network security alert (techvision)biomatiques iris recognition technology is capable of identifying...
TRANSCRIPT
Network Security Alert
(TechVision)
April 01, 2016
D983-TV
Network Access Control Management: Monitoring Every
Layer of the Enterprise Network
D983-TV 2
Table of Contents
Section Slide Number
Network Access Control Management—Overview and Trends 3
Access Control Management—Overview 4
Innovative Iris Recognition Technology for Critical Access Management 5
Wearable Vein Recognition-Based Biometric Authentication 6
NLP-Based Mobile Voice Biometric Authentication Solution 7
Context-aware Technology for Access Management 8
Web-based Access Control System 9
Mobile Access Control Application with Photo ID Badging Features 10
Hosted Electronic Access Control Platform for Businesses 11
Wide Scale and Flexible Access Control Infrastructure 12
Key Patents—World 13
Key Patents—United States 14
Industry Contacts 15
D983-TV 3
Network Access Control Management—
Overview and Trends
D983-TV
Access Control Management Systems—Overview
Access Control
Management
• Access management is the process of identification, authentication,
authorization, and administration of digital users. Access control management
systems are widely used by large businesses and enterprise organizations to
manage thousands of user identities. However, in recent years, information
technology (IT) mega trends such as mass smartphone adoption and cloud
services have changed how organizations manage identity and access
requirements.
• Changing IT practices create demand for new access control management
systems and generate opportunities for growth by innovative companies.
Key Benefits
Real-time Alarms
Remote
Management
Provide Audit
Trials
Easy
Integration
Controlled
Access
Access control management systems have evolved over the years
embracing emerging technologies to enhance their functionalities and
improve performance. There are several benefits offered by these
solutions. These are as follows:
• Remote Management: These solutions enable lock down of remote
devices to access corporate networks from remote computers. The
administrator could identify the system and deny access rights for
specific devices.
• Real-time Alarm: Access control solutions can send alarms to the
administrators automatically in case of any suspicious activities in
the network.
• Controlled Access: The network administrators are able to grant
access to limited sections of the enterprise network based on the
roles of the employees. This level of customization helps in efficient
management of the attack surface.
• Provide Audit Trial: In-depth report of the access history provides a
clear picture for the loop holes in the system.
• Easy Integration: Cloud computing has enabled easy integration of
these solutions into the corporate network irrespective of its size.
D983-TV
BIOMATIQUES Iris Recognition Technology
Innovative Iris Recognition Technology for Critical Access Management Biomatiques Identification Solution Pvt. Ltd., India
Why do we need Iris Recognition Technology? Significance of digital identities is increasing, directly impacting the necessity of digital identity and access management technologies that can efficiently identify legitimate users to gain access to critical computing systems and applications.
Biometric technologies such as fingerprint scanning, facial recognition, and voice recognition are being widely used for access security. However, these technologies have limitations pertinent to reliability, accuracy, speed, and cost.
Sophisticated technologies such as vein recognition and body thermal heat mapping are expensive, even with high accuracy and reliability scores. The complexity in integrating these technologies for large-scale identity and access management applications is high.
Which technology can help??
The Biomatiques iris recognition technology offers best-in-
class identity and access management using contactless iris
scanning at an affordable cost of ownership.
Key
Technology
Capabilities
The capability of the Biomatiques iris recognition technology to enable highly accurate biometric recognition solutions at an affordable price will significantly impact every sector. Considering the growing global trend of digitization, the technology’s innovativeness will be a key contributor for accurate digital identity and access management with high adoption rates by 2016.
High
Interoperability High Accuracy Cost Efficiency
Key Benefits from Implementation
Short Term (1-2 Years)
Medium Term (3-4 years)
Long Term (>5 years)
Market Opportunity
High High
Our Thoughts
High
Biomatiques iris recognition technology is capable of identifying the unique
patterns present in the iris of human eye. The technology is empowered
by patented hardware and proprietary mathematical pattern recognition
algorithms that can distinctly identify more than 250 matching points such
as furrows, rings, and freckles within each iris.
The technology uses a small template for storing biometric data, which
allows to store a larger amount of reference data without incrementing
the database size. The availability of more reference data radically
enhances the technology’s reliability factor. The small template enables
lowering the technology cost due to lesser storage requirement.
Biomatiques iris recognition technology can track the iris from a distance of up
to 3 meters with optimum accuracy. This unique aspect of delivering
contactless identification directly impacts the life of the device and the
frequency of maintenance cost. Additionally, the technology is platform
agnostic and suitable to be integrated seamlessly with existing infrastructure.
D983-TV
Biowatch
Wearable Vein Recognition-Based Biometric Authentication Biowatch, Switzerland
Why do we need Wearable Biometrics? Increase in connected devices’ network and digital identities has made it essential to use robust access management security technologies to prevent unauthorized access.
Considering the high number of contact points of authentication, using personal identification numbers (PIN), access cards, and so on, it is inconvenient for multiple authentication instances. Additionally, there is a high risk of abuse of these cards if stolen.
Biometrics are being used widely for increased touchless and convenient authentication. However, technologies such as fingerprint scanning, facial recognition, and voice recognition can easily be duplicated to create false identities.
Which solution can help??
Biowatch is an innovative wearable identification solution that
can be attached with a wristwatch's band. It can identify
individual users by detecting unique vein patterns of their
wrists and connect with devices and applications granting
access in real time.
Key
Technology
Capabilities
Considering the expected exponential growth of connected devices, and applications that will surge in near future, Biowatch seems to be a dependable solution for applications such as e-payments and mobile access. The convenience and speed of the solution to offer highly accurate biometric authentication will play a key role in driving its popularity by 2017.
Robust Encryption High Accuracy Real-Time
Authentication
Key Benefits from Implementation
Short Term (1-2 Years)
Medium Term (3-4 years)
Long Term (>5 years)
Market Opportunity
High High
Our Thoughts
Medium
The solution consists of a miniature camera that takes photos of an user’s
wrist veins and stores them as reference. The solution leverages
proprietary biometric classification algorithm to match the user’s identity.
The reference information is locally encrypted and stored for future use.
Once the watch is removed from the user’s wrist, identification data are
deactivated to prevent abuse.
The miniature camera is developed using extra-slim optics to make it
suitable to be seamless embedded into a wristwatch band. Based on the
Biometrics Evaluation and Testing (BEATS) platform, the vein recognition
algorithms are specifically developed to have high interoperability with
third party software and hardware environments.
Biowatch has seamless Bluetooth and near field communication (NFC)
connectivity to facilitate real-time communication with connected devices for
authentication. The information transmitted to devices and applications is
encrypted in real time and is secure from attacks such as man-in-the-middle.
D983-TV
KIVOX Mobile 5.0
NLP-Based Mobile Voice Biometric Authentication Solution AGNITIO, Spain
Why do we need Mobile Voice Biometrics? Increasing usage of mobile phones for carrying out critical jobs such as banking, e-commerce, and so on, is driving the need for efficient mobile authentication technologies and solutions to secure users’ confidential information.
Traditional password-based security techniques are highly unreliable as they can be easily breached. Integration of fingerprint scanners into mobile devices radically increases the device cost making them unavailable for a wider market.
Voice biometrics, although evolved as a preferred and cost-efficient mode of mobile authentication, has limitations restricting wide scale adoption. Accuracy issues and vulnerability to spoofing are major concerns.
Which solution can help??
The KIVOX Mobile 5.0 is an innovative mobile voice
biometrics solution that can accurately identify users by
tracking their voice through normal speech.
Key
Technology
Capabilities
The KIVOX Mobile 5.0 solution, by virtue of its innovative anti-spoofing technology and proprietary NLP algorithms, has significantly enhanced the reliability of mobile voice biometrics. Considering the growing need for accurate and affordable mobile biometrics solutions to secure user data, the solution is expected to attract considerable interest by 2017.
High Accuracy Platform Agnostic On-device
Authentication
Key Benefits from Implementation
Short Term (1-2 Years)
Medium Term (3-4 years)
Long Term (>5 years)
Market Opportunity
High High
Our Thoughts
Medium
The solution is based on AGNITIO’s proprietary Voice ID technology that
leverages unique natural language processing (NLP) algorithms to identify
an user’s natural speech, rather than fixed phrases. Additionally, the
technology has innovative noise cancellation capabilities enabling
accurate identification even in noisy environments.
The solution is equipped with patented anti-spoofing voice biometrics
technology that is capable of detecting specific characteristics of an
user’s voice. This innovative feature allows the solution to distinguish
real voice from recorded voice and thereby prevents spoofing attacks
and frauds.
The KIVOX Mobile 5.0 solution has a significantly small device footprint and
can be seamlessly embedded on the device’s chipset. This negates the
requirement of external servers, thereby minimizing attack surfaces for scaled
attacks. On-device integration allows accurate authentication even without
network connectivity.
D983-TV
Identity Authentication Services
Context-aware Technology for Access Management Finsphere, USA
Why do we need Context-aware Access Control Systems ? New age security threats that use advanced algorithms are efficiently neutralizing conventional access management systems. This results in loss of sensitive data for organizations.
It is necessary that the encryption algorithms and access management system imbibe learning and real-time adapting capabilities for efficiently mitigating access control threats.
Companies are looking for a solution, which can utilize new age technologies such as machine learning and context aware computing to perform real-time access control threat mitigation.
Which technology can help??
The finsphere identity authentication services offer an
innovative context-aware access management technology
that leverages advanced algorithms to control unauthorized
access to corporate assets.
Key
Technology
Capabilities
The adaptive access security systems are expected to be the future of BYOD (bring your own device) implementation. The use of context aware systems in BYOD organizations would help employees to access relevant data securely without any security breaches.
Mitigates Multi-
pronged Approach
Real-time Social
Behavior Analysis
Improved Security
of BYOD
Implementation
Key Benefits from Implementation
Short Term (1-2 Years)
Medium Term (3-4 years)
Long Term (>5 years)
Market Opportunity
High High
Our Thoughts
High
Access management system uses location awareness system as a
medium for authenticating various system accesses. This is possible by
utilizing electronic gadgets and mobile devices, which carry signatures as
authentication tokens. The location data in real-time enable organizations
to check the physical proximity of the device and grant permission to the
users if data match with the preset location database.
The finsphere solution also utilizes deep learning algorithms for
analyzing an user’s social behavior and uses that as identification for
authenticating an access request. This makes the solution more
adaptive to individual users and helps the system to control access
more accurately.
The use of cloud-based adaptive security systems is expected to help in
diffusing the security network to any number of devices. This helps to reduce
dependency on heavy infrastructure, which in turn enables high cost
efficiency.
D983-TV
Honeywell, NetAXS®
Web-based Access Control System Honeywell International Inc., USA
Why do we need Access Control Portal? Conventional security system require access management software's to be installed on a dedicated PC post in order to monitor and store information. This method, which consumes time, requires the authorized personnel to travel from post to post just to monitor the premise..
Mostly, access control system runs as an application that is installed on PC. The software must be installed in order to be used. With the current technology development rate, access control systems should be more portable and user-friendly in order to promote efficient security services.
To acquire customized software's, clients are burdened by the staggering costs for software development. Stand-alone software's require highly skilled developers and large amounts of allocated time to complete the development process including beta testing and bug testing.
Which solution can help??
Honeywell, a conglomerate enterprise that manufactures a wide
collection of commercial and consumer commodities, and also is
involved in research and development of personal and machines
security.
Key
Technology
Capabilities
The NetAXS® Web-based access control system is developed with a
user-friendly landing page. The landing page contains functionalities that
require less than 30 minutes of training for end users to learn about
navigating the system. This page is accessible by authenticating into a
designated IP address Web page that will be connected to the system.
Being a key technology developing company, Honeywell has channelled efforts toward the revolution of current and future industries. Honeywel’s NetAXS Web-based access control system provides business and individuals a stable and user-friendly security service. This innovative system would impact the global market by 2017 due to the increased awareness and demand for security services.
Remove Unwanted
Data or
Applications
Mobile Security
Monitoring
Detailed Security
Analysis
Key Benefits from Implementation
Our Thoughts
Medium
Short Term (1-2 Years)
Medium Term (3-4 years)
Long Term (>5 years)
Market Opportunity
High High
Door access modes and options can differ according to each access card holder.
Customized preferences and different levels of access can be assigned to each
access card holder separately. Strict policies and scanning sequences can be
customized to fit clients’ business structure. For instance, by presenting his
access card twice, the supervisor can enable access for his team during a
specified time.
NetAXS is embedded with a dynamic screen update system that
refreshes data automatically. This intervention allows status updates
from NetAXS such as alarms, events, inputs, outputs, and status
screens to be loaded onto the landing page content area without any
user.
D983-TV
IDenticard PremiSys
Mobile Access Control Application with Photo ID Badging Features IDenticard Systems, USA
Why do we need Mobile Access Control App? Access control systems often use conventional software to fully operate security features. These software are installed onto a dedicated machine that is not portable and cannot be accessed remotely, thus, increasing the importance of implementing mobile access control systems.
Access to doors, facilities, and labs are easy to duplicate and infiltrate. Security access to these facilities can be duplicated and shared among unauthorized members. Intellectual property is at huge risk if infiltration is successful.
With many security providers in the market, many security solutions are based on preconfigured settings that can be used for monitoring but cannot provide full length security assurance. This may cause redundant installations and migrations that may not benefit the organization. Which solution can help??
IDenticard (PA, USA) manufactures and markets various
identification and safety measures to provide security for people
and buildings.
Key
Technology
Capabilities
The PremiSys™ Mobile App enables administrators to manage various
security activities and tasks remotely, including locking down doors or even
acknowledging alarms. A Dynamic Mapping application is also built into the
application in order to provide exact location of doors and alarms.
Also implemented into the application is the Video Management System that
provides flexible and robust access controls followed by video surveillance
solution. The system displays multiple live feeds and recorded videos
simultaneously when acknowledging a single or multiple alarms.
Access Control systems are gaining client awareness in the security industry because of its capabilities in providing panoramic vision of enterprise's physical environments. IDenticard has taken drastic measures to improve current access control systems with the development of PremiSys that increases efficiency in monitoring and threat detections for organizations globally. A great market impact is expected to be achieved by IDenticard in 2017.
Accurate Facial
Detection
Immediate Alarm
Response
Accurate Door
Threat Locator
Key Benefits from Implementation
Our Thoughts
Medium
Short Term (1-2 Years)
Medium Term (3-4 years)
Long Term (>5 years)
Market Opportunity
High High
IDenticard's Cardholder Management Module is integrated in the
PremiSys application to provide a personalised identification badging
system (primarily for security professionals). This module provides
customizable badge designs, screen designs, and database fields along
with Photo Recall system that instantly identifies cards with their
cardholders while being activated or used by a mobile application.
D983-TV
Protection1 Access Control Security Solutions
Hosted Electronic Access Control Platform for Businesses Protection1 Security Solutions, USA
Why do we need Electronic Access Control Platform? Organizations using old security systems often face malicious threats and increased risk of duplication and infiltration in their environment. Biometric card readers, RFID card systems, and other security materials can be duplicated and shared among unwanted parties.
Regular access control systems that are installed onto dedicated machines lack effective control methods such as providing safeguard services or countermeasures to avoid, reduce, or counteract security threats.
For an organization, information that is scattered and not evaluated is considered wastage of data. However, implementation of electronic access control system can help provide detailed reports using scattered data such as a detailed audit trail report that lets the organization know its personnel’s net utilization and productivity. Which solution can help??
Protection1 is a premier security service provider that
concentrates on providing benchmark level security options and
support for their personal and business clients.
Key
Technology
Capabilities
This security platform is integrated with Brivo, Winpack, and ProWatch
systems combined with special IP-enabled controllers that allow
complete system and network environment management using a
dedicated web portal from one or several different locations.
With the rising needs of security platforms for precaution and prevention of intrusions, Protection1 has developed a sophisticated Access Control System that will impact an organization, institution or business expenses and staff productivity tremendously. The accuracy of providing seamless security will be a key role in driving this platforms popularity by 2018.
In-depth Access
Analytics
Unified Access
Control
Threat Detection
and Response
Key Benefits from Implementation
Our Thoughts
Medium
Embedded with the Visitor Management System, Protection1 also provides
restrictions to connectivity and access within an organization by identifying
unwanted logins from visitors, volunteers, and vendors. These identified logins
are then compared across federal and state crime databases to avoid issues.
The platform also consists of a Web-hosted access control system that
allows administrators or an authorized individual to administer or view
any activity of any kind of format including videos from any device or
machine that is connected to the Internet. The administrator will also be
given authority to administer access control permissions, add/remove
access cards and produce standard reports.
Short Term (1-2 Years)
Medium Term (3-4 years)
Long Term (>5 years)
Market Opportunity
High High
D983-TV
PCSC Security, LiNC-XS™
Wide Scale and Flexible Access Control Infrastructure PCSC Security, USA
Why do we need Wide Scale Access Control Infrastructure?
In order to provide security for large premises such as multi-tenant office buildings, universities, hospitals and manufacturing factories, advanced technical experts are required to install the system and the cost would be high.
Conventional access control systems suffer from lack of flexibility and control over a particular facility's security infrastructure. This is because they use dedicated PC posts in large facilities, and the person in charge would need to travel a distance to reach the monitoring post.
Common access control systems are not capable to provide users with management options such as cardholder management, analysing reports, receiving alerts from the system, and time & attendance collection. These options are important to provide accurate security analysis and services.
Which solution can help??
PCSC is a company that designs and manufactures high-end access
control solutions. With products ranging from high-end hardware to
sophisticated access control management software, PCSC has been a
prominent participant in the security industry.
PCSC Security has shown immense growth and efficiency in its services and product development. The LiNC-XS™ platform displays many features that would provide complete security monitoring and evaluation for large scale environments. Due to this, and due to the growing need for security systems, the LiNC-XS platform will find wide adoption by 2017.
Large Scale
Adoption
Complete Access
Control
Lower Cost for
Implementation
Key Benefits from Implementation
Our Thoughts
Medium
Short Term (1-2 Years)
Medium Term (3-4 years)
Long Term (>5 years)
Market Opportunity
High High
Key
Technology
Capabilities
The LiNC-XS™ platform uses a 128-bit data encryption security protection
between software modules that contribute to seamless integration of intruder
detection, video surveillance with saved backup, photo for identification
badging, smart cards, and biometrics.
The platform provides many features such as Two Person Minimum Occupancy
Rule (TPMOR), Elevator Cab Control (development stage), Operator Solicited
Open Door, password control functions for each level and also user defined input
or output polarity sensors.
The platform is integrated with PCSC Intellectual Property technology
such as Fault Tolerant (enables an operating system to continue
operating if there were one or more faults within some of it's
components) and IQ Series Controllers (allows migration between other
brand access control systems into a single platform).
13 D983-TV
Key Patents—World
No. Patent No. Publication Date Title Assignee
1 WO2015128128A1 2015-09-03 Method for storing biometric access data for a
computer system, computer system, and data
memory
Fujitsu Technology Solutions
Intellectual Property Gmbh
The invention relates to a method for storing biometric access data for a computer system (10) having biometric access control. The method
comprises the following steps: recording biometric access data; checking if biometric access data are stored and associated with a user profile
after biometric access data have been recorded; recording and examining non-biometric access data of the user profile if the check was
negative; and storing the recorded biometric access data for the user profile. The invention further relates to a computer system (10) and to a
data memory.
2 WO2015121001A1 2015-08-20 Wireless interaction with access control devices Assa Abloy Ab
A user of a mobile communication apparatus (160) seeks permission to operate an access control device (110) by placing an active mobile
power source unit (150), which is controlled by the mobile communication apparatus (160), within an operation range of a wireless power
transmission interface (116) in the access control device (110). In response thereto, a wireless power transfer link is established between the
mobile power source unit (150) and the access control device (110). Thereafter, a wireless communication link (WL2) is established between the
mobile communication apparatus (160) and the access control device (110). Data are then exchanged between the access control device (110)
and the mobile communication apparatus (160) over the wireless communication link (WL2). The exchanged data pertain to at least one access-
related service implementable via the access control device (110); and provided that the user is authorized, the requested services are effected.
14 D983-TV
Key Patents—United States
No. Patent No. Publication Date Title Assignee
1 US20150215232A1
2015-07-30 Method for updating message filter rules of a
network access control unit of an industrial
communication network address management unit,
and converter unit
Siemens AG
Method and system of updating message filter rules of a network access control unit of an industrial communication network. At least one
address-based message filter rule is assigned to the first communication device. The first communication device is replaced with the second
communication device, and the second communication device is registered in the address management unit in response to the replacement of
the first communication device with the second communication device. Upon determining that a communication device with an identical
communication device description is already registered, the address management unit transmits a change message to the network access
control unit or to the converter unit. The communication network address of the first communication device is replaced with the communication
network address of the second communication device based on the at least one address-based message filter rule.
2 US20150381661A1 2015-12-31 Method of managing access control in a cloud network Orange
A method which makes it possible to manage access control between a first entity and a second entity belonging to two security domains in a
cloud network is disclosed. In one aspect the method comprises, if the entities belong to security domains implementing different access control
policies, determining whether there exists a first access control rule between the first entity and a virtual entity within the security domain of the
first entity, and a second access control second rule between the second entity and the virtual entity within the security domain of the second
entity. If so, the method may comprise controlling access between the first and second entities as a function of the first and second rules.
15 D983-TV
Industry Contacts
Mas Kosaka, President and CEO, PCSC Security, 541 Challenger St, Torrance, CA 90503. Phone: +1-310-303-3600 E-mail: [email protected] URL: http://www.pcscsecurity.com/
Matthias Vanoni, CEO, Biowatch, Rue Marconi, 19, 1920 Martigny, Switzerland. Phone: +41-76-240-90-29 E-mail: [email protected] URL: www.biowatch.ch
Emilio Martinez, CEO, AGNITIO S.L. , Gran Vía 39 - Planta 8, 28013 Madrid, Spain. Phone: +34-91-512-24-17 E-mail: [email protected] URL: www.agnitio-corp.com
Vikas Chadha, Managing Director – India, Honeywell Automation India Ltd., 56 & 57, Hadapsar Industrial Estate, Hadapsar, Pune 411 013. Phone: +91-20-66039400 E-mail: [email protected] URL: http://www.honeywell.com/
Jamie Rosand Haenggi, Chief Marketing & Customer Experience Officer, Protection1, 800 E Waterman St, Wichita, KS 67202-4730 Phone: 877-776-1911 E-mail: [email protected] URL: http://www.protection1.com/
Steve Anderson, SVP, Finsphere, 11747 NE 1st Street, Suite 330, Bellevue, WA 98005. Phone: 425-679-5700. E-mail: [email protected] URL: www.finsphere.com
Aaron Henderson, Security Software Product Manager, Identicard, 25 Race Ave, Lancaster, PA 17603. Phone: 1‐800‐233‐0298; Ext. 338. E-mail: [email protected] URL: http://www.identicard.com/
Pratik Patel, Vice-President, Global Systems Integration, Biomatiques Identification Solution Pvt. Ltd., 1, "Rishi House", Near ICICI Bank, Kargil Chowk, Piplod, Dumas Road, Surat - 395 007, Gujarat, India. Phone: +91-261-2225767. E-mail: [email protected]. URL: www.biomatiques.com