data securities corporate technology information presentation
DESCRIPTION
Data Securities Biometric Full Solutions ProviderTRANSCRIPT
DATA SECURITIES IS YOUR COMPLETE BIOMETRIC SECURITY SOLUTIONS PROVIDER
Best in Class Identity Management
BIOMETRIC ENTERPRISE COMPUTER SECURITYPRODUCT OVERVIEW
Do You Really Know Who is on Your Network?
COST OF A DATA BREACHCan You Afford $6.65 Million?
Companies that are reluctant to invest what it takes on data security better be prepared to pony up a lot more if their systems are ever breached.
In 2008 the average total cost of a data breach was $6.65 million, up from $6.35 million last year and $4.54 in 2005.
In 2008, the per-victim cost of a data breach was $202, up from $197 in 2007, and from $138 when the study was launched in 2005.
Breaches that were the result of a lost of stolen laptop computer bore a per-victim cost of $249.
Ponemon InstituteFebruary 2009
A 2007 FBI report◦ Foreign countries are training their
intelligence officers in how to hack into US computers
Compuware Study Oct 2008◦ 75% of data breaches in the US
are done by people inside the organization.
Camouflage Software Inc.◦ 70% of data breaches are internal◦ Average cost to an organization
per breach is $4.7M
The Inflexis Identity Management System
Inflexis Server Software• Protects your Network / Data
• Coordinates with Active Directory
• Biometric User Enrollments
• Central Mngt for Device Positioning
• Installation & Configuration Tools
• Key Management
• Auditing & Activity Log Support
• Flexible to Suit your Needs
• Works with Current Systems
Inflexis DesktopID™
• Biometric Secure Log On
• USB Plug and Play
• Secure Embedded Processor
• Encrypted Transfers of All Data
• High-Speed USB 2.0 Cable
Inflexis MobileID™Multi-Functional
• Key to Your Computer
•2G & 8G Encrypted Data Storage
• Biometric Secure Log On
• Multiple Data Storage Partitions
• Built-In Microprocessor
• Runs on Any Windows PC
Without SW Installation
• Display Screen
• Rechargeable Lithium Battery
• Functions Not Connected to PC
• Can Operate as an OTP Token
Even When Disconnected from
the USB Port
Inflexis DesktopID™
Inflexis MobileID™TRUSTED Peripherals
Best in Class Identity Management
iDware Client Services
iDWare API
TrustedPeripheral Client OS
USB Stack
Encrypted USB Channel
iDWare ServerMMC Plug In
ActiveDirectory
ServerOS
IDWare Applications• Secure provisioning• Win Logon• MS File/Folder
Encrypt / Decrypt support
• Other?
3rd Party Applications• Win Logon• SSO• FVE• Secure Email• Citrix Log on• RSA / OTP• SC Like Apps.• Other?
Best in Class Identity Management
INFLEXIS SOFTWARE SYSTEM ARCHITECTURE
TRUST FEATURES
Hardware is Not “Hackable”◦ No Downloadable Debugging Tools ◦ PCB Design Prevents Access to Connections
Encryption Keys and Key Pairs that Guarantee:
◦ Trusted Peripheral Code has Not been Hacked◦ Trusted Peripheral Only Works with Trusted
idWARE SW components.◦ Only the Domain Administrator can Write
Templates and Logon Credentials to the Data Store
◦ Encrypts the Data Store◦ Encrypts all the Secure Flash Volumes◦ Session Key Encrypts the USB channel
EncryptedUSB Channel
Secure Processor
BootLoader
NANDFlash RAM
Code
Data Store
Secure FlashVolume
Public FlashVolume
Best in Class Identity Management
TRUSTED PERIPHERAL ARCHITECTURE
Users◦ Easy to Use – Just Swipe Your Finger Especially for Repeated Identity Requests
◦ Protect Users – Give Credits - Prevents Blame◦ Just Plain – CONVENIENT
IT Managers◦ Out of the Box Compatible with Active Directory◦ Centralized Management◦ Secure Over the Network Provisioning◦ Reduced Password Management Costs
CSO’s, CIO’s & CEO’s◦ Ease of use Leads to Acceptance◦ Ease of Use Allows Greatly Enhanced Identity Management Information, Applications, Transactions
◦ Enhanced Identity Management = Enhanced Security / Compliance Deter Fraud – People Understand that Fingerprints Represent Them Make Audit Data Irrefutable
◦ Ease of Use = No Impact on Workflow (aka productivity)
Best in Class Identity Management
VALUE FOR YOUR “ENTERPRISE”
Biometric IdentificationSecure Windows Logon. Eliminates management cost and production downtime associated with forgotten passwords.
Enhanced SecurityAchieved through strong authentication and data encryption
coupled with the need for an actual user to be present for logon
Snoop ProofProvides an on-board authentication processor and fingerprint sensor to manage the identification process and fully encrypt all communication to and from the device
AdaptableInterfaces with Windows Active Directory and can add
biometric security management to your existing network authentication system
Encryption of Local Files, Folders, VolumesUsing Windows Services on a Client PCUsing Inflexis Secure processor for Encryption on the MobileID.
BENEFITS FOR THE ENTERPRISE
Best in Class Identity Management
Audit TrailAll specified transactions are logged
so that access to confidential data can be tracked for compliance
Easy to Install and MaintainOut of the box functionality; centrally enroll and deploy
Administrative SoftwareServer-hosted, advanced security
software provides management control and simplifies deployment and administration
Advanced ComplianceSystem components meet requirements access
Cost EffectiveAn affordable solution with additional cost
savings from reduced password management
MANAGEMENT BENEFITS FOR THE ENTERPRISE
Best in Class Identity Management
DATA SECURITIES IS YOUR COMPLETE BIOMETRIC SECURITY SOLUTIONS PROVIDER
BIOTRACKER OVERVIEW
System Benefits:
Access Management Site and Building SecurityEliminates Fraudulent Access to Facilities and/or Rooms Protects the Identity of your Visitor’s / Employee’s
Confidential Information Simply Place Finger on Scanner to be IdentifiedDisplays Picture and Profile Information of Individual
Administrative Benefits:
Provides Complete Administrative ControlCentralized Authentication DataSimple User InterfaceImmediate Authorization to as Many Locations / Access Points
Individuals are Approved to EnterFlag Individuals Not Authorized AccessPrint Detailed Attendance Reports: Daily, Weekly, MonthlyInstant Site Inventory Report in Case of EmergencyReview and Print Onsite CountRecognize Unauthorized Attempts for AccessAffordable!
Whether you are a facility managing employees, authorized personnel, members, customers, patients, visitors, students, inmates, etc, you need a way to better monitor and have a secure ID for identifying individuals, such as:
MARKET OVERVIEW
Military Bases – Authenticating visitors at security checkpoints
Public Safety Agencies – Monitoring property and evidence rooms, as well as crime scenes
Port and Maritime Authorities – Identification of crew members and dock personnel, in addition to controlling access to restricted areas
Jail Facilities – Track visitors entering jail, properly identify inmates for entrance and release, and probation attendance
Medical Facilities – Patient identification and medical / pharmaceutical supply room inventory tracking
Banking – Customer identification regarding accounts and safety deposit box access
Check Cashing Providers – Prevent identity fraud with requiring authentication to cash check
Pre-School/Daycares – Match approved parents/adults to a specific child / children checking in and out of the building
Schools – Identify students, faculty, or volunteers in the front office or at various locations throughout campus
Member-Based Establishments – Retrieve member profile information quickly and easily
BIOTIMECLOCK OVERVIEW
The solution is ideal for employee or visitor time tracking, offering the following benefits:
• Easily integrates into any time and attendance or accounting software
• Import/Export data capability from SQL compliant backend• Replace costly time cards or punch-clocks• Provide a seamless, front-end biometric time clock interface• Prevent “buddy punching” and identity fraud• Protect confidential employee information• Eliminate human error in time and attendance calculations• Optimize staff or personnel efficiency• Improve attendance reporting accuracy• Centralize attendance data from disparate locations
Intuitive User Administration
Administrators can manage all enrolled user information from a central console. Authentication requests are tracked in real-time and data is easily maintained through an intuitive interface.
Configurable Data Management
When adding a new person into the system, administrators input general contact information, capture a digital photograph, and enroll the person’s fingerprints. Two fingerprints are stored for each person so there is always a backup. In the web-based version, all data fields are customizable to meet the unique requirements of any business.
Robust Fingerprint Matching Engine
An enrolled person can be instantly identified with a single fingerprint scan from any PC using one of our fingerprint readers and the Bio-Tracker™ software. Once authenticated, the person’s picture and information is displayed. Since Bio-Tracker™ is powered by our robust Bio-Plugin™ fingerprint software, profile information can be retrieved at 20,000 persons/second in a single CPU machine.
Real-Time, Comprehensive Reporting
Multiple reporting features are available through the administrative console. Authentication activity can be monitored in real-time and custom reports can be generated to retrieve a breakdown of activity over a designated time frame in a printer-friendly format. All time and attendance data can be easily exported for use in any back-end payroll or accounting system.
COMPLETED SDK SOLUTIONSBIO-PLUGIN OVERVIEW
High-performance, enterprise-ready biometric system integration, without a low-level SDK, in less than 24 hours
Bio-Plugin™ AppServer and Webserver are completely developed, client/server fingerprint recognition systems that rapidly integrate into Windows and web based applications with minimal development effort.
Bio-Plugin™ enables software engineers who are interested in adding a robust fingerprint software system to their application(s) to avoid the headache and hassle associated with low level fingerprint SDK integration.
Instead of having to invest precious resources into learning the complexities of fingerprint software, and into developing a robust fingerprint biometrics system using a fingerprint SDK, engineers can rapidly integrate Bio-Plugin™ in just a few hours, and are immediately provided a fully scalable system that also works in Citrix and Terminal Services.
Bio-Plugin™ APPSERVER / WEBSERVER
Bio-Plugin™ APPSERVER / WEBSERVER
Bio-Plugin Appserver: To Replace Fingerprint SDK Integration into Windows based
Supports a wide variety of development environments such as:> C/C++ > Delphi > Foxpro > VB > Clarion > PowerBuilder
Bio-Plugin Webserver: To Replace Fingerprint SDK Integration into Web based Software
Integrate through web services interface for maximum convenience, control, and security. Works with IIS, Apache, WebSphere, Oracle, and WebLogic.
Integrate a complete fingerprint biometrics system in a few hours
No system dependencies between host and fingerprint software (you do not have to compile your software)
Avoid burdensome internal development and ongoing support requirements Remain focused on core competencies
Includes fingerprint verification (1:1) and robust identification (1:N) software
Compatible with WAN, LAN, Citrix, and MS Terminal Services environments
Supports any SQL compliant database, including MS SQL Server, Access, MySQL, Oracle 9i, DB2, Informix
Scalable, multi-threaded server to optimize performance for large implementations
Bio-Plugin™ APPSERVER / WEBSERVER
BIOPLUGIN SYSTEM BENEFITS
http://www.m2sys.com/arch.htmuser: m2sys_demopass: dem0m2
COMPLETED SDK SOLUTIONSBIO-SNAPON OVERVIEW
Effortless Fingerprint Software Integration Without the SDK
Eliminate Passwords, Barcodes, and PINs, with NO DEVELOPMENT REQUIRED
Interface a robust fingerprint identification system with any existing software for added security and convenience.
Bio-SnapON™ is a complete fingerprint biometrics software system that can be instantly added (“snapped-on”) to any third party or internally developed software package, without any development work.
Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM
Bio-SnapON™ is extremely easy to install and deploy.
The software allows you to enroll users and store their fingerprint data template (NOT the actual fingerprint image), which can then be used for authentication.
If you are currently using barcode, magstripe, or keypad devices to identify users, Bio-SnapON™ can immediately replace this with fingerprint identification.
Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM
Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM
Users first need to register their fingerprint templates and associate them to an ID number. This information is stored in a central database so that any networked PC can access it for authentication.
BIOSNAPON PROCESSStep 1: Fingerprint Enrollment
The ID number is fed to Bio-SnapON
automatically
Students/Employees/Members/Customers swipe/scan their ID card or input their PIN. Their ID number is received by the Bio-SnapON utility.
Users scan the same fingerprint 3 times consecutively in Bio-SnapON. The user’s unique ID number is stored with the fingerprint template in a central database.
Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM
BIOSNAPON PROCESSStep 2: User Identification
Once a user is enrolled in the system, he/she can be identified with a single fingerprint scan from any PC that has a fingerprint reader and is networked to the central fingerprint engine.
The fingerprint data is sent over the network to the Bio-SnapON engine
When a match is found, the associated ID number is sent to the host software (such as POS), which displays the user’s information.
The Bio-SnapON engine compares the scanned print against all stored prints.
Students/Employees/Members/Customers scan their fingerprint on the reader to be identified.
More secure and efficient than ID cards or PINs No software development is required Increase profitability by eliminating "buddy punching" Eliminate problems caused by lost or stolen cards Protect confidential user information Secure manager approvals or transaction overrides Integrate a complete fingerprint biometrics
system in a few hours. No system dependencies between host and fingerprint
software (you do not have to compile your software)
Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM
BIOSNAPON SYSTEM BENEFITS
Avoid burdensome internal development and ongoing support requirements
Remain focused on core competencies Includes fingerprint verification (1:1) and robust
identification (1:N) software Compatible with WAN, LAN, Citrix, and MS Terminal
Services environments Supports any SQL compliant database, including MS SQL
Server, Access, MySQL, Oracle 9i, DB2, Informix Scalable, multi-threaded server to optimize performance
for large implementations No one can forget their fingerprint!
Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM
BIOSNAPON SYSTEM BENEFITS
http://www.m2sys.com/BioSnapOn-Demonstration/Contents/BioSnap-Serial-Nav.htm
PHYSICAL SITE SECURITY
Card Access SystemsBiometric Access SystemsMulti-Technology Access SystemsTraditional & IP Fixed CamerasDigital Video CamerasPan-Tilt Zoom CamerasBurglar Alarm Systems
Central Station MonitoringPerimeter Detection SystemsFire Alarm SystemsFire System InspectionsStand Alone Intercom SystemsVideo Intercom SystemsEmergency Phone Systems
RISK CONTROL STRATEGIES
DATA SECURITIESINTEGRATION TEAM
Consulting and Investigations Team Specializing in Risk Assessments andSecurity Solutions:
Security Architecture PracticeCyber Security PracticeCorporate CommunicationsInvestigationsIntelligence & SecurityPolygraph Practice
DATA SECURITIES IS YOUR COMPLETE BIOMETRIC SECURITY SOLUTIONS PROVIDER
Georgia HillVice President of Sales