Data Securities Corporate Technology Information Presentation

33
DATA SECURITIES IS YOUR COMPLETE BIOMETRIC SECURITY SOLUTIONS PROVIDER

description

Data Securities Biometric Full Solutions Provider

Transcript of Data Securities Corporate Technology Information Presentation

Page 1: Data Securities Corporate Technology Information Presentation

DATA SECURITIES IS YOUR COMPLETE BIOMETRIC SECURITY SOLUTIONS PROVIDER

Page 2: Data Securities Corporate Technology Information Presentation

Best in Class Identity Management

BIOMETRIC ENTERPRISE COMPUTER SECURITYPRODUCT OVERVIEW

Page 3: Data Securities Corporate Technology Information Presentation

Do You Really Know Who is on Your Network?

Page 4: Data Securities Corporate Technology Information Presentation

COST OF A DATA BREACHCan You Afford $6.65 Million?

Companies that are reluctant to invest what it takes on data security better be prepared to pony up a lot more if their systems are ever breached.

In 2008 the average total cost of a data breach was $6.65 million, up from $6.35 million last year and $4.54 in 2005.

In 2008, the per-victim cost of a data breach was $202, up from $197 in 2007, and from $138 when the study was launched in 2005.

Breaches that were the result of a lost of stolen laptop computer bore a per-victim cost of $249.

Ponemon InstituteFebruary 2009

Page 5: Data Securities Corporate Technology Information Presentation

A 2007 FBI report◦ Foreign countries are training their

intelligence officers in how to hack into US computers

Compuware Study Oct 2008◦ 75% of data breaches in the US

are done by people inside the organization.

Camouflage Software Inc.◦ 70% of data breaches are internal◦ Average cost to an organization

per breach is $4.7M

Page 6: Data Securities Corporate Technology Information Presentation

The Inflexis Identity Management System

Inflexis Server Software• Protects your Network / Data

• Coordinates with Active Directory

• Biometric User Enrollments

• Central Mngt for Device Positioning

• Installation & Configuration Tools

• Key Management

• Auditing & Activity Log Support

• Flexible to Suit your Needs

• Works with Current Systems

Inflexis DesktopID™

• Biometric Secure Log On

• USB Plug and Play

• Secure Embedded Processor

• Encrypted Transfers of All Data

• High-Speed USB 2.0 Cable

Inflexis MobileID™Multi-Functional

• Key to Your Computer

•2G & 8G Encrypted Data Storage

• Biometric Secure Log On

• Multiple Data Storage Partitions

• Built-In Microprocessor

• Runs on Any Windows PC

Without SW Installation

• Display Screen

• Rechargeable Lithium Battery

• Functions Not Connected to PC

• Can Operate as an OTP Token

Even When Disconnected from

the USB Port

Inflexis DesktopID™

Inflexis MobileID™TRUSTED Peripherals

Best in Class Identity Management

Page 7: Data Securities Corporate Technology Information Presentation

iDware Client Services

iDWare API

TrustedPeripheral Client OS

USB Stack

Encrypted USB Channel

iDWare ServerMMC Plug In

ActiveDirectory

ServerOS

IDWare Applications• Secure provisioning• Win Logon• MS File/Folder

Encrypt / Decrypt support

• Other?

3rd Party Applications• Win Logon• SSO• FVE• Secure Email• Citrix Log on• RSA / OTP• SC Like Apps.• Other?

Best in Class Identity Management

INFLEXIS SOFTWARE SYSTEM ARCHITECTURE

Page 8: Data Securities Corporate Technology Information Presentation

TRUST FEATURES

Hardware is Not “Hackable”◦ No Downloadable Debugging Tools ◦ PCB Design Prevents Access to Connections

Encryption Keys and Key Pairs that Guarantee:

◦ Trusted Peripheral Code has Not been Hacked◦ Trusted Peripheral Only Works with Trusted

idWARE SW components.◦ Only the Domain Administrator can Write

Templates and Logon Credentials to the Data Store

◦ Encrypts the Data Store◦ Encrypts all the Secure Flash Volumes◦ Session Key Encrypts the USB channel

EncryptedUSB Channel

Secure Processor

BootLoader

NANDFlash RAM

Code

Data Store

Secure FlashVolume

Public FlashVolume

Best in Class Identity Management

TRUSTED PERIPHERAL ARCHITECTURE

Page 9: Data Securities Corporate Technology Information Presentation

Users◦ Easy to Use – Just Swipe Your Finger Especially for Repeated Identity Requests

◦ Protect Users – Give Credits - Prevents Blame◦ Just Plain – CONVENIENT

IT Managers◦ Out of the Box Compatible with Active Directory◦ Centralized Management◦ Secure Over the Network Provisioning◦ Reduced Password Management Costs

CSO’s, CIO’s & CEO’s◦ Ease of use Leads to Acceptance◦ Ease of Use Allows Greatly Enhanced Identity Management Information, Applications, Transactions

◦ Enhanced Identity Management = Enhanced Security / Compliance Deter Fraud – People Understand that Fingerprints Represent Them Make Audit Data Irrefutable

◦ Ease of Use = No Impact on Workflow (aka productivity)

Best in Class Identity Management

VALUE FOR YOUR “ENTERPRISE”

Page 10: Data Securities Corporate Technology Information Presentation

Biometric IdentificationSecure Windows Logon. Eliminates management cost and production downtime associated with forgotten passwords.

Enhanced SecurityAchieved through strong authentication and data encryption

coupled with the need for an actual user to be present for logon

Snoop ProofProvides an on-board authentication processor and fingerprint sensor to manage the identification process and fully encrypt all communication to and from the device

AdaptableInterfaces with Windows Active Directory and can add

biometric security management to your existing network authentication system

Encryption of Local Files, Folders, VolumesUsing Windows Services on a Client PCUsing Inflexis Secure processor for Encryption on the MobileID.

BENEFITS FOR THE ENTERPRISE

Best in Class Identity Management

Page 11: Data Securities Corporate Technology Information Presentation

Audit TrailAll specified transactions are logged

so that access to confidential data can be tracked for compliance

Easy to Install and MaintainOut of the box functionality; centrally enroll and deploy

Administrative SoftwareServer-hosted, advanced security

software provides management control and simplifies deployment and administration

Advanced ComplianceSystem components meet requirements access

Cost EffectiveAn affordable solution with additional cost

savings from reduced password management

MANAGEMENT BENEFITS FOR THE ENTERPRISE

Best in Class Identity Management

Page 12: Data Securities Corporate Technology Information Presentation

DATA SECURITIES IS YOUR COMPLETE BIOMETRIC SECURITY SOLUTIONS PROVIDER

Page 13: Data Securities Corporate Technology Information Presentation

BIOTRACKER OVERVIEW

Page 14: Data Securities Corporate Technology Information Presentation

System Benefits:

Access Management Site and Building SecurityEliminates Fraudulent Access to Facilities and/or Rooms Protects the Identity of your Visitor’s / Employee’s

Confidential Information Simply Place Finger on Scanner to be IdentifiedDisplays Picture and Profile Information of Individual

Administrative Benefits:

Provides Complete Administrative ControlCentralized Authentication DataSimple User InterfaceImmediate Authorization to as Many Locations / Access Points

Individuals are Approved to EnterFlag Individuals Not Authorized AccessPrint Detailed Attendance Reports: Daily, Weekly, MonthlyInstant Site Inventory Report in Case of EmergencyReview and Print Onsite CountRecognize Unauthorized Attempts for AccessAffordable!

Page 15: Data Securities Corporate Technology Information Presentation

Whether you are a facility managing employees, authorized personnel, members, customers, patients, visitors, students, inmates, etc, you need a way to better monitor and have a secure ID for identifying individuals, such as:

MARKET OVERVIEW

Military Bases – Authenticating visitors at security checkpoints

Public Safety Agencies – Monitoring property and evidence rooms, as well as crime scenes

Port and Maritime Authorities – Identification of crew members and dock personnel, in addition to controlling access to restricted areas

Jail Facilities – Track visitors entering jail, properly identify inmates for entrance and release, and probation attendance

Medical Facilities – Patient identification and medical / pharmaceutical supply room inventory tracking

Banking – Customer identification regarding accounts and safety deposit box access

Check Cashing Providers – Prevent identity fraud with requiring authentication to cash check

Pre-School/Daycares – Match approved parents/adults to a specific child / children checking in and out of the building

Schools – Identify students, faculty, or volunteers in the front office or at various locations throughout campus

Member-Based Establishments – Retrieve member profile information quickly and easily

Page 16: Data Securities Corporate Technology Information Presentation

BIOTIMECLOCK OVERVIEW

Page 17: Data Securities Corporate Technology Information Presentation

The solution is ideal for employee or visitor time tracking, offering the following benefits:

• Easily integrates into any time and attendance or accounting software

• Import/Export data capability from SQL compliant backend• Replace costly time cards or punch-clocks• Provide a seamless, front-end biometric time clock interface• Prevent “buddy punching” and identity fraud• Protect confidential employee information• Eliminate human error in time and attendance calculations• Optimize staff or personnel efficiency• Improve attendance reporting accuracy• Centralize attendance data from disparate locations

Page 18: Data Securities Corporate Technology Information Presentation

Intuitive User Administration

Administrators can manage all enrolled user information from a central console. Authentication requests are tracked in real-time and data is easily maintained through an intuitive interface.

Configurable Data Management

When adding a new person into the system, administrators input general contact information, capture a digital photograph, and enroll the person’s fingerprints. Two fingerprints are stored for each person so there is always a backup. In the web-based version, all data fields are customizable to meet the unique requirements of any business.

Page 19: Data Securities Corporate Technology Information Presentation

Robust Fingerprint Matching Engine

An enrolled person can be instantly identified with a single fingerprint scan from any PC using one of our fingerprint readers and the Bio-Tracker™ software. Once authenticated, the person’s picture and information is displayed. Since Bio-Tracker™ is powered by our robust Bio-Plugin™ fingerprint software, profile information can be retrieved at 20,000 persons/second in a single CPU machine.

Real-Time, Comprehensive Reporting

Multiple reporting features are available through the administrative console. Authentication activity can be monitored in real-time and custom reports can be generated to retrieve a breakdown of activity over a designated time frame in a printer-friendly format. All time and attendance data can be easily exported for use in any back-end payroll or accounting system.

Page 20: Data Securities Corporate Technology Information Presentation

COMPLETED SDK SOLUTIONSBIO-PLUGIN OVERVIEW

Page 21: Data Securities Corporate Technology Information Presentation

High-performance, enterprise-ready biometric system integration, without a low-level SDK, in less than 24 hours

Bio-Plugin™ AppServer and Webserver are completely developed, client/server fingerprint recognition systems that rapidly integrate into Windows and web based applications with minimal development effort.

Bio-Plugin™ enables software engineers who are interested in adding a robust fingerprint software system to their application(s) to avoid the headache and hassle associated with low level fingerprint SDK integration.

Instead of having to invest precious resources into learning the complexities of fingerprint software, and into developing a robust fingerprint biometrics system using a fingerprint SDK, engineers can rapidly integrate Bio-Plugin™ in just a few hours, and are immediately provided a fully scalable system that also works in Citrix and Terminal Services.

Bio-Plugin™ APPSERVER / WEBSERVER

Page 22: Data Securities Corporate Technology Information Presentation

Bio-Plugin™ APPSERVER / WEBSERVER

Bio-Plugin Appserver: To Replace Fingerprint SDK Integration into Windows based

Supports a wide variety of development environments such as:> C/C++ > Delphi > Foxpro > VB > Clarion > PowerBuilder

Bio-Plugin Webserver: To Replace Fingerprint SDK Integration into Web based Software

Integrate through web services interface for maximum convenience, control, and security. Works with IIS, Apache, WebSphere, Oracle, and WebLogic.

Page 23: Data Securities Corporate Technology Information Presentation

Integrate a complete fingerprint biometrics system in a few hours

No system dependencies between host and fingerprint software (you do not have to compile your software)

Avoid burdensome internal development and ongoing support requirements Remain focused on core competencies

Includes fingerprint verification (1:1) and robust identification (1:N) software

Compatible with WAN, LAN, Citrix, and MS Terminal Services environments

Supports any SQL compliant database, including MS SQL Server, Access, MySQL, Oracle 9i, DB2, Informix

Scalable, multi-threaded server to optimize performance for large implementations

Bio-Plugin™ APPSERVER / WEBSERVER

BIOPLUGIN SYSTEM BENEFITS

http://www.m2sys.com/arch.htmuser: m2sys_demopass: dem0m2

Page 24: Data Securities Corporate Technology Information Presentation

COMPLETED SDK SOLUTIONSBIO-SNAPON OVERVIEW

Page 25: Data Securities Corporate Technology Information Presentation

Effortless Fingerprint Software Integration Without the SDK

Eliminate Passwords, Barcodes, and PINs, with NO DEVELOPMENT REQUIRED

Interface a robust fingerprint identification system with any existing software for added security and convenience.

Bio-SnapON™ is a complete fingerprint biometrics software system that can be instantly added (“snapped-on”) to any third party or internally developed software package, without any development work.

Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM

Page 26: Data Securities Corporate Technology Information Presentation

Bio-SnapON™ is extremely easy to install and deploy.

The software allows you to enroll users and store their fingerprint data template (NOT the actual fingerprint image), which can then be used for authentication.

If you are currently using barcode, magstripe, or keypad devices to identify users, Bio-SnapON™ can immediately replace this with fingerprint identification.

Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM

Page 27: Data Securities Corporate Technology Information Presentation

Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM

Users first need to register their fingerprint templates and associate them to an ID number. This information is stored in a central database so that any networked PC can access it for authentication.

BIOSNAPON PROCESSStep 1: Fingerprint Enrollment

The ID number is fed to Bio-SnapON

automatically

Students/Employees/Members/Customers swipe/scan their ID card or input their PIN. Their ID number is received by the Bio-SnapON utility.

Users scan the same fingerprint 3 times consecutively in Bio-SnapON. The user’s unique ID number is stored with the fingerprint template in a central database.

Page 28: Data Securities Corporate Technology Information Presentation

Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM

BIOSNAPON PROCESSStep 2: User Identification

Once a user is enrolled in the system, he/she can be identified with a single fingerprint scan from any PC that has a fingerprint reader and is networked to the central fingerprint engine.

The fingerprint data is sent over the network to the Bio-SnapON engine

When a match is found, the associated ID number is sent to the host software (such as POS), which displays the user’s information.

The Bio-SnapON engine compares the scanned print against all stored prints.

Students/Employees/Members/Customers scan their fingerprint on the reader to be identified.

Page 29: Data Securities Corporate Technology Information Presentation

More secure and efficient than ID cards or PINs No software development is required Increase profitability by eliminating "buddy punching" Eliminate problems caused by lost or stolen cards Protect confidential user information Secure manager approvals or transaction overrides Integrate a complete fingerprint biometrics

system in a few hours. No system dependencies between host and fingerprint

software (you do not have to compile your software)

Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM

BIOSNAPON SYSTEM BENEFITS

Page 30: Data Securities Corporate Technology Information Presentation

Avoid burdensome internal development and ongoing support requirements

Remain focused on core competencies Includes fingerprint verification (1:1) and robust

identification (1:N) software Compatible with WAN, LAN, Citrix, and MS Terminal

Services environments Supports any SQL compliant database, including MS SQL

Server, Access, MySQL, Oracle 9i, DB2, Informix Scalable, multi-threaded server to optimize performance

for large implementations No one can forget their fingerprint!

Bio-SnapON™BIOMETRIC IDENTIFICATION SYSTEM

BIOSNAPON SYSTEM BENEFITS

http://www.m2sys.com/BioSnapOn-Demonstration/Contents/BioSnap-Serial-Nav.htm

Page 31: Data Securities Corporate Technology Information Presentation

PHYSICAL SITE SECURITY

Card Access SystemsBiometric Access SystemsMulti-Technology Access SystemsTraditional & IP Fixed CamerasDigital Video CamerasPan-Tilt Zoom CamerasBurglar Alarm Systems

Central Station MonitoringPerimeter Detection SystemsFire Alarm SystemsFire System InspectionsStand Alone Intercom SystemsVideo Intercom SystemsEmergency Phone Systems

Page 32: Data Securities Corporate Technology Information Presentation

RISK CONTROL STRATEGIES

DATA SECURITIESINTEGRATION TEAM

Consulting and Investigations Team Specializing in Risk Assessments andSecurity Solutions:

Security Architecture PracticeCyber Security PracticeCorporate CommunicationsInvestigationsIntelligence & SecurityPolygraph Practice

Page 33: Data Securities Corporate Technology Information Presentation

DATA SECURITIES IS YOUR COMPLETE BIOMETRIC SECURITY SOLUTIONS PROVIDER

Georgia HillVice President of Sales

[email protected]