing both the command center and customer service office with better visualization, more simultaneous cameras on display and the flexibility to show desktop content and online notifications in real time, effectively optimizing internal and external communication. With Userful, the EMT can expand their command center as their fleet grows. When they need to add more displays, they simply add more zero clients onto the network and the PC they’ve already deployed will support the additional displays. Now they can continue to grow without needing to undergo a big expansion project.
Vision-Box, a world pioneer in biometrics seamless travel, automated border control, and digital identity solutions has announced the launch of a Frontex awarded trial to implement an innovative pilot project at two land borders in Bulgaria, in the context of the EU Entry/Exit System (EES). The EES is a landmark framework set to replace traditional border controls of Third-Country Nationals with interoperable digital data processing and automated biometric data collection in 2022. The Frontex pilot, which went live in June 2021 in Bulgaria in collaboration with the Ministry of Interior and the Border Police will be for coaches, cars, and pedestrians at the entry of Kapitan Andreevo BCP from Turkey for phase 1, and exit at Kalotina BCP to Serbia for phase 2. Impact on border crossing points The implementation of the EES will influence the flow of travelers and the technology deployed at the border to collect the required data, to cope with the variety of sites and related complexities. This effect will possibly be more important at the EU land border crossings, which are more constrained environments as compared with airports and ports, as many travelers arrive in their vehicles. Therefore, the introduction of EES will have a significant impact on travelers’ flow at those border crossing points (BCP). Self-Service Enrollment System Self-Service Enrollment System executes real-time intensive queries into the Bulgarian national border control systems The purpose of the pilot project is to deliver a Self-Service Enrollment System to enable travelers to perform a self-service collection of travel document data, biometric data, and other information (e.g., questionnaire on entry conditions). It also executes real-time intensive queries into the Bulgarian national border control systems, in combination with an EU EES backend simulator. After the enrollment, travelers are invited to go to an open corridor and be identified on the move to directly cross the border, or to be redirected to the manual control booth to be verified by a border guard with last generation Coppernic handheld technology. EES Frontex pilot The secured linkage and encrypted communications with the national and EU border control systems, performing border checks on all travelers and EES registration/verification on third-country nationals, are jointly performed by Vision-Box and the respective border agencies. The EES Frontex pilot applies to short-stay visa and visa-exempt third-country nationals as well as EU citizens entering or leaving the European Union. Eliminates manual data collection and verification The pilot ecosystem (enrollment kiosks, biometric corridor, handheld tablets) is powered by Vision-Box’s award-winning Orchestra™ Identity & Border Management Platform. Orchestra™ removes the time-consuming task of manual data collection and verification, meaning that travelers do not need to physically interact with touchpoints or manually exchange travel documents and biometrics at counters. Touchless process The whole process leverages identity and biometrics tokenization to digitize the operation in a touchless manner. This also reduces long queuing at checkpoints and curtails crowding at clearance hotspots, allowing travelers to navigate the border a lot quicker and safely with biometric recognition technology. Facial recognition & fingerprint sensors Facial recognition biometrics offers the highest level of convenience for traveler identity proofing Facial recognition biometrics offers the highest level of convenience for traveler identity proofing, in compliance with the EU regulations, combined with touchless fingerprint sensors for combined verification against the EU EES biometric backend systems. The solution drives significant improvements over the traditional manual and touch-based identification procedures in terms of hygiene, accuracy, and privacy protections. EU GDPR compliant The powerful Orchestra™ Service Platform is compliant with EU GDPR through its unique Privacy-by-Design certification. It operates under user-centric business rules and is the kernel of the advanced management of Identity proofing and flow monitoring of traveler processes at the border. The platform’s powerful capability allows it to process the full extent of national border passenger volume, thanks to its future-proof scalable design and resilient architecture. Maintaining the pilot For this pilot delivery, Vision-Box has hired the services of PwC Luxembourg, to help sustain the definition of the use cases, their testing, and overall pilot reporting. In addition, Bulgarian system integrator - Global Sat, is supporting Vision-Box in the deployment of the solution on the ground and its maintenance during the overall 6 months’ operation of the two pilot phases at the two different land borders. Exploring Frontex pilot Speaking about the pilot project, Jeff Lennon, Vice President Strategic Sales & Global Partnerships at Vision-Box, said: “We are thrilled to run this Frontex pilot for exploring the future of EES in Bulgaria and Europe, in partnership with the Ministry of Interior and the Border Police as long-time customers, PwC and Global Sat.” Maximizes process efficiency “This innovative undertaking will allow all of us to stress-test ground-breaking technology in a very challenging environment, yet at a small scale. It will also help us establish the foundations for expanding the technology at the national level for any type of land border environment, minimizing the footprint of the solution at stake while maximizing the process efficiency for the border guards and the travelers.” “This is also a great opportunity for understanding the flow of border-crossings at two of the largest EU land border sites, to effectively expand our solutions in the EU context for Smart Borders as we are already doing in Finland since 2019 among other EES projects with additional member states.” Collaborative testing with EES Frontex and Bulgarian's authorities collaborate in testing the European EES at two critical land border control points" Serge Hanssens, Partner at PwC for Smart Borders said: “Frontex and Bulgarian's authorities collaborate in testing the European Entry-Exit System (EES) at two critical land border control points in Europe.” “This is a unique opportunity and milestone to try out these new processes in real conditions. PwC Luxembourg is so pleased to be part of the adventure supporting Frontex and Bulgarian's authorities to make the EES deployment a success; securing the entry and exit to the European Schengen Area of all third-country nationals." Automated border control Tsvetan Mutafchiev, Executive Director at Global Sat said: “We at Global Sat are excited to be part of this very innovative PoC project. EU land border crossings create several new challenges for automated border control due to the specifics introduced by different types of vehicles used by passengers.” System integration “We do believe that the pilot project will successfully prove the concept of the Vision Box‘s platform and will also provide valuable feedback from Bulgarian border police officers. The implementation of self-service enrollment systems, when applied in full scale at the EU's external borders, will facilitate efforts against illegal migration and will contribute to the security of European countries with a full commitment to personal data protection.” “The Global Sat team is proud to be at the forefront of this endeavor. With our experience as a system integrator, we will continue to contribute to its success.” Safe and efficient travel Vision-Box’s technology is proving crucial in guaranteeing safe and efficient travel processes With the industry expected to resume travel as restrictions begin to ease, Vision-Box’s technology is proving crucial in guaranteeing safe and efficient travel processes. Over the past months, Vision-Box has also inaugurated Automated Border Control eGates at Malta International Airport in collaboration with the Malta Police Force, implemented an integrated Biometric experience for Emirates Airline at Terminal 3 of Dubai International Airport, and secured a regional strategic partnership with AirAsia Group, to implement industry-leading, identity management technology across its network of 152 airports.
Round table discussion
Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than done, and mobile credentialing, for all its advantages, also has limitations, which further innovation continues to address. Wider acceptance comes next, driven by use cases in various vertical markets. We asked this week’s Expert Panel Roundtable: What are the latest developments in mobile access control?