full ID MANAGEMENT

Size: px
Start display at page:

Download "www.bundesdruckerei.de full ID MANAGEMENT"

Transcription

1 full ID MANAGEMENT

2 Contents EDITORIAL: Taking security one step further 3 Bundesdruckerei in figures 4 The Bundesdruckerei Group 5 Section 1 HOW WILL BORDERS BE CONTROLLED IN THE FUTURE? Bundesdruckerei's state-of-the-art egate solution ensures outstanding security and efficiency for border control 6 Section 2 DO YOU KNOW HOW TO MAKE YOUR COMPANY MORE SECURE? Protection against access: How companies can act in a secure and protected manner using the Full ID Governance solution kit from Bundesdruckerei 16 Section 3 WHERE CLEVER MINDS CAN REACH THEIR POTENTIAL An attractive working environment: Bundesdruckerei has excellent opportunities for experts from the worlds of IT, business and science 24 Section 4 SHAPING THE WORLD OF TOMORROW Research for greater security: Bundesdruckerei's innovation strategy is rooted in close co-operation with research institutes 30 Publishing details 36

3 2 3 Taking security one step further Society has never been networked to such an extent, nor has it ever been as flexible and as mobile as it is today. We can communicate with people everywhere, interact online all the time and even become immersed in a sheer endless wealth of information, offers and services. The amount of data which is needed for this kind of digital coexistence and which has been gathered over the past two decades is just as astounding as it is alarming. Early in 2013, the industry association eco had already estimated the volume of data collected world-wide to more than two sextillion bytes. By 2017, the volume of information units stored or transmitted could reach a whopping eight sextillion. The new challenges which we face today are not only due to the volume of this "big data", but also to its complexity and potential for attack. The European Commission now already estimates the damage caused by cyber attacks to be in excess of 290 billion euro with private Internet users being just as much affected as public agencies, private companies and institutions. In this kind of situation, the importance of data protection and data security is changing dramatically. Following the global establishment of new high-security standards, as introduced in many countries after September 11, 2001, in order to promote improved identity protection and also as implemented by Bundesdruckerei in secure electronic ID documents, the focus today is now on innovative solutions and security systems which already begin at the factory gate and cover all organisational structures of a company or public agency. As an innovation driver in high security, Bundesdruckerei was quick to gear its activities to this demand. Now a leading supplier of Full ID Management, Bundesdruckerei covers the entire process chain of Secure ID with its solution models. But taking security one step further not only means achieving the right balance between the opportunities and risks of the big data globally available. Private companies, public authorities and institutions themselves must be able to efficiently protect their confidential data and information as well as their valuable process know-how. In this brochure would like to show you how this can be achieved using state-of-the-art technologies and bespoke solution kits. We believe that if we are to master the challenges of tomorrow we not only need the answers to today's questions, but that we must plan far into the future in order to bring identity protection for individuals, products and processes one step further every day. We are committed to this goal. Ulrich Hamann CEO of Bundesdruckerei GmbH

4 4 5 Bundesdruckerei in figures The Bundesdruckerei Group Wholly owned subsidiaries Shareholdings Sales of which: ID of which: banknotes/other Personnel expenses Investment in tangible assets, software, licenses Depreciation on tangible assets, software, licenses Earnings (before interest, taxes, depreciation and amortization) in million Balance sheet total Fixed assets Current assets of which: liquid funds Equity in million BIS Bundesdruckerei International Services GmbH International sales Project consultancy and implementation D-TRUST GmbH Certified trust service provider Electronic signatures PKI products and services eid service provider Maurer Electronics GmbH Secure ID development centre ID systems Personalisation systems inco Spólka z o.o. Data capture and production of electronic publications Scanning services Shanghai Mite Speciality & Precision Printing Co. Ltd. ID documents for China Emirates German Security Printing LLC ID and security solutions UAE and Middle East DERMALOG Identification Systems GmbH Automated fingerprint identification systems (AFIS) cv cryptovision GmbH Innovative cryptography Public key infrastructure (PKI)

5 6 7 How will borders be controlled in the future? According to estimates by the German aviation industry, the number of air passengers will reach four billion in Rising passenger numbers, however, call for innovative solutions in order to support border control and cut waiting times for passengers. A safe flight begins before take-off. Pilots and mechanics examine the aircraft, test the engines and check the cockpit. At the terminal, border control officers are responsible for effective security control of passengers. Millions of people already travel by plane today and, according to trans port experts, the number of planes could rise further in the coming years. More flights, more passengers and this in combination with stricter international security requirements. This means that solutions will be needed that allow border control officers to work more efficiently. Airports are the hubs of our global world. That's why it is becoming so important for countries and governments to secure these hubs even better. With the Full ID Border solution from Bundesdruckerei, border control officers can perform their tasks to the highest security standards. In addition to state-of-theart egate technology, this solution also comes with smart control and monitoring systems. The Full ID Border solution allows officers to respond directly and immediately to any given security situation and to adapt the control rules of the egate systems.

6 8 Section 1 HOW WILL BORDERS BE CONTROLLED IN THE FUTURE? 9 a Full ID Border solution. Using so-called egates and the matching background systems, this solution makes border control even more efficient and is the key to the highest security standards. After all, security at a country's borders is one of the central tasks of any nation or government. How can governments best respond to stricter requirements for border control? They have to opt for a solution that enables both fast and secure control, especially in light of rising passenger numbers. Bundesdruckerei's Full ID Border solution is an automated control procedure that will save passengers one thing, and that's queues! In fact, the control time has now been reduced to only 18 seconds or so. In other words, even if passenger numbers continue to rise, Full ID Border enables fast border controls with short waiting times but to the highest security standards. "Full ID Border ensures security 24/7" What must governments do to keep pace with the development of entry / exit systems? It must be possible to adapt security concepts at all times to any given requirements and security situations. That's why border controls need advanced egate technologies that are integrated into a background system which is capable of networking and analysing information from different sources at all times. The Full ID Border solution ensures networked systems and thanks to Bundesdruckerei's support and service can keep pace with the latest state of the art. Who crosses the border? egate technologies have a secure and fast answer to this question. They ensure outstanding security and effectiveness for border control. Which solutions and services can Bundesdruckerei offer to nations and governments? Bundesdruckerei, which has a history that dates back to the 18 th century, is now the leading supplier of Full ID Management solutions and is recognised as a reliable ID security partner of nations and governments. The development of ID documents and the protection of personal identities are part of a modular system that also includes Which challenges will border controls at airports have to face in the future? Apart from security, the fast provision of verification results is the most important challenge for border control. How quickly can the person standing there be identified? And how quickly can information, for instance, data on wanted or suspicious persons, be obtained and ideally also on mobile devices? Bundesdruckerei's Full ID Border solution hence also includes mobile control systems in the form of tablets and smartphones which give each officer at the airport direct access to data. The tablet also connects the officer to the control centre which maintains a constant overview of the security situation and keeps border control officers updated.

7 10 Section 1 HOW WILL BORDERS BE CONTROLLED IN THE FUTURE? 11 The Full ID Border solution 3 4 Reliable document verification Optical and electronic verification of the authenticity of electronic passports is carried out by integrated passport readers with forgery detection software. The right photo A camera installed in the egate takes a photo. The system compares this photo with the biometric photo stored in the passport. If this identity check is positive, the egate opens and the control procedure is finished. 5 Database integration Databases, for instance, from Interpol, can be integrated into the solution. This means flexible and mobile availability of the relevant data on the tablet. Interpol egates Control centre Control ON Operation Nationality Age Germany EU 18 ON Male Female egates OFF World 6 Security at hand The tablet connects the officer directly to the control centre which has a comprehensive overview of the security situation at all times. 1 Shorter queues Automated egates speed up border controls for passengers. The control time is reduced to around 18 seconds. 2 Smart control Full ID Border includes the latest egate technology with smart control and monitoring systems which border control officers can easily adapt to any given security situation.

8 HOW WILL BORDERS BE CONTROLLED IN THE FUTURE? 13 Secure and convenient travel thanks to the epassport Solutions to protect data, know-how and technology Reliable partner for nations and governments With its egates, Bundesdruckerei has expanded its portfolio for nations and governments in an important segment. As an ID-system pioneer in the high-security sector and an innovation driver for Full ID Management, the company supplies solutions for the efficient capture, management and verification of personal data. National borders are a particularly sensitive interface where it becomes clear just how secure and reliable an ID system is and, above all, how fast. Border control solutions with innovative control and monitoring systems Tool to avoid data theft while travelling Identity management for assets and processes Smartphones as temporary ID Creating trust in online transactions Bundesdruckerei's advantage is solutions and systems from a single source. That's because the company offers its customers one-stop solution kits from data capture to eservices right through to the protection of digital identities. This all begins with ID documents. Self-service terminals are supplied, for instance, to capture data for ID cards and passports. People can have their data captured at these terminals before approaching staff at the public agency and this lessens the workload for staff here. The data captured is digitally encrypted and passed on to Bundesdruckerei for document production. Behind all this is a complex infrastructure. Bundesdruckerei is responsible for the development and security of this infrastructure which is used, for instance, at citizens' registration offices throughout Germany. Now, the ID document, such as an epassport or ID card, is produced. Bundesdruckerei is continuously working on new production methods and develops innovative security features which can be integrated into the eid cards. The company supplies advanced production systems for personalising ID documents. With readers and verification devices from Bundesdruckerei, users can clearly see whether ID documents may have been forged. These document verification systems are also used in the Full ID Border solution. In any case, identities can be checked in a fast, reliable and secure process. Access systems and authorisation management Solutions for verifying ID documents for sovereign tasks Solutions for verifying ID documents Electronic document and workflow management Verification system for customer contact, e.g. at car dealerships

9 HOW WILL BORDERS BE CONTROLLED IN THE FUTURE? 15 Full ID Border in action The door opens: The first egates are already a permanent feature at Germany's four busiest airports. There are 36 egates in use in Frankfurt, 24 in Munich, and 18 in Düsseldorf, while passengers at Hamburg Airport are channelled through 11 egates. Altogether, around 100 of these new automated border control systems will be used in Germany. In this project, Bundesdruckerei is co-operating with secunet Security Networks AG on behalf of the Federal Police and the Federal Ministry of the Interior. The fact of the matter, however, is that these technologies are not designed to replace border control officers. Instead, the new gates will make passenger controls more effective. For passengers themselves, this means faster clearance, and long waiting times become a thing of the past. What goes on in the background, for instance, when a silent alarm is triggered, when the system does not open the second gate door, when the photo taken in the gate does not match the photo in the chip of the passport all of this information is provided to the security staff by the control and monitoring system. egate technology makes it easier to steer passengers and to co-ordinate passenger movements. The new egate technology is a fully integrated solution that includes the establishment of a control centre concept, as well as mobile solutions (tablets) to keep border control officers up to date. egates are literally opening the door to tomorrow's passport control. And not just that. The individual functions of Full ID Border can be selected and these modules can be adapted in a flexible manner. egate technology hence not only accelerates traditional ID checks at national borders, Full ID Border modules can also be used on trains. Using a tablet connected to a control centre, border control on trains can be effective and secure. egates can be installed at Hamburg's port and used for border control for cruise ships. The document verification systems supplied by Bundesdruckerei also offer a host of additional application options. Private companies and retailers also have to know who they are dealing with. Solutions from Bundesdruckerei could also be installed at banks, and at mobile phone suppliers or car dealerships. Anywhere where fast and easy checking of the identity of the customer and the authenticity of the documents are necessary, for instance, when opening an account, signing a mobile phone contract or when a customer wants to test-drive a new car. Technical background EasyPASS project by Bundesdruckerei GmbH and secunet Security Networks AG By the end of 2014, around 100 egates will be in use at German airports. An electronic passport (epassport) or a German ID card is needed to use egates at German airports. An egate comprises a document verification system as well as a camera system for comparing the facial image with the passport photo stored on the chip. The document verification system, which is connected to wanted-list query systems, checks the authenticity and validity of the travel document as well as the integrity of the data. A monitoring system and a background system for surveillance and control round off the egates and enable fast and flexible adaptation to local control rules and any given security situation. egates can boost border control efficiency while maintaining high security standards. Automated border control systems accelerate controls and cut waiting times for passengers. egates support, but do not replace border police. The border control officer always has the final say and steers the border control process.

10 16 17 Do you know how to make your company more secure? Over the past two years, one in three companies in Germany has had its IT systems attacked. Protecting technologies, data and company workflows is increasingly becoming a competitive factor for companies. Cyber attacks are now a challenge facing both companies and private individuals. Around one million people are affected by this every day and European Commissioner for Home Affairs, Cecilia Malmström, estimates that victims world-wide lose around 290bn each year. As a result of increased workflow digitisation and system networking, there is a growing risk of falling prey to cyber crime, for instance, through digital identity theft. That's why companies today should better protect their workflows and business secrets and identify security-critical data as early as possible. Bundesdruckerei is a global leader in Secure ID and has developed the Full ID Governance solution kit which provides companies and organisations with the technologies, services and know-how to analyse and implement secure processes, especially for use in security-critical areas. But the victims are not just companies in the private sector, public agencies are also increasingly becoming the target of cyber attacks. According to Bundesamt für Verfassungsschutz, the domestic intelligence service of the Federal Republic of Germany, an average of three cyber attacks against the IT infrastructure of federal agencies were registered every day in Solutions from Bundesdruckerei are going a long way to help establish here a culture of security.

11 18 Section 2 DO YOU KNOW HOW TO MAKE YOUR COMPANY MORE SECURE? 19 solution kit which will allow you to create even greater security at your company, from communication to personnel management, right through to rights and access management. "Full ID Governance protects companies against unauthorised access" How can I encrypt my communications and protect access to my company's servers without having to replace my entire system? The key question today is: How do I know who I am actually dealing with? Secure communication also always means verifying identities. When it comes to protection for companies, Bundesdruckerei has a broad range of mechanisms on offer, from signatures to encryption of s and files right through to securing networks and servers. The advantage of Bundesdruckerei's solutions is that the modules can be perfectly integrated into legacy infrastructures. How can I fulfil the legal requirements in conjunction with compliance? First of all, awareness must be generated within the company so that the rules of behaviour, laws and guidelines that apply to your company are adhered to. Secondly, the company should implement solutions, so that all employees are familiar with these rules of behaviour and guidelines. As part of Full ID Governance, Bundesdruckerei supplies auditable solution paths, ranging from elearning to on-site training. Who is allowed to do what? And who is not? With Bundesdruckerei's Full ID Governance solution kit, companies are always in control and can protect all areas, from communication to process management right through to personnel management. What exactly does the service portfolio have to offer? Bundesdruckerei can provide you with modules to protect your company that are tailored to your specific needs. This begins with reliable visitor and access management which ensures who can access which areas. This can be supplemented by building and infrastructure management which controls use of rooms, machines, etc. It goes without saying that all communication matters are covered, while innovative user and rights management ensures effective protection for all computers, systems and machines within the company. elearning systems for compliance management are just as much part of the offer as are efficient document and workflow management and tools for personnel management to record working and project hours. Bundesdruckerei also naturally provides its customers with perfect system implementation and integration as well as service, maintenance and support. How can I as an entrepreneur protect data, processes and technologies against external access? First of all, you have to identify the weak points for potential threats. You have to know where your IT infrastructure could be susceptible to attack and how criminals can gain access. And, what's more, you need a fully reliable partner. Bundesdruckerei one of the market leaders in Secure ID has developed a Full ID Governance

12 20 Section 2 DO YOU KNOW HOW TO MAKE YOUR COMPANY MORE SECURE? 21 Greater data Our security solution kit for security for companies 1 Visitor and access management helps to ensure that guests are clearly identified and that they only access approved areas. 2 The Governance Card serves both as ID and as a key, enabling access management, access to documents as well as communication. All on one card! Rights are an important topic in the everyday world of business. Who can use which PC, which machine and which room? It is precisely here that companies now have to become more flexible and faster. Even today, the number of ID checks and the number of so-called security tokens that enable authorisation are already rising. This is always centred around proof of identity. It must be possible to assign actions to the right person. The Full ID Governance solution kit from Bundesdruckerei does just that. Full ID Governance also offers smart user and rights management for computers, systems, machines and buildings. And all of this with one card: the Governance Card. As a leading producer of ID documents, Bundesdruckerei has designed this electronic card as a secure and reliable organisation tool, for instance, for access management. 6 Building and infrastructure management determines who can use which rooms and technical infrastructures and when. The biometric and biographical data of the respective employee can be stored on the Governance Card. This card provides employees with fast and secure access to their offices without the need for keys. The card also enables smart user and rights management. This controls access to documents, responsibilities and workflows making it as simple as possible. The card holder places the card on a reader at the PC, enters his PIN, clicks on the inbox and reads an , just one, i.e. the specifically addressed to the card holder. The Governance Card can do even more: Payment services will be possible in future, such as a credit-card function or the cashless canteen. 5 Personnel management provides tools to record working and project hours and for holiday requests as well as to update master data. 4 User and rights management provides reliable protection for a company's own computers and systems through flexible control of access rights. 3 When it comes to communication, the use of electronic signatures and encrypted s as well as access to secured VPN interfaces, networks and servers are managed.

13 22 DO YOU KNOW HOW TO MAKE YOUR COMPANY MORE SECURE? 23 Protecting intellectual property Criminals always rely on carelessness, especially on the Internet. Anyone who fails to protect their computer is susceptible to data theft. This can be very expensive for the victim. For a company, however, this could jeopardise its very existence if the thing stolen is in fact what makes the company, i.e. its intellectual property. Full ID Governance offers comprehensive protection for all areas of a company. Even simple processes are today susceptible to unauthorised access. Whether the transfer of data from one colleague to the next or the exchange of documents between one department and the next each individual process, no matter how simple, needs relevant security solutions today. Full ID Governance has the answers to all these challenges and features among other things secure document and workflow management for administration and production processes. The solutions not only protect workflows, special protection is also provided for sensitive personnel data. That's why the Full ID Governance portfolio also comes with solutions and tools for recording working hours and project hours, for holiday requests as well as for updating master data and for general personnel administration tasks. These solutions also include elearning systems and company training in data protection and data security. These are currently the key topics of modern personnel management. Visits by customers and others are an everyday event at companies. And here we once again have to ask: who is coming to visit? And what is the visitor permitted to do during the visit? Flexible solutions are needed if visits are to be organised in a secure and efficient way. Visitor management with Full ID Governance includes online registration remotely from home and on site at the visitor terminal. These are user-friendly applications which offer authorised individuals specific permission for certain areas. The advantage here is that guests can be registered much faster and companies have smart visitor ID badges which can be equipped with different functions and rights. Security and protection are just as important for small and medium-sized companies as they are for large corporations. When it comes to everyday workflows and tasks, it must always be very clear who does what and whether they are authorised to do it. Bundesdruckerei is using its many years of experience especially in order to support medium-sized companies during project planning. Full ID Governance features the most important aspects related to security and identity management, from consultancy services right through to implementation, and has proven its worth as an essential solution kit. UNTERNEHMEN BARGELDLOSES BEZAHLEN Full ID Governance modules for greater security at companies and public agencies Governance card: universal tool for acting within the system Visitor and access management: clear identification of guests and control of access rules Building and infrastructure management: controlling the use of rooms and infrastructures Communication: secure communication thanks to electronic signatures, encrypted s and reliable VPN access, networks and servers User and rights management: protection and access control for all of the company's computers, systems and machines Document and workflow management: control and documentation of release processes Personnel management: tools for secure recording of working hours and project hours and for updating master data Compliance management: training and elearning programmes on suitable rules of behaviour System integration: support during pilot implementation and integration of security solutions Support: from the requirements analysis to technology and project control right through to service and maintenance

14 24 25 Where clever minds can reach their potential As a high-security technology supplier, Bundesdruckerei is the company of choice for people with top qualifications. Their know-how is the key to Bundesdruckerei's innovative capability and leadership in technology. Digital data security is the topic of the future. How can data and identities be protected? A question that moves not just private individuals, but also governments and companies. Anyone looking to work in the exciting field of high-security technology will fit just right in to Bundesdruckerei's team. Clever minds from engineering, IT, business and science can contribute their knowledge and develop innovative solutions for Full ID Management in a trailblazing and attractive working environment at Bundesdruckerei. Winner of the bronze medal in the competition for "Berlin's best employer brand", which is awarded by the Berliner Morgenpost newspaper and the Institute for Management and Economic Research (IMWF), Bundesdruckerei is committed to enabling its employees to make the most of their abilities. This commitment includes not just job-related training, talent promotion and regular analyses of potential, but also achieving a good work-life balance. This is documented not least by the 22.6 percent share of women in management which is above the average figure for the rest of Germany. In this innovative setting, talented young people also have very good opportunities for beginning or developing their career. All in all, more than 2,000 people are employed at the company's sites in Berlin, Munich, Hamburg and Hanover. In other words, a strong team with a wealth of expertise and specialist knowledge.

15 26 Section 3 WHERE CLEVER MINDS CAN REACH THEIR POTENTIAL 27 EMPLOYEE Senior Innovation Developer < BDR << Serving future technologies Bundesdruckerei is synonymous for top-class technological research and development. Products and solutions like the Full ID Governance solution kit or highly complex ID systems are the result of enormous innovative capability and not least thanks to the considerable commitment of staff. What opportunities can Bundesdruckerei offer me? Bundesdruckerei offers good career prospects for people with very different talents. University graduates and experts in the fields of computer science, electrical engineer ing, process engineering, business, production design and mechanical engineering can advance their careers at Bundesdruckerei. Customer projects for governments and private companies range from the production of ID documents to the establishment of eservices right through to bespoke solutions for secure communications and process management. What does Bundesdruckerei offers its employees? The company is a pioneer in high-security technology. In order to extend this lead even further, Bundesdruckerei has set up a culture of appreciation. In addition to job-related training and made-to-measure promotion programmes, this also involves achieving a good work-life balance and job security. There is also a strong focus on talented young people, the so-called young professionals. Students of engineering, business information systems and economics can take part in a two-year trainee programme, manage their own projects and assume responsibility early on. Why is Bundesdruckerei so popular as an employer especially for women? Bundesdruckerei currently employs 2,097 people at its different sites: 761 women and 1,336 men. There are good career opportunities to be had here especially for creative women and for women with a keen interest in technology for instance, from student trainee to innovation developer or from vocational trainee to computer scientist. This is all possible thanks to flexible working hours, made-to-measure training and promotion or also kindergarten services. The high share of women executives not only proves that gender-specific clichés have no business at Bundesdruckerei but also demonstrates that female employees are held in high esteem at this innovationdriven company. Bundesdruckerei fosters independent thinking by each and every employee irrespective of whether male or female. That's because the individual abilities of each and every one of our staff are what go into making Bundesdruckerei's success.

16 28 Section 3 WHERE CLEVER MINDS CAN REACH THEIR POTENTIAL 29 Our staff are our greatest asset Bundesdruckerei is an attractive employer that can offer so much more than other technology companies, for instance, long-term employment with the company and many female employees. Clever minds stay Employment at Bundesdruckerei is much longer than the German average. This secures expertise for the company, but more importantly, talented people want to stay. 13 years Average time working for Bundesdruckerei 10.2 years National average time working for the same company Production 59.5% 40.5% Finance 96.0% 4.0% Training 57.8% 42.2% Marketing 69.8% 30.2% 63.7% men Sales 56.8% 43.2% Innovations & Technology 81.7% 18.3% 36.3% women Established diversity Many high-tech companies today are trying to increase the number of female employees. Bundes druckerei did this a long time ago. An above-average number of women work in all of Bundesdruckerei's departments. Administration 58.5% 41.5% IT 74.7% 25.3% Security & Facility Management 71.9% 28.1% Women executives Compared to other companies in the IT sector, there are very many women in top positions at Bundesdruckerei. 6.5% Women executives at German ITC companies 22.6% Women executives at Bundesdruckerei 31.6% Women managers: six out of a total of 19 areas are headed by women EMPLOYEE EMPLOYEE EMPLOYEE Head of Security & Facility Management < BDR << Head of Process, Quality & Corporate Performance < BDR << Head of Human Resources < BDR << Source: BITKOM, Statista, Bundesdruckerei EMPLOYEE EMPLOYEE EMPLOYEE Head of Communications < BDR << Head of Key Account Management Government < BDR << Head of Internal Audit < BDR << Team with know-how Highly qualified experts can be found in all departments of Bundesdruckerei: 2.4% with a doctor's degree 32.6% with a university degree 2.6% qualified technician/ master's certificate 51.8% vocational training qualification 10.6% other

17 30 31 Shaping the world of tomorrow Bundesdruckerei is expanding its expertise and cooperating closely with scientific institutes as part of the company's strategy in order to continue developing innovative technologies into the future. The history of Bundesdruckerei and its predecessor companies dates back to the 18 th century. This once traditional security-printing company has now become one of the world's leading suppliers of Full ID Management. The company was able to master this transition by pursuing a persistent in no va tion strategy that included setting up its own innovation department as well as networked collaboration with scientists from many disciplines and the field of high security. In close cooperation with a network of universities, research institutes and both young, innovative as well as experienced, well-rounded partner companies, Bundesdruckerei is developing new solutions for Full ID Management. The company is co-operating with different institutes, for instance, in so-called security labs with the Fraunhofer- Gesellschaft institutes. Bundesdruckerei has also introduced the first-ever professorship for Secure Identity at Freie Universität Berlin. Together with Berlin's Humboldt University, BeID Lab (Berlin electronic Identities Laboratory) has been set up and software solutions such as eidclientcore have been developed there. This programming interface under free license enables the development of new applications for the online ID function of the German ID card. In its determination to transform the Berlin-Brandenburg region into a leading site for Secure Identity, Bundesdruckerei and other partners came together in 2009 to establish the Secure Identity Berlin-Brandenburg association. More than 20 local companies, research institutes and universities are committed to this alliance. They all share the conviction that Secure Identity can serve as a growth engine for the economy in the Berlin-Brandenburg region and are determined to establish the region as a driving force in Germany in the field of high-security technology.

18 32 Section 4 Shaping the world of tomorrow 33 What kind of innovation strategy does Bundesdruckerei have? As a leading supplier of Full ID Management, Bundesdruckerei is pursuing a long-term innovation strategy. The company is investing heavily in its own research and development work and through its interdisciplinary approach employs staff from a vast range of different disciplines. These employees observe technology trends and develop, evaluate and assess creative ideas. They generate input for the application of the new, leading and easy-to-use technologies in the field of Secure ID, not just in the analogue world but in the digital world too. This helps to ensure that individuals, objects and processes can be protected even more effectively in the future. In which areas is Bundesdruckerei co-operating? It's quite simple really, future areas. In addition to its own intensive research work, Bundesdruckerei is determined to work closely with scientific institutes. This kind of collaboration generates stimulus for both basic and applied research and ensures the transfer of important research results to practical application. This transfer of knowledge and technology consistently boosts Bundesdruckerei's innovative strength. Future solutions for the digital world How can secure, user-friendly identities be made available for the online world? How can the secure identities of individuals, objects and processes be managed? These are the questions which Bundesdruckerei and its partners ask at the beginning of each innovation process. Where is co-operation already underway? Since 2007, Bundesdruckerei has been collaborating with various Fraunhofer institutes. A current example is the Fraunhofer "Next Generation ID" innovation cluster where Bundesdruckerei's goal is to develop ID technologies for the future. The establishment of the "Trusted Service Platform" is one such project. Since many of our everyday processes have been shifted from the analogue to the digital world, identification and authentication in the online world not only need to be secure, they must also be designed for easy use. The Trusted Service Platform is designed to make it easier for private individuals, companies and administrations to use digital identities. What does my institute essentially need if we want to co-operate with Bundesdruckerei? The focus must be clearly geared to security and identity protection. The goal shared by many of the future labs initiated by Bundesdruckerei is to protect the identity of individuals, objects and processes and to make transactions and communication processes more secure. There should also be a basic willingness to exchange know-how in science and production technology in order to accelerate development processes.

19 34 Section 4 Shaping the world of tomorrow 35 Shaping the future together Innovation today is no longer born in closed structures, instead it results from the exchange of knowledge and collaboration in open systems. Bundesdruckerei was quick to realise this and has established its own dense network. Berlin 1,200 patents granted and in effect 4 In 2013, Bundesdruckerei added more than 100 first-time applications to its portfolio and now holds a total of 2,200 active patent registrations and patents. More than 1,200 of these patents have been granted and are in effect. 22 partners in the region In order to further pro mote Secure ID as an economic factor for the region, Bundes druckerei set up the Secure Identity Berlin- Brandenburg association. The research engine Bundesdruckerei is part of the science and start-up scene in the region and fosters extensive exchange with key players. In joint research projects, both partners benefit from each other's expertise in science and production technology. security labs Since 2007, strategic partnerships have been set up, also with a host of Fraunhofer institutes, including the Fraunhofer Institute for Open Communication Systems and the Fraunhofer Heinrich Hertz Institute. In socalled security labs, the partners are working together on solutions to protect the identities of individuals, objects and processes. 208 employees develop new solutions and products Technological research and development takes place in Bundesdruckerei's innovation and technology departments. 208 employees, 20% of them women, are developing new s olutions and products. 53 co-operation projects In order to step up the development of new products, Bundesdruckerei relies on cooperation with research and industry. There are 53 co-operation projects underway with institutes and private companies. 14 research projects are currently being promoted and backed with 5 million euro. 2 excellence universities in Berlin In the BeID Lab (Berlin electronic Identities Laboratory), Bundesdruckerei is pro moting joint research with Berlin's Humboldt University. Germany's first-ever chair for Secure Identity at Freie Universität Berlin was also born out of co-operation with Bundesdruckerei. Products and innovations Some of the inventions born out of cooperation with our partners Trusted Service Platform Identity platform for managing the own digital identity. The platform allows users to determine for themselves which online service can access their identity information. eidclientcore A programming interface under free license which was created as part of research co-operation with the Department of Computer Science at Humboldt University of Berlin. This promotes work on applications in conjunction with the online functions of the new German ID card. Dynamic one-time password Development of a new security smartcard with an LED display and one-time password. This new technology is centred around a chip in the card which generates a one-time password for each transaction and displays this on the integrated LED display. Visual ID With Fraunhofer Institute for Production Systems and Design Technology, Bundesdruckerei has designed an improved mobile authenticity check for ID documents which combines digital image processing systems with complex algorithms.

20 Publishing details Bundesdruckerei GmbH Oranienstrasse Berlin, Germany Tel: + 49 (0) Fax: + 49 (0) info@bundesdruckerei.de Bundesdruckerei GmbH

sign-me Bundesdruckerei's solution for online signatures using the new German ID card

sign-me Bundesdruckerei's solution for online signatures using the new German ID card Basic information: sign-me sign-me Bundesdruckerei's solution for online signatures using the new German ID card What is sign-me? sign-me is a web application from Bundesdruckerei that enables online signatures

More information

FAQs Electronic residence permit

FAQs Electronic residence permit FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit

More information

FAQs - New German ID Card. General

FAQs - New German ID Card. General FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new

More information

Best Solutions for Biometrics and eid

Best Solutions for Biometrics and eid Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical

More information

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Electronic machine-readable travel documents (emrtds) The importance of digital certificates Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.

More information

Kaba EACM The SAP module for efficient access organisation

Kaba EACM The SAP module for efficient access organisation The SAP module for efficient access organisation THINK 360 Secure Holistic Simple THINK 360 Security can be this simple Lean and efficient organisation processes are more important today than ever. Yet

More information

Veridos Protects Identities. The expert for worldwide government solutions

Veridos Protects Identities. The expert for worldwide government solutions Veridos Protects Identities The expert for worldwide government solutions 2 Personal identity in a globalized world Today s globalized world is fast, mobile, and highly virtualized. We now expect access

More information

Facts about the new identity card

Facts about the new identity card Facts about the new identity card Contents The new identity card At a glance... 4 In detail... 6 Photographs... 8 New ID card, new possibilities...10 Special functions... 11 The online function...12 Reader

More information

2nd End-User Group Meeting on 3D Face Recognition

2nd End-User Group Meeting on 3D Face Recognition 2nd End-User Group Meeting on 3D Face Recognition Martin Willich Project Manager, Infrastructure Terminals, Fraport AG February 21, 2008, Berlin Page 2 Contents 1. Fraport at a Glance 2. New Challenges

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents 3 Your Personal Identity: Unique, Secure, Multifaceted Every person has individual characteristics by which

More information

How To Get Smart Cards From Atos

How To Get Smart Cards From Atos secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through

More information

Identity and Access Management

Identity and Access Management Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements

More information

THE LEADING EDGE OF BORDER SECURITY

THE LEADING EDGE OF BORDER SECURITY THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly

More information

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace

More information

Company Overview. Iraq: Activities & Experience

Company Overview. Iraq: Activities & Experience Company Overview Iraq: Activities & Experience SAFE ID Solutions AG 2009 SAFE ID Management Board Omar El Gohary Executive Vice President Operations Long year leadership and operational experience with

More information

Legal. Professional Dictation Systems. Legal

Legal. Professional Dictation Systems. Legal Legal Professional Dictation Systems Legal 2 3 The traditional dictation workflow has to evolve so legal professionals can work faster and more efficiently. Olympus understands. Olympus has been helping

More information

complexity data room is unique.

complexity data room is unique. The complexity of each data room is unique. is a virtual data room for the secure handling of your confidential company transactions. The due diligence phase is one of the most costly parts of an M&A transaction.

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

All you need to know about the electronic residence permit (eat)

All you need to know about the electronic residence permit (eat) All you need to know about the electronic residence permit (eat) www.bamf.de/eaufenthaltstitel Contents Contents 1 The electronic residence permit 5 2 Photo and fingerprints 7 3 Additional provisions

More information

Discover Germany s Electronic Passport

Discover Germany s Electronic Passport Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize

More information

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters Data center solutions from Siemens For the factories of the 21 st century siemens.com/datacenters We face the challenges for the factories of the 21 st century Based on our vast experience, we offer a

More information

Complete. security. begins with 3M

Complete. security. begins with 3M Complete security begins with : Global Helping to protect people, documents and goods Leadership in the Security Industry For more than 30 years, Security has been a trusted partner, helping governments

More information

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security

More information

YOuR SuppLIER for InnOvaTIvE and ERp-IndEpEndEnT finance SOLuTIOnS. perfection In detail.

YOuR SuppLIER for InnOvaTIvE and ERp-IndEpEndEnT finance SOLuTIOnS. perfection In detail. 13 YOuR SuppLIER for InnOvaTIvE and ERp-IndEpEndEnT finance SOLuTIOnS perfection In detail. 2 3 About Cogon Your Supplier for innovative and ERp-independent Finance solutions The name cogon, derived from

More information

You are an SAP user. Get the most use of SAP. Workforce Management Solutions by Kaba

You are an SAP user. Get the most use of SAP. Workforce Management Solutions by Kaba You are an SAP user. Get the most use of SAP. Workforce Management Solutions by Kaba Get the most of SAP SAP provides you with efficient corporate software. So you should make the most of it in every respect,

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

The 4 forces that generate authentication revenue for the channel

The 4 forces that generate authentication revenue for the channel The 4 forces that generate authentication revenue for the channel Web access and the increasing availability of high speed broadband has expanded the potential market and reach for many organisations and

More information

The ID card with eid function at a glance

The ID card with eid function at a glance The ID card with eid function at a glance New possibilities, more security Since 1 November 2010, Germany has been issuing the new ID card in smart card format and with a chip. With this chip, the ID card

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Swiss-quality training, wherever you re with us

Swiss-quality training, wherever you re with us Welcome Swiss-quality training, wherever you re with us Grüezi! At Swiss AviationTraining we believe in developing people by sharing our aviation expertise. And in all our activities, our prime aim is

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification. Discover a new conception for customer verification and electronic contract management Your benefit is our task. FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and

More information

Watching Your Business Fire & Security Solutions

Watching Your Business Fire & Security Solutions Watchdog Business Security Access Control CCTV Security Intruder Alarms Fire detection & Extinguishing Watching Your Business Fire & Security Solutions Watchdog Business Security Watching Your Business

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

connect.munichre Munich Re s exclusive client portal your success is our business

connect.munichre Munich Re s exclusive client portal your success is our business connect.munichre Munich Re s exclusive client portal your success is our business Welcome to a new way of working: connect.munichre a safe space to develop yourself and your business, optimise your processes,

More information

WHITE PAPER. Mobile Document Management. with eakte2go*

WHITE PAPER. Mobile Document Management. with eakte2go* WHITE PAPER Mobile Document Management with eakte2go* Contents The New World of Apps... 3 Electronic files for businesses... 3 Government Agencies as a Modern Employer... 4 The eakte2go App... 5 An Opportunity:

More information

Expertise for biometric solution

Expertise for biometric solution Expertise for biometric solution Biometrics Solutions from Kaba Kaba is the leading manufacturer for biometric solutions in time and attendance, shop floor data collection and access control. From the

More information

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013 MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Identity and Access Management Authoritive Identity Source User Identity Feed and Role Management

More information

Intelligent Solutions for the Highest IT Security Demands

Intelligent Solutions for the Highest IT Security Demands Intelligent Solutions for the Highest IT Security Demands 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected processing,

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

Intelligent System Solutions for Off-Street Parking.

Intelligent System Solutions for Off-Street Parking. Intelligent System Solutions for Off-Street Parking. As a tradition competent and innovative. Success always has a story: since 1928 the foundation for this success was laid by the inventor Dr. Herbert

More information

Mobile multifactor security

Mobile multifactor security Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

White Paper PalmSecure truedentity

White Paper PalmSecure truedentity White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Redefining Security for the Modern Facility

Redefining Security for the Modern Facility Redefining Security for the Modern Facility TM Make the most of your energy 02 Protecting your people, property and data 03 Trust your facilities to a leader in security systems The world is changing rapidly.

More information

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and

More information

Secure Document Storage. Making it simple to securely move, store and retrieve your business records.

Secure Document Storage. Making it simple to securely move, store and retrieve your business records. Secure Document Storage Making it simple to securely move, store and retrieve your business records. Space problems? Use ours We have facilities throughout London, so there will always be one that s convenient

More information

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION SOME RECENT NATIONAL AND REGIONAL INITIATVES IN IDENTITY MANAGEMENT

More information

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together. CYBERSECURITY Global cybersecurity capabilities for a digital transformation with confidence Delivering Transformation. Together. Sopra Steria, a European leader in digital transformation, has one of the

More information

How to use your new card. Tomorrow s Queensland: strong, green, smart, healthy and fair

How to use your new card. Tomorrow s Queensland: strong, green, smart, healthy and fair How to use your new card Tomorrow s Queensland: strong, green, smart, healthy and fair Safer, stronger cards for Queenslanders The Queensland Government has used the latest technology to make new Queensland

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,

More information

Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Complete Business Communication

Complete Business Communication Complete Business Communication Welcome to Frama UK Your partner for all aspects of physical and digital B2B communication Frama is an international company with its headquarters in Switzerland. Since

More information

Outstanding Prospects for Your Company Software Solutions from DATEV. A Service Provided by Your Tax Advisor

Outstanding Prospects for Your Company Software Solutions from DATEV. A Service Provided by Your Tax Advisor Outstanding Prospects for Your Company Software Solutions from DATEV A Service Provided by Your Tax Advisor Welcome to DATEV! Companies that utilize DATEV solutions not only benefit from first-class software

More information

EBERSPÄCHER ELECTRONICS automotive bus systems

EBERSPÄCHER ELECTRONICS automotive bus systems EBERSPÄCHER ELECTRONICS automotive bus systems YOUR PARTNER FOR IN-VEHICLE NETWORKING DRIVING THE MOBILITY OF TOMORROW 2 AUTOmotive bus systems EBERSPÄCHER ELECTRONICS: THE EXPERTS IN AUTOMOTIVE BUS SYSTEMS

More information

INTRODUCTION AND HISTORY

INTRODUCTION AND HISTORY INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development

More information

Creating Security. Access Control Security Monitoring Time Recording

Creating Security. Access Control Security Monitoring Time Recording Creating Security Access Control Security Monitoring Time Recording Who can offer me a total solution covering access, time and security that I can rely on? When it comes to the planning and implementation

More information

Process Quality Manager Monitor and document process data. With ConnectedManufacturing Solutions by Bosch Software Innovations. Software Innovations

Process Quality Manager Monitor and document process data. With ConnectedManufacturing Solutions by Bosch Software Innovations. Software Innovations Process Quality Manager Monitor and document process data. With ConnectedManufacturing Solutions by Bosch Software Innovations. Software Innovations 2 Process Quality Manager Managing process data the

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Invest in First Class communication. With profits. HiPath Hotel. www.hipath.com

Invest in First Class communication. With profits. HiPath Hotel. www.hipath.com Invest in First Class communication. With profits. HiPath Hotel www.hipath.com HiPath Hotel offers you an excellent returnon-investment. Don t throw your money away. You want to offer your guests the latest

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Jordans Group. Anti-money laundering checks: Overview. Case Study

Jordans Group. Anti-money laundering checks: Overview. Case Study Anti-money laundering checks: Jordans Group Overview Company Jordans Group Challenge Jordans is a firm of corporate consultants with offices worldwide. They wanted to offer their customers an extended

More information

More effective protection for your access control system with end-to-end security

More effective protection for your access control system with end-to-end security More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT

More information

iccp MBA International Certified Credit Professional MBA www.aicd.global

iccp MBA International Certified Credit Professional MBA www.aicd.global iccp iccp Programme www.aicd.global Architected by the Association of International Credit Directors (AICD) in conjunction with The Open University 1 iccp These are the critical questions that will help

More information

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Case Studies National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Royal Oman Police (ROP) of the Sultanate of Oman eid Consulting for e-passport system Federal

More information

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility 1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

How TraitWare TM Can Secure and Simplify the Healthcare Industry

How TraitWare TM Can Secure and Simplify the Healthcare Industry How TraitWare TM Can Secure and Simplify the Healthcare Industry January 2015 Secure and Simplify Your Digital Life. Overview of HIPPA Authentication Standards When Title II of the Health Insurance Portability

More information

Seven Things Employees Want Most From Their Training

Seven Things Employees Want Most From Their Training RESEARCH REPORT Seven Things Employees Want Most From Their Training Executive Summary In 2013 we set out to discover what 1,001 office workers really think about training. Commissioning Opinion Matters,

More information

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Frequently Asked Questions and Answers 2011 CardLogix Corporation. All rights reserved. This document contains information

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

In this discussion paper, we look at three questions:

In this discussion paper, we look at three questions: Meeting the Security Challenge for Serviced Office Providers A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control The global leader in door opening solutions Synopsis

More information

Contact. Faculty of Natural Sciences and Technology

Contact. Faculty of Natural Sciences and Technology Contact HAWK Faculty of Natural Sciences and Technology Von-Ossietzky-Straße 99 D-37085 Göttingen Telephone: +49(0)5 51/37 05-151 Internet: http://natec.hawk-hhg.de for international Information study

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

at Cologne Business School

at Cologne Business School www.cbs.de/en MBA and EMBA Programmes at Cologne Business School Academic excellence Cologne Business School Who we are The Hallmarks of a CBS Education CBS offrers students a rigorous and forward-minded

More information

Complete mailroom management solutions

Complete mailroom management solutions Complete mailroom management solutions Making the SMARTER choice Why is Frama the SMARTER choice? Frama (UK) Ltd, the smallest but fastest growing Royal Mail approved franking machine manufacturer and

More information

Governmental Security Solutions. Elaman The bridge to Trust and Security

Governmental Security Solutions. Elaman The bridge to Trust and Security Governmental Security Solutions Elaman The bridge to Trust and Security Elaman 4 Elaman Gamma Group The Security Alliance 6 Communications Monitoring 8 Technical Surveillance Vans / TSV 10 Technical Surveillance

More information

With Bosch Software Innovations ConnectedManufacturing Solutions.

With Bosch Software Innovations ConnectedManufacturing Solutions. Production Performance Manager How to systematically improve machine availability. www.bosch-si.com/production-performance-manager With Bosch Software Innovations ConnectedManufacturing Solutions. Software

More information

White Paper. Cloud Signing vs. Smartcard Signing

White Paper. Cloud Signing vs. Smartcard Signing White Paper Cloud Signing vs. Smartcard Signing 1. Introduction 2. What is the Goal? What is driving successful Electronic Commerce and e-government solutions? The answer is simple: useful applications

More information

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper Access Control in Commercial Applications Is the future of commercial building security built in, or bolted on? A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control

More information

Business and Process Improvement Specialists. Ai Virtual Assistant Sourcing and Operational Delivery. Sales & Service Centre Efficiency & Performance

Business and Process Improvement Specialists. Ai Virtual Assistant Sourcing and Operational Delivery. Sales & Service Centre Efficiency & Performance DELIVER GREAT SERVICE THAT COSTS LESS Business and Process Improvement Specialists Ai Virtual Assistant Sourcing and Operational Delivery Sales & Service Centre Efficiency & Performance Working in Partnership

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Liquidity management with clockwork precision

Liquidity management with clockwork precision Liquidity management with clockwork precision Cash management and payments Corporate Banking Efficient management of accounts and cash flows Professional management of accounts and cash flows is a key

More information

Graduate Guide to Contracting

Graduate Guide to Contracting Graduate Guide to Contracting Contents What is Contracting? 3 What to Expect on a Contract 4 What to Expect from Contracting 5 Pre-Employment Vetting 6 Umbrella Companies 9 Personal Service Companies 10

More information

NNIT Cybersecurity. A new threat landscape requires a new approach

NNIT Cybersecurity. A new threat landscape requires a new approach NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach

More information