9 April 2021

Suprema CoreStation offers multi-credential flexibility for access control

Suprema, a provider of access control, biometrics and time & attendance solutions, shared partner testimonials about its security controller CoreStation that helps facilitate building multi-credential access control systems. Suprema CoreStation is a biometric-enabled security controller that provides great system design flexibility with credential options ranging from PIN, RF card reader, mobile access to fingerprint and face recognition. Meyer, a partner in Turkey, was able to construct a face recognition access control system for its customer using Suprema CoreStation and Suprema face recognition terminals. “CoreStation offers unrivaled matching speed. The customer preferred to connect the face recognition terminals to CoreStation instead of directly to the server for stronger security. This meant that all user data was saved in CoreStation and data had to be transferred to CoreStation for every matching operation. Despite this configuration, users do not notice any delay in authentication thanks to CoreStation’s powerful performance,” said Orcun Bayindir, CEO of Meyer. IQ trading, a partner in Ukraine, enabled fingerprint recognition access control system for a banking customer. Andrii Glukhov, technical support lead at IQ trading, cited CoreStation’s scalability, enterprise level memory and interlock zone support as advantages. “Using Suprema CoreStation, we connected 26 two-sided doors with high performance fingerprint authentication. CoreStation is a unique, powerful controller that can store up to 500,000 users, 1,000,000 fingerprint templates and 5,000,000 logs, providing uninterrupted service regardless of network issues. We were also able to create sequential passages with interlock zones, increasing overall security level and eliminating the possibility of a person entering the second door without closing the first one,” said Glukhov. Absolon, a partner in Europe, provided mobile access solution to Crestyl, a leading real estate developer in Czech, using CoreStation. The site had over 100 doors with 1,500 employees and required a secure yet flexible controller that could be easily integrated with third party systems. Crestyl was operating a third party system C4 software and was looking for a way to add mobile credential without a major system overhaul. CoreStation, together with Suprema BioStar 2 and Suprema XPass D2 readers, was a great answer because of CoreStation and BioStar 2’s integration flexibility. C4 was integrated with BioStar 2 via BioStar 2 API and XPass D2 were selected for mobile credential compatibility. “CoreStation’s appeal lies in the gamut of credential options it supports. Partners and customers can enable PIN, RF card, mobile access as well as biometric credentials like face and fingerprint with Suprema’s intelligent controller,” said Hanchul Kim, CEO of Suprema Inc.   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Suprema CoreStation offers multi-credential flexibility for access control Read More »

Adapting cybersecurity strategies to accommodate the new workplace

Exclusive article for Security Buyer, courtesy of Scott Lynn, Service Director, Agilitas. Scott Lynn, Agilitas’ Service Director, looks at how a company should assess its cybersecurity procedures in the new normal and warns that not addressing them can cause serious consequences. He also explains why it is critical to be knowledgeable about the developing workplace, including dynamic digital strategies and operational practices, and highlights why we need to reflect on past working styles to see how they can shape the very different future we now face. Home working here to stay Over the past year, millions of workers have had a crash course in what it is like to work from home. Some people have found pleasure in swapping their work desks for the kitchen table or the office for the spare bedroom, and others not so much. Some will hope to never go back, while others can’t wait to return, with many thinking working from home every now and again provides the perfect work/life balance. Whichever way you look at it, there’s no question that once this pandemic is over, the levels of home working will remain at high levels across the UK and beyond. There are a lot of benefits to businesses providing increased flexibility to their workforce. Giving employees the choice can greatly increase their fundamental happiness and motivation as they can make work fit their lifestyle and be at their most productive. However, home working also comes with one big concern for organisations. Can it be done securely? Fundamentally, the disparate nature of home working increases vulnerabilities. Put simply, there are more points of access, and therefore, more points of potential attack. When workers are spread out and isolated rather than working from the same office, both the surface of attack and the risk are increased exponentially. Organisations have less control and less oversight so, in essence, they are more vulnerable to attack. Homeworking attracting attacks In the last few months alone, some 7,000 UK email servers were reported as being potentially exposed by a security flaw in the global Microsoft Exchange email service. Malicious software was found on thousands of machines that the National Cyber Security Centre has been helping organisations to remove. Of course, email has become even more critical to businesses in these home working times and cybercriminals know this all too well. Hence phishing emails, ransomware, and spoofing attacks surging throughout the COVID-19 pandemic. Fraudsters and criminals know that security systems are only as strong as their weakest point, so if they can compromise one machine on one network, they can potentially get access to all kinds of valuable information. Why it’s so important to get security right Not paying enough attention to cybersecurity in this changing environment can be an expensive risk for any organisation. Highly valuable corporate information can be stolen in a hack and a significant amount of money can potentially be demanded in ransomware attacks. There are other costs to consider as well. When your business is taken down by a hack – it can spend days, if not weeks or months, dealing with consequences and repairing the damage, rather than focusing on its core business. On top of that, there are the potential legal consequences of mishandled data or failure to comply with standards. In many ways, despite the large ransomware demands, the biggest cost to your business from cybersecurity breaches is the impact it can have on your reputation long-term. Get cybersecurity wrong, and you risk losing the trust of your customers and industry partners. To operate successfully in 2021, you need to operate securely, no matter how widespread or isolated your workforce has become. Remote identity management So, what does working from home require from a cybersecurity standpoint? Of course, the end goals are no different from working in an office, but it can be a lot harder to achieve them. The starting point for good cybersecurity is a mechanism to ensure you can verify the identity of everyone accessing your network. That allows you to guarantee that your employees and no one else can log onto your systems remotely to access your organisation’s sensitive data. Organisations can achieve this through the use of up-to-date software and hardware that provides secure authentication. You must ensure that remote employees log into your system using methods that are reliable, strong and also easy to use. This could be through multi-factor authentication or through a combination of hardware and technology that allows for remote authentication. It’s imperative that organisations have the operations and flexible supply chain in place to provide the workforce with the hardware and software they need to work safely from home. If just one worker from home is not following protocol or is not equipped with the right tech and they become a target of a hack – they become the broken link in the chain with the whole organisation becoming compromised. It’s so important cybersecurity is taken seriously from top to bottom, with everyone adequately equipped, wherever they are. Working together while not together We now live in a virtual world. Virtual meetings, virtual documents, and virtually everything done online. Working from home has turned a simple face-to-face meeting or the sharing of a document into a scheduled Zoom or Teams call. Data security that allows for collaborative work to be securely carried out online is more important than ever. Employees need to be trained in security protocol and given software that allows them to safely collaborate with their colleagues. Fundamental to this is keeping access to files on a need to know basis, as the likelihood of potential security threats reduces when you limit access and don’t unnecessarily expose files. These principles also apply to internal collaboration, as well as when documents and files need to be shared outside your organisation. Businesses need the means to safely share their work while remaining in complete control of it. Threat response Good cybersecurity prepares businesses for worst-case scenarios. Organisations need to have an attitude

Adapting cybersecurity strategies to accommodate the new workplace Read More »

LEGIC Connect surpasses 7.5 million users

Registered users in 200 countries have switched to secure, contactless access, rental and vending apps based on mobile credentials and the LEGIC Security Platform Swiss-based LEGIC Identsystems (www.legic.com), a leading enabler of contactless security solutions, announces a new milestone in the growth of its end-to-end mobile security platform LEGIC Connect: 7.5 million registered users in 200 countries. Additionally, mobile credentials make it possible for smartphones to be used in parallel with, or as a replacement for existing smartcard applications which are already used for a wide range of services such as employee and home access control, time & attendance, secure printing, e-parking, rental and vending. LEGIC Connect: an end-to-end Security Platform available 24/7 Customers needing to integrate secure, automated authentication of end-users into their service can easily develop their application on top of LEGIC Connect. LEGIC Connect is provided as a trusted, cloud-based Software as a Service (SaaS) which can create and instantly deploy mobile credentials to smartphones anywhere in the world. It is a security enabler for any mobile service requiring flexible, automated, 24/7 operation such as rentals, access control, virtual train ticket, contactless car key etc. LEGIC Connect comprises an OWASP-ASVS audited Trusted Service and Mobile SDK plus LEGIC Security Modules which include an integrated, tamper-proof Secure Element (SM-6000, SM-6310). These modules are embedded in infrastructure-devices such as electronic locks or vending machines. Together, these three components establish a cryptographically secure bidirectional channel from backend administration system to smartphone to infrastructure. In addition to credentials, any data needing secure distribution to end devices such as firmware, cryptographic keys and certificates can be transported via LEGIC Connect. For more information about LEGIC Connect, visit https://www.legic.com/security-platform/legic-connect   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

LEGIC Connect surpasses 7.5 million users Read More »

CathexisVision Facial Recognition Solution Webinar – 14th April 2021

Cathexis and Herta invite you to attend one of their Facial Recognition solution webinars on 14 April 2021 Cathexis, in partnership with Herta, has developed a powerful integration solution between the Herta Facial Recognition software and the CathexisVision video management software. This integration enables CathexisVision to receive information on facial recognition events directly from the Herta software. The capabilities of this integration includes: When a facial recognition event has been detected, the user can define a range of actions. To enhance the options available for users, several detected faces can be allocated to a group for triggering customised actions. Actions include: recording or controlling cameras, sending emails and SMS notifications, playing audio clips, and sending alarms to control rooms. The integration can trigger events on specific integration devices or virtual inputs. Storing facial recognition events in a metadatabase, linked to the associated footage within CathexisVision.’ Advanced filters allow users to search the database according to various categories. This integration increases the value of your video surveillance solution by combining advanced software and facial recognition technology. EMEA/APAC Webinar (10am CET) https://us02web.zoom.us/webinar/register/WN_2qYuzk7oQH-XcbGyjFeQ1Q USA Webinar (6pm CET / 9am PST) https://us02web.zoom.us/webinar/register/WN_-g8RS3zbTpeEMrVAeaN2TQ   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com  

CathexisVision Facial Recognition Solution Webinar – 14th April 2021 Read More »

Scroll to Top